Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    Gaze-supported gaming: MAGIC techniques for first person shooters

    Velloso, E., Fleming, A., Alexander, J. & Gellersen, H., 2015, CHI PLAY '15 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. New York: ACM, p. 343-347 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Geographically distributed sensemaking: developing understanding in forum-based software development teams

    Shreeve, B., Sawyer, P., Ralph , P. & Stacey, P., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Geoparsing, GIS and textual analysis: current developments in spatial humanities research

    Gregory, I., Donaldson, C., Murrieta-Flores, P. & Rayson, P., 2015, In: International Journal of Humanities and Arts Computing. 9, 1, p. 1-14 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Hate and harm: the law on hate speech

    Gillespie, A., 2015, Research handbook on EU internet law. Savin, A. & Trzaskowski, J. (eds.). Cheltenham: Edward Elgar, p. 488-507 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  6. Published

    Horizon 2020 TWEETHER project for W-band high data rate wireless communications

    Paoloni, C., Letizia, R., Napoli, F., Ni, Q., Rennie, A., Zimmerman, R., Andre, F., Pham, K., Krozer, V., Magne, F., Burciu, I., Ramirez, A., Rocchi, M., Marilier, M. & Vilar, R., 2015, Vacuum Electronics Conference (IVEC), 2015 IEEE International . IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Implicit trust and automatic attitude activation

    Burns, C. & Conchie, S., 2015, Handbook of research methods on trust . 2nd ed. UK: Edward Elgar, p. 292-301 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  8. Published

    In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services

    Pellegrino, G., Balzarotti, D., Winter, S. & Suri, N., 2015. 16 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  9. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Intelligent Systems' 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland

    Angelov, P. (Editor), T. Atanassov, K. (Editor), Doukovska, L. (Editor), Hadjiski, M. (Editor), Jotsov, V. (Editor), Kacprzyk, J. (Editor), Kasabov, N. (Editor), Sotirov, S. (Editor), Szmidt, E. (Editor) & Zadrozny, S. (Editor), 2015, Springer. 863 p. (Advances in Intelligent Systems and Computing; vol. 322)

    Research output: Book/Report/ProceedingsProceedings

  11. Published

    Inter-cell collaborative spectrum monitoring for cognitive cellular networks in fading environment

    Deepak, G. C., Navaie, K. & Ni, Q., 2015, IEEE International Conference on Communications (ICC), 2015 . IEEE, p. 7498-7503 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top