Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    Dataset on usage of a live & VoD P2P IPTV service

    Elkhatib, Y., Mu, M. & Race, N., 09/2014, 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Fast design method for THz backward wave amplifiers

    Paoloni, C., David, J.-F., Durand, A. & Mineo, M., 09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Organizational sensemaking about risk controls: the case of offshore hydrocarbons production

    Busby, J. & Collins, A., 09/2014, In: Risk Analysis. 34, 9, p. 1738-1752 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    W-band PARC klystron

    Paoloni, C., 09/2014, 7th European/UK-China Workshop on Millimeter Waves and Terahertz Technologies (UCMMT 2014).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Sexual and general offending trajectories of men referred for civil commitment

    Francis, B., Harris, D., Wallace, S., Soothill, K. & Knight, R., 31/08/2014, In: Sexual Abuse. 26, 4, p. 311-329 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Ready, aim, click: we need new laws to govern cyberwarfare

    Chatterjee, B. B., 21/08/2014, The Conversation.

    Research output: Other contribution

  11. Published

    Ready, aim, click – digital weapons of destruction

    Chatterjee, B. B., 21/08/2014

    Research output: Other contribution

Back to top