Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    Bordering on the unacceptable in China and Europe: “Cao ni ma” and “nique ta mère”

    Nordin, A., 2014, European-East Asian borders in translation. Liu, J. C. H. & Vaughan-Williams, N. (eds.). London: Routledge, p. 166-181 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published
  5. Published

    Cloud ethics for disaster response

    Buscher, M., Easton, C., Kuhnert, M., Wietfeld, C., Ahlsen, M., Pottsbaum, J. & Van Veelen, B., 2014, Proceedings 11th International Conference on Information Systems for Crisis Response and Management.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Computer-based analysis of the strategic content of UK annual report narratives

    El-Haj, M., Athanasakou, V., Rayson, P., Young, S. & Walker, M., 2014. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  7. Published

    Constructs competition miner: process control-flow discovery of BP-domain constructs

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Business Process Management: 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings. Sadiq, S., Soffer, P. & Völzer, H. (eds.). Springer, p. 134-150 17 p. (Lecture Notes in Computer Science; vol. 8659).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Consumer credit default and collections: the shifting ontologies of market attachment

    Deville, J., 2014, In: Consumption, Markets and Culture. 17, 5, p. 468-490 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  10. Published

    Dealing with heterogeneous big data when geoparsing historical corpora

    Rupp, C. J., Rayson, P., Gregory, I., Hardie, A., Joulain, A. & Hartmann, D., 2014, Proceedings of the 2014 IEEE International Conference on Big Data. IEEE, p. 80-83 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Design and construction of an Industrial Control System testbed

    Green, B., Paske, B., Hutchison, D. & Prince, D., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Back to top