Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    Management patterns for network resilience: design and verification of policy configurations

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 2014, Cyberpatterns: unifying design patterns with security and attack patterns. Switzerland: Springer International Publishing, Vol. 3. p. 85-95 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Metaphor, popular science and semantic tagging: distant reading with the Historical Thesaurus of English

    Alexander, M., Anderson, J., Dallachy, F., Kay, C., Piao, S. & Rayson, P., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Multipath dissemination for collaborative mobile internet access

    Withnell, R. & Edwards, C., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  5. Published

    Non-retroactivity, candour and ‘transitional relativism’: a response to the ECtHR judgment in Maktouf and Damjanović v. Bosnia and Herzegovina

    Sweeney, J., 2014, In: Diritti umani e diritto internazionale. 8, 3, p. 607-622 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Obscene conversations, the internet and the criminal law

    Gillespie, A., 2014, In: Criminal Law Review. 2014, p. 350-363 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Paying with plastic: the enduring presence of the credit card

    Deville, J., 2014, Accumulation: the material politics of plastic. Gabrys, J., Hawkins, G. & Michael, M. (eds.). London: Routledge, (CRESC Culture Economy and the Social).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    Quantum information system

    Stevenson, R. (Inventor), Bennett, A. (Inventor), Young, R. (Inventor) & Shields, A. J. (Inventor), 2014, Patent No. 8670672, Priority date 11/03/2014, Priority No. 12/834,926

    Research output: Patent

  9. Published

    Radical exoticism: Baudrillard and war

    Nordin, A., 2014, In: The International Journal of Baudrillard Studies. 11, 2

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Research challenges for business process models at run-time

    Redlich, D., Blair, G. S., Rashid, A., Molka, T. & Gilani, W., 2014, Models@run.time: foundations, applications, and roadmaps. Bencomo, N., France, R., Cheng, B. H. C. & Assmann, U. (eds.). Springer, p. 208-236 29 p. (Lecture Notes in Computer Science; vol. 8378).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Safeguarding cyborg childhoods: incorporating the on/offline behaviour of children into everyday social work practices

    May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P. & Greenwood, P., 2014, In: British Journal of Social Work. 44, 3, p. 596-614 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top