Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2013
  2. Published

    Predictive vulnerability scoring in the context of insufficient information availability

    Ghani, H., Luna, J., Khelil, A., Alkadri, N. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Quantitative assessment of software vulnerabilities based on economic-driven security metrics

    Ghani, H., Luna, J. & Suri, N., 23/10/2013, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Overview of the worldwide best practices for rape prevention and for assisting women victims of rape

    Walby, S., Olive, P., Towers, J., Francis, B., Strid , S., Krizsán , A., Lombardo , E., May-Chahal, C., Franzway , S., Sugarman, D. & Agarwal , B., 10/10/2013, European Parliament. 212 p.

    Research output: Book/Report/ProceedingsCommissioned report

  6. Published

    Effective policing? implementation in theory and practice

    Kirby, S., 9/10/2013, Basingstoke: Palgrave Macmillan. 224 p.

    Research output: Book/Report/ProceedingsBook

  7. Published

    Understanding criminal careers in organised crime

    Francis, B., Humphreys, L., Kirby, S. & Soothill, K., 7/10/2013, London: Home Office. 120 p. (Crime research and analysis; no. 74)

    Research output: Book/Report/ProceedingsCommissioned report

  8. Published

    Semiconductor quantum dots for quantum light sources

    Young, M., Roberts, J. & Young, R., 4/10/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  9. Published

    Demystifying porn 2.0: a look into a major adult video streaming website

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 10/2013, http://dl.acm.org/citation.cfm?doid=2504730.2504739. New York: ACM, p. 417-426 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    The effect of recovery algorithms on compressive sensing background subtraction

    Davies, R., Mihaylova, L., Pavlidis, N. & Eckley, I., 10/2013, Sensor Data Fusion: Trends, Solutions, Applications (SDF), 2013 Workshop on. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Efficient verification of distributed protocols using stateful model checking

    Saissi, H., Bokor, P., Muftuoglu, C. A., Suri, N. & Serafini, M., 30/09/2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems. IEEE, p. 133-142 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top