Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2013
  2. Published

    Welcome to Wonderland: the influence of the size and shape of a virtual hand on the perceived size and shape of virtual objects

    Linkenauger, S. A., Leyrer, M., Bülthoff, H. H., Mohler, B. J. & Witt, J. (Editor), 11/07/2013, In: PLoS ONE. 8, 7, 16 p., e68594.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    On the comprehension of DSL SyncTrap events in IPTV networks

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 7/07/2013, 2013 IEEE Symposium on Computers and Communications (ISCC) . IEEE, p. 670-675 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    The structural, electronic and optical properties of GaSb/GaAs nanostructures for charge-based memory

    Hayne, M., Young, R. J., Smakman, E. P., Nowozin, T., Hodgson, P., Garleff, J. K., Rambabu, P., Koenraad, P. M., Marent, A., Bonato, L., Schliwa, A. & Bimberg, D., 3/07/2013, In: Journal of Physics D: Applied Physics. 46, 26, 10 p., 264001.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A convolution particle filtering approach for tracking elliptical extended objects

    Angelova, D., Mihaylova, L., Petrov, N. & Gning, A., 1/07/2013, p. 1-6. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  6. Published

    A qualitative comparison of the suitability of four theorem provers for basic auction theory

    Lange, C., Caminati, M. B., Kerber, M., Mossakowski, T., Rowat, C., Wenzel, M. & Windsteiger, W., 1/07/2013, Intelligent Computer Mathematics: MKM, Calculemus, DML, and Systems and Projects 2013, Held as Part of CICM 2013, Bath, UK, July 8-12, 2013. Proceedings 6. Springer, Vol. 7961. p. 200-215

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Investigation of routing reliability of vehicular ad hoc networks

    Eiza, M., Ni, Q., Owens, T. & Min, G., 1/07/2013, In: EURASIP Journal on Wireless Communications and Networking. 2013, 15 p., 179.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Understanding cyber criminals and measuring their future activity

    Hargreaves, C. & Prince, D., 1/07/2013, Lancaster: Lancaster University. (Future of ...)

    Research output: Book/Report/ProceedingsOther report

  9. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Managing software evolution in large-scale Wireless Sensor and Actuator Networks

    Porter, B., Coulson, G. & Roedig, U., 07/2013, In: ACM Transactions on Sensor Networks. 9, 4, p. 1-28 28 p., 54.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Plane thinking: mental representations in number line estimation as a function of orientation, scale, and counting proficiency

    Simms, V., Muldoon, K. & Towse, J., 07/2013, In: Journal of Experimental Child Psychology. 115, 3, p. 468-480 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top