Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2013
  2. Published

    Internet traffic classification using energy time-frequency distributions

    Marnerides, A., Pezaros, D., Kim, H.-C. & Hutchison, D., 9/06/2013, 2013 IEEE International Conference on Communications (ICC). IEEE, p. 2513-2518 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Ubi Displays: A Toolkit for the Rapid Creation of Interactive Projected Displays

    Hardy, J., Ellis, C., Alexander, J. & Davies, N., 5/06/2013. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    A cognitive-perceptual model of symptom perception in males and females: the roles of negative affect, selective attention, health anxiety and psychological job demands

    Goodwin, L., Fairclough, S. & Poole, H., 1/06/2013, In: Journal of Health Psychology. 18, 6, p. 848-857 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Using Byzantine fault-tolerance to improve dependability in federated cloud computing

    Garraghan, P., Townend, P., Xu, J., Yang, X. & Sui, P., 1/06/2013, In: International Journal of Software and Informatics. 7, 2, p. 221-237 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    "Uh.....not to be nitpicky,,,,,but...the past tense of drag is dragged, not drug.": an overview of trolling strategies

    Hardaker, C., 06/2013, In: Journal of Language Aggression and Conflict. 1, 1, p. 57-86 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation

    Bicakci, K., Bagci, I. E., Tavli, B. & Pala, Z., 06/2013, In: Computer Standards and Interfaces. 35, 4, p. 396-402 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Social networking privacy: understanding the disconnect from policy to controls

    Anthonysamy, P., Greenwood, P. & Rashid, A., 06/2013, In: Computer. 46, 6, p. 60-67 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Verification of secure inter-operation properties in multi-domain RBAC systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 06/2013, Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on . IEEE, p. 35-44 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Risk factors for headache in the UK military: cross-sectional and longitudinal analyses

    Rona, R., Jones, M., Goodwin, L., Hull, L. & Wessely, S., 31/05/2013, In: Headache. 53, 5, p. 787-798 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Privacy, security, liberty: informing the design of emergency management information systems

    Buscher, M., Wood, L. & Perng, S.-Y., 12/05/2013, 10th International Conference on Information Systems for Crisis Response and Management. Comes, T., Fiedrich, F., Fortier, S., Geldermann, J. & Müller, T. (eds.). Karlsruhe: KIT

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top