Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2013
  2. Published

    The inconsistent measurement of Message Chains

    Bowes, D., Randall, D. & Hall, T., 2013, 2013 4th International Workshop on Emerging Trends in Software Metrics (WETSoM). IEEE, p. 62-68 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Unpacking tacit knowledge for requirements engineering

    Gervasi, V., Gacitua, R., Rouncefield, M., Sawyer, P., Kof, L., Li, M., Piwek, P., De Roeck, A., Willis, A., Hui, Y. & Nuseibeh, B., 2013, Managing requirements knowledge. Maalej, W. & Thurimella, A. K. (eds.). Berlin: Springer, p. 23-47 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  5. Published

    Vacuum tubes for Terahertz power generation

    Mineo, M. & Paoloni, C., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  6. Published

    Vehicle plate recognition using improved neocognitron neural network

    Kangin, D., Kolev, G. & Angelov, P., 2013, Artificial Neural Networks and Machine Learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 628-640 13 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Who should I look at? eye contact during collective interviewing as a cue to deceit

    Jundi, S., Vrij, A., Mann, S., Hope, L., Hillmann, J., Warmelink, L. & Gahr, E., 2013, In: Psychology, Crime and Law. 19, 8, p. 661-671 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. 2012
  9. Published

    Designing assisted living technologies ‘in the wild’: preliminary experiences with cultural probe methodology

    Wherton, J., Sugarhood, P., Procter, R., Rouncefield, M., Dewsbury, G., Greenhalgh, T. & Hinder, S., 20/12/2012, In: BMC Medical Research Methodology. 12, 13 p., 188.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Toolkit support for interactive projected displays

    Hardy, J. & Alexander, J., 4/12/2012, MUM '12 Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Towards the improvement of diagnostic metrics Fault diagnosis for DSL-Based IPTV networks using the Rényi entropy

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 3/12/2012, 2012 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 2779-2784 6 p. (2012 IEEE Global Communications Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Autonomous Learning Systems: From Data to Knowledge in Real Time

    Angelov, P., 1/12/2012, Chichester: John Willey and Sons. 288 p.

    Research output: Book/Report/ProceedingsMonograph

Back to top