Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2012
  2. Published

    Measuring the diffusion of marketing messages across a social network

    Rogers, M., Chapman, C. & Giotsas, V., 11/2012, In: Journal of Direct, Data and Digital Marketing Practice. 14, 2, p. 97-130 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Predicting reconviction: do some predictors fade with length of follow-up?

    Francis, B., Soothill, K. & Humphreys, L., 11/2012, p. 1-18. 18 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  4. Published

    Regenerating market attachments: consumer credit debt collection and the capture of affect

    Deville, J., 11/2012, In: Journal of Cultural Economy. 5, 4, p. 423-439 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Sub 10 ps carrier response times in electroabsorption modulators using quantum well offsetting

    Daunt, C. L. M., Cleary, C. S., Manning, R. J., Thomas, K., Young, R. J., Pelucchi, E., Corbett, B. & Peters, F. H., 11/2012, In: IEEE Journal of Quantum Electronics. 48, 11, p. 1467-1475 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    When do we believe in experts? the power of the unorthodox view

    Alison, L., Almond, L., Christiansen, P., Waring, S., Power, N. & Villejoubert, G., 11/2012, In: Behavioral Sciences and the Law. 30, 6, p. 729-748 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Benchmarking cloud security level agreements using quantitative policy trees

    Luna, J., Langenberg, R. & Suri, N., 19/10/2012, Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. ACM, p. 103-112 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Privacy-by-design based on quantitative threat modeling

    Luna, J., Suri, N. & Krontiris, I., 10/10/2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Balanced spatio-temporal compressive sensing for multi-hop wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012). IEEE, p. 389-397 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Codo: confidential data storage for wireless sensor networks

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 8/10/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  11. Published

    Susceptibility analysis of structured P2P systems to localized eclipse attacks

    Germanus, D., Langenberg, R., Khelil, A. & Suri, N., 8/10/2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top