Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2012
  2. Published

    2012 IEEE Conference on Evolving and Adaptive Intelligent Systems, EAIS-2012

    Angelov, P. (Editor), Filev, D. (Editor), Kasabov, N. (Editor) & Iglesias, J. A. (Editor), 2012, IEEE. 107 p.

    Research output: Book/Report/ProceedingsProceedings

  3. Published

    A mapping study of software code cloning

    Shippey, T., Bowes, D., Chrisianson, B. & Hall, T., 2012, 16th International Conference on Evaluation & Assessment in Software Engineering (EASE 2012). IEEE, p. 274-278 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A novel approach to estimating current and future states of technical systems: Proc. of the International Conference on Computing, Networking and Communications (ICNC)

    Bushminkin, K., Kolev, D., Rodionov, D., Mihaylova, L. & Vikhoreva, A., 2012, International Conference on Computing, Networking and Communications (ICNC), 2012. IEEE, p. 512-516 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A Real-time Approach for Novelty Detection and Trajectories Analysis for Anomaly Recognition in Video Surveillance Systems

    Sadeghi-Tehran, P. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on . IEEE, p. 108-113 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways

    Eiza, M. H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1578-1585 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A systematic literature review on fault prediction performance in software engineering

    Hall, T., Beecham, S., Bowes, D., Gray, D. & Counsell, S., 2012, In: IEEE Transactions on Software Engineering. 38, 6, p. 1276-1304 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Advanced Video Distribution for Wireless E-Healthcare Systems

    Zvikhachevskaya, A. & Mihaylova, L., 2012, E-Healthcare Systems and Wireless Communications: Current and Future Challenges. Watfa, M. (ed.). USA: IGI Global, p. 349-374 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  10. Published

    An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2012, Advanced Agent Technology. Dechesne, F., Hattori, H., ter Mors, A., Such, J. M., Weyns, D. & Dignum, F. (eds.). Berlin: Springer Verlag, p. 411-425 15 p. (Lecture Notes in Computer Science; vol. 7068).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Bernoulli Particle/Box-Particle Filters for Detection and Tracking in the Presence of Triple Measurement Uncertainty

    Gning, A., Ristic, B. & Mihaylova, L., 2012, In: IEEE Transactions on Signal Processing. 60, 5, p. 2138-2151 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top