Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2012
  2. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    OpenCache: Exploring Efficient and Transparent Content Delivery Mechanisms for Video-on-Demand

    Broadbent, M. & Race, N., 2012, Proceedings of the 2012 ACM conference on CoNEXT student workshop. New York, NY, USA: ACM, p. 15-16 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management

    Knowles, W., Prince, D. & Hutchison, D., 2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2012). Liverpool: Liverpool John Moores University

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Performance evaluation of smart metering infrastructure using simulation tool

    Panchadcharam, S., Taylor, G. A., Ni, Q., Pisica, I. & Fateri, S., 2012, Universities Power Engineering Conference (UPEC), 2012 47th International. London: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Pointcut rejuvenation: recovering pointcut expressions in evolving aspect-oriented software

    Khatchadourian, R., Greenwood, P., Rashid, A. & Xu, G., 2012, In: IEEE Transactions on Software Engineering. 38, 3, p. 642-657 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012

    Freedman, M. J. (Editor) & Suri, N. (Editor), 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Providing secure and accountable privacy to roaming 802.11 mobile devices

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2012, MPM '12: Proceedings of the First Workshop on Measurement, Privacy, and Mobility. New York, NY, USA: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Putting your best foot forward: investigating real-world mappings for foot-based gestures

    Alexander, J., Han, T., Judd, W., Irani, P. & Subramanian, S., 2012, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems (CHI '12). New York: ACM, p. 1229-1238 10 p. (CHI '12).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Quantitative assessment of Cloud Security Level Agreements: A case study

    Luna, J., Ghani, H., Vateva, T. & Suri, N., 2012, Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, 2012, Rome, Italy. SciTePress, p. 64-73 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top