Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2010
  2. Published

    A comparison of static and dynamic component models for Wireless Sensor Networks

    Porter, B., Roedig, U., Taiani, F. & Coulson, G., 04/2010, Proceedings of the The First International Workshop on Networks of Cooperating Objects (CONET2010). 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Designing for social interaction with mundane technologies: issues of security and trust

    Bury, S., Ishmael, J., Race, N. J. P. & Smith, P., 04/2010, In: Personal and Ubiquitous Computing. 14, 3, p. 227-236 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Evolving Takagi-Sugeno fuzzy systems from data streams (eTS+).

    Angelov, P., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 21-50 30 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    A comparative study of architecture knowledge management tools

    Tang, A., Avgeriou, P., Jansen, A., Capilla, R. & Babar, M. A., 03/2010, In: Journal of Systems and Software. 83, 3, p. 352-370 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Exploring Paradigms of Crime Reduction

    Soothill, K., Christoffersen, M. N., Hussain, M. A. & Francis, B., 03/2010, In: British Journal of Criminology. 50, 2, p. 222-238 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  8. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  9. Published

    Aspect-oriented software development in practice: tales from AOSD-Europe

    Rashid, A., Cottenier, T., Greenwood, P., Chitchyan, R., Meunier, R., Coelho, R., Südholt, M. & Joosen, W., 02/2010, In: Computer. 43, 2, p. 19-26 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    The importance of co-convictions in the prediction of dangerous recidivism: blackmail and kidnapping as a demonstration study

    Soothill, K., Francis, B. & Liu, J., 02/2010, In: Criminology and Criminal Justice. 10, 1, p. 23-36 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Event detection and correlation for network environments

    Sifalakis, M., Fry, M. & Hutchison, D., 1/01/2010, In: IEEE Journal on Selected Areas in Communications. 28, 1, p. 60-69 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top