Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2010
  2. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    TRCCIT: Tunable reliability with congestion control for information transport in wireless sensor networks

    Shaikh, F. K., Khelil, A., Ali, A. & Suri, N., 2010. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    TriggerTV: exploiting social user journeys within an interactive tv system

    Jones, A., Mitchell, K. & Race, N. J. P., 2010, Proceedings of the 20th international workshop on Network and operating systems support for digital audio and video: NOSSDAV '10. New York: ACM, p. 51-56 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    User perception and requirements for future IPTV services: case studies from Finland and UK

    Oksman, V., Tammela, A., Mitchell, K., Ishmael, J., Rouncefield, M. & Race, N., 2010, Proceedings of the 8th international interactive conference on Interactive TV & Video. New York, NY, USA: ACM, p. 1-4 4 p. (EuroITV '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Wireless sensor networks: design for real-life deployment and deployment experiences

    Gaura, E., Roedig, U. & Brusey, J., 2010, In: Measurement Science and Technology. 21, 12, 1 p., 120101.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  7. Published

    Would you do that? understanding social acceptance of gestural interfaces

    Montero, C. S., Alexander, J., Marshall, M. T. & Subramanian, S., 2010, Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services. New York, NY, USA: ACM, p. 275-278 4 p. (MobileHCI '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. 2009
  9. Published

    An examination of clicker technology use in legal education

    Easton, C., 22/12/2009, In: European Journal of Law and Technology . 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A foundation for defining security requirements in grid computing

    Gouglidis, A. & Mavridis, I., 4/12/2009, PCI 2009 - 13th Panhellenic Conference on Informatics. IEEE, p. 180-184 5 p. 5298349

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Credibility, proof and refugee law

    Sweeney, J., 12/2009, In: International Journal of Refugee Law. 21, 4, p. 700-726 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    From Helmand to the high street : a 4 year study to systematically prioritise and map illicit drug markets in Lancashire.

    Kirby, S., Billsborough, I. & Steele, L., 12/2009, In: Drugs and Alcohol Today. 9, 4, p. 22-28 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top