Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2020
  2. Published

    Time-critical fog computing for vehicular networks

    Chebaane, A., Khelil, A. & Suri, N., 5/05/2020, Fog Computing: Theory and Practice. Zomaya, A., Abbas, A. & Khan, S. (eds.). London: Wiley, p. 431-458 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Forthcoming

    A cloud gaming framework for dynamic graphical rendering towards achieving distributed game engines

    Bulman, J. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Forthcoming

    Towards GPU Utilization Prediction for Cloud Deep Learning

    Yeung, G.-F., Borowiec, D., Friday, A., Harper, R. H. R. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20). USENIX Association

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Honeypots for Automatic Network-Level Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 27/04/2020. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    Three Creative Futures Methods for Imagining Life in a Post-Antibiotic World: Report on a Speculative Cross-Sector and Cross-Campus Conversation

    Braun, R., Curry, A., Gatherer, D., Kyne, K. & Spiers, E., 26/04/2020, Lancaster: Institute for Social Futures, Lancaster University, 15 p.

    Research output: Working paper

  7. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A national initiative in data science for health: an evaluation of the UK Farr Institute

    Hemingway, H., Lyons, R., Li, Q., Buchan, I., Ainsworth, J., Pell, J., Morris, A., Barnes, M. R., Bedford, H., Bennie, M., others, 1. & Caminati, M., 8/04/2020, In: International Journal of Population Data Science. 5, 1, 32935051.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

    Suri, N., 30/03/2020, 2019 38th Symposium on Reliable Distributed Systems (SRDS). Lyon, France, Vol. 2019. p. 71-82 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top