Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2001
  2. Published

    What limits design organisations' ability to predict failure?

    Busby, J. S. & Strutt, J. E., 2001, In: Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture. 215, p. 1471-1474 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    When insight just won’t come: The failure of visual cues in the nine-dot problem.

    Chronicle, E. P., Ormerod, T. C. & MacGregor, J. N., 2001, In: Quarterly Journal of Experimental Psychology Series a Human Experimental Psychology. 54 A, 3, p. 903-919 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Word frequencies in written and spoken English: based on the British National Corpus.

    Leech, G., Rayson, P. & Wilson, A., 2001, London: Longman. 304 p.

    Research output: Book/Report/ProceedingsBook

  5. 2000
  6. Published

    Associating network flows with user and application information

    Ackermann, R., Roedig, U., Zink, M., Griwodz, C. & Steinmetz, R., 1/10/2000, Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. New York: ACM Press, p. 149-152 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Using DMIF for abstracting from IP-telephony signaling protocols

    Ackermann, R., Darlagiannis, V., Roedig, U. & Steinmetz, R., 1/10/2000, Interactive Distributed Multimedia Systems and Telecommunication Services: 7th International Workshop, IDMS 2000 Enschede, The Netherlands, October 17–20, 2000 Proceedings. Berlin: Springer Verlag, p. 104-115 12 p. (Lecture Notes in Computer Science; vol. 1905).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    A distributed firewall for multimedia applications

    Roedig, U., Ackermann, R., Rensing, C. & Steinmetz, R., 1/09/2000, Sicherheit in Netzen und Medienströmen: Tagungsband des GI-Workshops “Sicherheit in Mediendaten„, Berlin, 19. September 2000. Schumacher, M. & Steinmetz, R. (eds.). Berlin: Springer Verlag, p. 3-16 14 p. (Informatik aktuell).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A survey of requirements and standardization efforts for IP-telephony-security

    Rensing, C., Roedig, U., Ackermann, R. & Steinmetz, R., 1/09/2000, Sicherheit in Netzen und Medienströmen: Tagungsband des GI-Workshops “Sicherheit in Mediendaten„, Berlin, 19. September 2000. Schumacher, M. (ed.). Berlin: Springer Verlag, p. 50-60 11 p. (Informatik aktuell).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Entwicklung und Nutzung von IP-Telefonie Anwendungen auf Unix-Systemen

    Ackermann, R., Roedig, U. & Steinmetz, R., 1/09/2000, In: GUUG-Nachrichten. 2000, 2, p. 37-41 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universitäten

    Schumacher, M., Moschgath, M.-L. & Roedig, U., 1/06/2000, In: Informatik-Spektrum. 23, 3, p. 202-221 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Evaluating and improving firewalls for ip-telephony environments

    Roedig, U., Ackermann, R. & Steinmetz, R., 1/04/2000, Proceedings of the 1st IP-Telephony Workshop (IPTel2000), Berlin, Germany. GMD-Forschungszentrum Informationstechnik GmbH, p. 161-166 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top