Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2020
  2. Published

    Tackling Energy Theft in Smart Grids through Data-driven Analysis

    Jindal, A., Schaeffer-Filho, A., Marnerides, A., Smith, P., Mauthe, A. & Granville, L., 30/03/2020, 2020 International Conference on Computing, Networking and Communications, ICNC 2020. IEEE, p. 410-414 5 p. 9049793. (2020 International Conference on Computing, Networking and Communications, ICNC 2020).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Design and analysis of random multiple access quantum key distribution

    Zhang, Y. & Ni, Q., 20/03/2020, In: Quantum Engineering. 2, 1, 13 p., e31.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Recent advances in quantum machine learning

    Zhang, Y. & Ni, Q., 20/03/2020, In: Quantum Engineering. 2, 1, 20 p., e34.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    DataPlane Broker: Open WAN control for multi-site service orchestration

    Simpson, S., Farshad, A., McCherry, P., Magzoub, A., Fantom, W., Rotsos, C., Race, N. & Hutchison, D., 19/03/2020, 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) . Dallas, USA: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 17/03/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  7. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Fog Orchestration and Simulation for IoT Services

    Yang, R., Wen, Z., McKee, D., Lin, T., Xu, J. & Garraghan, P., 1/03/2020, Fog and Fogonomics: Challenges and Practices of Fog Computing, Networking, Strategy, and Economics. Yang, Y., Huang, J., Zhang, T. & Weinman, J. (eds.). Wiley, p. 179-212 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In: IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In: International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top