Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2016
  2. Published

    Malicious peers eviction for P2P overlays

    Ismail, H., Germanus, D. & Suri, N., 17/10/2016, 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, p. 216-224 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Study on comprehensive policy review of anti-trafficking projects funded by the European Commission: HOME/2014/ISFP/PR/THBX/0052

    Walby, S., Towers, J., Francis, B. J., Shire, K., Kelly, L., Apitzsch, B., Armstrong, J. E., Balderston, S., Fish, A. R., Hardaker, C., Kirby, S., May-Chahal, C. A. & Palmer, C. E., 17/10/2016, Luxembourg: Publications Office of the European Union. 106 p.

    Research output: Book/Report/ProceedingsCommissioned report

  4. Published

    Evolving multi-tenant SaaS cloud applications using model-driven engineering

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y. S. S. A., 13/10/2016, 10th International Workshop on Models and Evolution. CEUR-WS.org, p. 60-64 5 p. (CEUR Workshop Proceedings; vol. 1706).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Combinatorial Auction-Based Resource Allocation in the Fog

    Fawcett, L., Broadbent, M. H. & Race, N. J. P., 10/10/2016, Fifth European Workshop on Software Defined Networks (EWSDN), 2016. IEEE, p. 62-67 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Autonomous data-driven clustering for live data stream

    Gu, X. & Angelov, P. P., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). IEEE, p. 1128-1135 8 p. 1303

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Efficient access of mobile flows to heterogeneous networks under flash crowds

    Moura, J. & Edwards, C. J., 9/10/2016, In: Computer Networks. 107, 2, p. 163-177 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Modelling security risk in critical utilities: the system at risk as a three player game and agent society

    Busby, J. S., Gouglidis, A., Rass, S. & König, S., 9/10/2016, Proceedings of SMC 2016. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Combining mouse and keyboard events with higher level desktop actions to detect mild cognitive impairment

    Gledson, A., Asfiandy, D., Mellor, J., Omer Faraj Ba-Dhfari, T., Stringer, G., Couth, S., Burns, A., Leroi, I., Zeng, X.-J., Keane, J., Bull, C. N., Rayson, P. E., Sutcliffe, A. G. S. & Sawyer, P. H., 4/10/2016, Healthcare Informatics (ICHI), 2016 IEEE International Conference on. IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Cooperative non-orthogonal multiple access in cognitive radio

    Lv, L., Chen, J. & Ni, Q., 10/2016, In: IEEE Communications Letters. 20, 10, p. 2059-2062 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Energy and spectral efficiency tradeoff with user association and power coordination in massive MIMO enabled HetNets

    Hao, Y., Ni, Q., Li, H. & Hou, S., 10/2016, In: IEEE Communications Letters. 20, 10, p. 2091-2094 4 p.

    Research output: Contribution to Journal/MagazineLetterpeer-review

  12. Published

    Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 10/2016, In: Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Nano-CNC machining of sub-THz vacuum electron devices

    Gamzina, D., Himes, L., Barchfeld, R., Zheng, Y., Popovic, B., Paoloni, C., Choi, E. & Luhmann Jr., N. C., 10/2016, In: IEEE Transactions on Electron Devices. 63, 10, p. 4067-4073 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Secure and privacy-aware cloud-assisted video reporting service in 5G enabled vehicular networks

    Hashem Eiza, M., Ni, Q. & Shi, Q., 10/2016, In: IEEE Transactions on Vehicular Technology. 65, 10, p. 7868-7881 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Trusting Quantum Physics: lighting the way to secure communications

    Young, R. J., 28/09/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  16. Published

    A traveling wave tube for 92 - 95 GHz band wireless applications

    Paoloni, C., Andre, F., Kohler, S., Krozer, V., Quang, T. L., Letizia, R., Sabaawi, A., Ulisse, G. & Zimmerman, R., 25/09/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Published

    Evaluation of a rapid manufacturing approach for rectangular waveguide filters up to 1.1 THz

    Doychinov, V., David Paul, S. & Paoloni, C., 25/09/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Efficient verification of program fragments: Eager POR

    Metzler, P., Saissi, H., Bokor, P., Hess, R., Suri, N., Artho, C. (Editor), Peled, D. (Editor) & Legay, A. (Editor), 22/09/2016, Automated Technology for Verification and Analysis: 14th International Symposium, ATVA 2016, Chiba, Japan, October 17-20, 2016, Proceedings. Springer-Verlag, Vol. 9938 LNCS. p. 375-391 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Dynamic modeling and parameter estimation of a hydraulic robot manipulator using a multi-objective genetic algorithm

    Montazeri, A., West, C., Monk, S. D. & Taylor, C. J., 21/09/2016, In: International Journal of Control. 90, 4, p. 661-683 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Energy Efficient Resource Allocation in 5G Hybrid Heterogeneous Networks: A Game Theoretic Approach

    Munir, H., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 18/09/2016, 2016 IEEE 84th Vehicular Technology Conference (VTC2016-Fall). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Technology-related disasters: a survey towards disaster-resilient software defined networks

    Machuca, C. M., Secci, S., Vizaretta, P., Kuipers, F., Gouglidis, A., Hutchison, D., Jouet, S., Pezaros, D., Elmokashfi, A., Heegaard, P., Ristov, S. & Gusev, M., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on . IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Towards policy refinement for resilience management in cloud

    Shirazi, S. N. U. H., Simpson, S., Syeda, K. N., Mauthe, A. U. & Hutchison, D., 13/09/2016, 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM). IEEE, p. 260-266 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Building an Ensemble for Software Defect Prediction Based on Diversity Selection

    Petrić, J., Bowes, D., Hall, T., Christianson, B. & Baddoo, N., 8/09/2016, ESEM '16 Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. New York: Association for Computing Machinery, Inc, 10 p. 46

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    So You Need More Method Level Datasets for Your Software Defect Prediction? Voilà!

    Shippey, T., Hall, T., Counsell, S. & Bowes, D., 8/09/2016, ESEM '16 Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. New York: IEEE Computer Society, 6 p. 12

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK

    Angelov, P. P., Shen, Q., Jayne, C. & Gegov, A., 7/09/2016, Springer. 508 p. (Advances in Intelligent Systems and Computing; vol. 513)

    Research output: Book/Report/ProceedingsBook

Back to top