Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2019
  2. Published

    Do serving and ex-serving personnel of the UK armed forces seek help for perceived stress, emotional or mental health problems?

    Stevelink, S., Jones, N., Jones, M., Dyball, D., Khera, C., Pernet, D., MacCrimmon, S., Murphy, D., Hull, L., Greenberg, N., MacManus, D., Goodwin, L., Sharp, M. & Fear, N., 31/01/2019, In: European Journal of Psychotraumatology. 10, 1, 12 p., 1556552.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (Editor) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  6. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In: PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Latent Fictions: The Anticipation of World Fairs

    Lopez-Galviz, C. A., Nordin, A. H. M. & Dunn, N. S., 1/01/2019, Handbook of Anticipation: Theoretical and Applied Aspects of the Use of Future in Decision Making. Poli, R. (ed.). Springer, 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    Postscript: What is a debt situation?

    Deville, J. E., 1/01/2019, In: Geoforum. 98, p. 335-338 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Straggler root-cause and impact analysis for massive-scale virtualized cloud datacenters

    Garraghan, P., Ouyang, X., Yang, R., McKee, D. & Xu, J., 1/01/2019, In: IEEE Transactions on Services Computing. 12, 1, p. 91-104 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks

    Hashem Eiza, M., Shi, Q., Marnerides, A., Owens, T. & Ni, Q., 01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Digital Subprime: Tracking the Credit Trackers

    Deville, J. E., 2019, The Sociology of Debt. Featherstone, M. (ed.). Policy Press, p. 145-174 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    Distributed Systems Security Knowledge Area: Issue 1.0

    Suri, N., 2019, The Cyber Security Body of Knowledge . Lupu, E. (ed.). University of Bristol, 38 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  16. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  17. Published

    Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  18. 2018
  19. Published

    Mental health outcomes at the end of the British involvement in the Iraq and Afghanistan conflicts: a cohort study

    Stevelink, S., Jones, M., Hull, L., Pernet, D., MacCrimmon, S., Goodwin, L., MacManus, D., Murphy, D., Jones, N., Greenberg, N., Rona, R., Fear, N. & Wessely, S., 31/12/2018, In: The British journal of psychiatry : the journal of mental science. 213, 6, p. 690-697 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Taking an intersectional approach to define latent classes of socioeconomic status, ethnicity and migration status for psychiatric epidemiological research.

    Goodwin, L., Gazard, B., Aschan, L., MacCrimmon, S., Hotopf, M. & Hatch, S., 31/12/2018, In: Epidemiology and psychiatric sciences. 27, 6, p. 589-600 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    UK to remain a hostile environment for immigration under nebulous new post-Brexit policy

    Consterdine, E., 20/12/2018

    Research output: Exhibits, objects and web-based outputsBlog

  25. Published

    Low Latency Driven Effective Capacity Analysis for Non-Orthogonal and Orthogonal Spectrum Access

    Yu, W., Musavian, L., Quddus, A. U., Ni, Q. & Xiao, P., 13/12/2018, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Ethics, killing, and the Moral Machine

    Ryder, M., 10/12/2018

    Research output: Exhibits, objects and web-based outputsBlog

  27. Published

    Interference-Aware Radio Resource Allocation for 5G Ultra-Reliable Low-Latency Communication

    Malik, H., Alam, M. M., Le Moullec, Y. & Ni, Q., 9/12/2018, 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings. IEEE, 6 p. 8644301

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Joint Antenna and User Selection for Untrusted Relay Networks

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 9/12/2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. IEEE, 6 p. 8647350

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B.-C., Li, S.-C., Huang, Y., Suri, N. & Wang, P.-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H., 12/2018, In: Energy Informatics. 1, 1, 24 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    On the sustainability of blockchain funding

    Zhang, B. & Balogun, H., 20/11/2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, p. 89-96 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Authors' reply to 'comments on 'researcher bias: The use of machine learning in software defect prediction''

    Shepperd, M., Hall, T. & Bowes, D., 1/11/2018, In: IEEE Transactions on Software Engineering. 44, 11, p. 1129-1131 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Feeling SketCHI? the lasting appeal of the drawn image in HCI

    Sturdee, M., Lewis, M. & Marquardt, N., 1/11/2018, Interactions, 25, 6, p. 64-69 6 p.

    Research output: Contribution to specialist publicationArticle

  37. Published

    How to Fillet a Penguin: Runtime Data Driven Partitioning of Linux Code

    Schwahn, O., Winter, S., Coppik, N. & Suri, N., 1/11/2018, In: IEEE Transactions on Dependable and Secure Computing. 15, 6, p. 945-958 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Intensive care decision-making: Identifying the challenges and generating solutions to improve inter-specialty referrals to critical care

    Power, N., Plummer, N. R., Baldwin, J., James, F. R. & Laha, S., 1/11/2018, In: Journal of the Intensive Care Society. 19, 4, p. 287-298 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    SketchBlog #1: the rise and rise of the sketchnote

    Sturdee, M., Lewis, M. & Marquardt, N., 1/11/2018, Interactions, 25, 6, p. 6-8 3 p.

    Research output: Contribution to specialist publicationArticle

  40. Published

    Temporary Migration Programmes: the Cause or Antidote of Migrant Worker Exploitation in UK Agriculture

    Consterdine, E. & Samuk, S., 1/11/2018, In: Journal of International Migration and Integration. 19, 4, p. 1005-1020 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Many Phish in the C : A Coexisting-Choice-Criteria Model of Security Behavior

    Embrey, I. & Kaivanto, K. K., 11/2018, Lancaster: Lancaster University, Department of Economics, (Economics Working Papers Series).

    Research output: Working paper

  42. Published

    O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs

    Nomikos, G., Kotronis, V., Sermpezis, P., Gigis, P., Manassakis, L., Dietzel, C., Konstantaras, S., Dimitropoulos, X. & Giotsas, V., 11/2018, IMC '18 Proceedings of the Internet Measurement Conference 2018. New York: Association for Computing Machinery (ACM), p. 265-278 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    A Photonic Device

    Young, R. J. (Inventor) & Noori, Y. (Inventor), 24/10/2018, Patent No. GB 2561590 (A), 24/10/2018, Priority date 19/04/2017, Priority No. GB1706216.7

    Research output: Patent

  44. Published

    Emergent Failures: Rethinking Cloud Reliability at Scale

    Garraghan, P., Yang, R., Wen, Z., Romanovsky, A., Xu, J., Buyya, R. & Ranjan, R., 18/10/2018, In: IEEE Cloud Computing. 5, 5, p. 12-21 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Genetic Risk for Psychiatric Disorders and Telomere Length

    Palmos, A., Breen, G., Goodwin, L., Frissa, S., Hatch, S., Hotopf, M., Thuret, S., Lewis, C. & Powell, T., 16/10/2018, In: Frontiers in Genetics. 9, 10 p., 468.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Measuring Human Values in Software Engineering

    Winter, E. R., Forshaw, S. W. & Ferrario, M. A. F. C., 12/10/2018, Proceedings of the 12th International Symposium on Empirical Software Engineering and Measurement: ESEM2018. ACM Press

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators

    Gainer, P., Linker, S., Dixon, C., Hustadt, U. & Fisher, M., 11/10/2018, Formal Methods and Software Engineering: 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Sun, J. & Sun, M. (eds.). Cham: Springer, p. 160-176 17 p. (Lecture Notes in Computer Science; vol. 11232).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    How Effectively Is Defective Code Actually Tested? An Analysis of JUnit Tests in Seven Open Source Systems

    Petric, J., Hall, T. & Bowes, D., 10/10/2018, Proceedings of the 14th International Conference on Predictive Models and Data Analytics in Software Engineering. New York, NY, USA: ACM, p. 42-51 10 p. (PROMISE'18).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Mining communication patterns in software development: A GitHub analysis

    Ortu, M., Hall, T., Marchesi, M., Tonelli, R., Bowes, D. & Destefanis, G., 10/10/2018, PROMISE'18 Proceedings of the 14th International Conference on Predictive Models and Data Analytics in Software Engineering. New York: ACM, p. 70-79 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    The Secure Development Handbook

    Weir, C. & Ford, N. (Illustrator), 1/10/2018, 1.1 ed. London: Amazon Kindle. 47 p.

    Research output: Book/Report/ProceedingsBook

  52. Published

    Stability of Evolving Fuzzy Systems based on Data Clouds

    Rong, H., Angelov, P. P., Gu, X. & Bai, J., 10/2018, In: IEEE Transactions on Fuzzy Systems. 26, 5, p. 2774-2784 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    The Darkest Hour

    Ryder, M., 30/09/2018, Michael Ryder. 178 p.

    Research output: Book/Report/ProceedingsBook

  54. Published

    Foldwatch: using origami-inspired paper prototypes to explore the extension of output space in smartwatches

    Fuchs, A., Sturdee, M. & Schöning, J., 29/09/2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction. New York: ACM, p. 47-59 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    A Qualitative Evaluation of the Acceptability of a Tailored Smartphone Alcohol Intervention for a Military Population: Information About Drinking for Ex-Serving Personnel (InDEx) App (Preprint)

    Puddephatt, J.-A., Leightley, D., Palmer, L., Jones, N., Mahmoodi, T., Drummond, C., Rona, R. J., Fear, N. T., Field, M. & Goodwin, L., 27/09/2018

    Research output: Other contribution

  56. Published

    Light-touch Interventions to Improve Software Development Security

    Weir, C. A. F., Blair, L., Becker, I., Sasse, A. & Noble, J., 25/09/2018, Proceedings of the IEEE Cybersecurity Development Conference 2018. Yeo, D. & Chong, S. (eds.). IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    How Labour wants to overhaul the UK immigration system

    Consterdine, E., 18/09/2018

    Research output: Exhibits, objects and web-based outputsBlog

  58. Published

    Hazardous alcohol consumption among spouses or partners of military service personnel: a systematic review of the literature

    Gribble, R., Thandi, G., Goodwin, L. & Fear, N., 13/09/2018, In: Journal of the Royal Army Medical Corps. 164, 5, p. 380-388 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    ReasoNet: Inferring Network Policies Using Ontologies

    Rotsos, C., Farshad, A., King, D. & Hutchison, D., 13/09/2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft). IEEE, p. 159-167 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    A Smartphone App and Personalized Text Messaging Framework (InDEx) to Monitor and Reduce Alcohol Use in Ex-Serving Personnel: Development and Feasibility Study

    Leightley, D., Puddephatt, J.-A., Jones, N., Mahmoodi, T., Chui, Z., Field, M., Drummond, C., Rona, R. J., Fear, N. T. & Goodwin, L., 11/09/2018, In: JMIR mHealth and uHealth. 6, 9, e10074.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    Quantum Confinement in Security Elements

    McGrath, T., Bernardo Gavito, R., Bagci, I. E., Wang, C., Astbury, B., Young, R. J. & Roedig, U., 9/09/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  62. Published

    Recording Murder: Videos depicting homicide and the law?

    Gillespie, A. A., 6/09/2018, Homicide in Criminal Law: A Research Companion. Reed, A. & Bohlander, M. (eds.). London: Routledge, p. 174-192 18 p. (Substantive issues in Criminal Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  63. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Bridging the Gap between Climate Change and Maritime Security: Towards a Comprehensive Framework for Planning

    Mazaris, A. & Germond, B. Y., 1/09/2018, In: Science of the Total Environment. 635C, p. 1076-1080 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    Reintroducing Friendship to International Relations: Relational Ontologies from China to the West

    Nordin, A. H. M. & Smith, G. M., 1/09/2018, In: International Relations of the Asia Pacific. 18, 3, p. 369-396 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    From preparedness to risk: from the singular risk of nuclear war to the plurality of all hazards

    Deville, J. & Guggenheim, M., 09/2018, In: British Journal of Sociology. 69, 3, p. 799-824 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

    Kontogianni, F., Hope, L., Vrij, A., Taylor, P. J. & Gabbert, F., 09/2018, In: Journal of Applied Research in Memory and Cognition. 7, 3, p. 454-461 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    The first direct replication on using verbal credibility assessment for the detection of deceptive intentions

    Kleinberg, B., Warmelink, L., Arntz, A. & Verschuere, B., 09/2018, In: Applied Cognitive Psychology. 32, 5, p. 592-599 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Code cleaning for software defect prediction: A cautionary tale

    Shippey, T., Bowes, D., Counsell, S. & Hall, T., 29/08/2018, 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE, p. 239-243 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Giving a voice through design: adapting design methods to enhance the participation of people with communication difficulties

    McNaney , R., Wilson, C., Wallace, J., Brereton, M., Roper, A., Wilson, S. & Sturdee, M., 20/08/2018, PDC '18 Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2. New York: ACM, Vol. 2. 3 p. 40

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Decision-making in intensive care medicine - a review

    James, F. R., Power, N. & Laha, S., 1/08/2018, In: Journal of the Intensive Care Society. 19, 3, p. 247-258 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    A Fuel-Payload Ratio Based Flight-Segmentation Benchmark

    Kaivanto, K. K. & Zhang, P., 08/2018, In: Transportation Research Part D: Transport and Environment. 63, p. 548–559 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Computationally Intelligent Techniques for Resource Management in MmWave Small Cell Networks

    Munir, H., Pervaiz, H., Hassan, S. A., Musavian, L., Ni, Q., Imran, M. A. & Tafazolli, R., 08/2018, In: IEEE Wireless Communications. 25, 4, p. 32-39 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Formalization and Automation of Quality Assurance Processes in Radiation Oncology

    Munbodh, R., Zaveri, H., Caminati, M. B. & Bowles, J., 31/07/2018, University of St Andrews.

    Research output: Other contribution

  79. Published

    Youth mobility scheme after Brexit won’t fill gaps left by end to free movement

    Consterdine, E., 16/07/2018

    Research output: Exhibits, objects and web-based outputsBlog

  80. Published

    Britain’s Brexit plan revealed: experts react

    Consterdine, E., 12/07/2018

    Research output: Exhibits, objects and web-based outputsBlog

  81. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  82. Published

    Message from the Chairs EuroSandP Workshops

    Weir, C. & Fahl, S., 6/07/2018, Proceedings of IEEE European Symposium on Security and Privacy (EuroS&P) 2018. IEEE, p. x 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation

    Saeed, A., Garraghan, P., Craggs, B., van der Linden, D., Rashid, A. & Asad Hussain, S., 2/07/2018, 2018 IEEE International Conference on Cloud Computing (CLOUD). IEEE, p. 606-613 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    ROSE: Cluster Resource Scheduling via Speculative Over-subscription

    Sun, X., Hu, C., Yang, R., Garraghan, P., Wo, T., Xu, J., Zhu, J. & Li, C., 2/07/2018, 38th IEEE International Conference on Distributed Systems Computing Systems. IEEE, p. 949-960 12 p. (2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (Editor) & Mazurek, M. (Editor), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  86. Published

    Reproducibility and replicability of software defect prediction studies

    Mahmood, Z., Bowes, D., Hall, T., Lane, P. C. R. & Petrić, J., 1/07/2018, In: Information and Software Technology. 99, p. 148-163 16 p.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  87. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  88. Published

    Open Access Publishing and the Future of the University

    Deville, J. E., 07/2018, The Commons and Care. Moore, S. & , M. P. (eds.). Coventry: Post Office Press and Rope Press, p. 6-15 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  89. Published

    Playful Research Fiction: A Fictional Conference

    Kirman, B., Lindley, J. G., Blythe, M., Coulton, P., Lawson, S., Linehan, C., Maxwell, D., O'Hara, D., Sturdee, M. & Thomas, V., 07/2018, Funology 2: From Usability to Enjoyment. Blythe, M. & Monk, A. (eds.). Springer, p. 157-173 17 p. (Human-Computer Interaction Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  90. Published

    A review and analysis of the recent literature on the Common European Asylum System

    Schweitzer, R., Consterdine, E. & Collyer, M., 30/06/2018, CEASEVAL Research on the Common European Asylum System.

    Research output: Working paper

  91. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  92. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    Sequent Calculus for Euler Diagrams

    Linker, S., 18/06/2018, Diagrammatic Representation and Inference: 10th International Conference, Diagrams 2018, Edinburgh, UK, June 18-22, 2018, Proceedings. Chapman, P., Stapleton, G., Moktefi, A., Perez-Kriz, S. & Bellucci, F. (eds.). Cham: Springer, p. 399-407 9 p. (Lecture Notes in Computer Science; vol. 10871).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  94. Published

    Whetstone: Reliable monitoring of cloud services

    Zhang, H., Luna, J., Trapero, R. & Suri, N., 18/06/2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, p. 115-122 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

    Ismail, H., Roos, S. & Suri, N., 12/06/2018, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Lancaster at SemEval-2018 Task 3: Investigating Ironic Features in English Tweets

    Dearden, E. & Baron, A., 6/06/2018, Proceedings of the 12th International Workshop on Semantic Evaluation (SemEval-2018). Association for Computational Linguistics, p. 587-593 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Book Review: Trading Barriers: Immigration and the Remaking of Globalization

    Consterdine, E., 2/06/2018, In: International Migration Review. 52, 2, p. 641-642 2 p.

    Research output: Contribution to Journal/MagazineBook/Film/Article reviewpeer-review

  99. Published

    Holistic virtual machine scheduling in cloud datacenters towards minimizing total energy

    Li, X., Garraghan, P., Jiang, X., Wu, Z. & Xu, J., 1/06/2018, In: IEEE Transactions on Parallel and Distributed Systems. 29, 6, p. 1317-1331 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Software defect prediction: do different classifiers find the same defects?

    Bowes, D., Hall, T. & Petrić, J., 1/06/2018, In: Software Quality Journal. 26, 2, p. 525-552 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  101. Published

    Design of 71-76 GHz Double-Corrugated Waveguide Traveling-Wave Tube for Satellite Downlink

    Li, X., Huang, X., Mathisen, S., Letizia, R. & Paoloni, C., 06/2018, In: IEEE Transactions on Electron Devices. 65, 6, p. 2195-2200 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  102. Published

    On the trajectory of video quality transition in HTTP adaptive video streaming

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 06/2018, In: Multimedia Systems. 24, 3, p. 327-340 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 12 3 4 5 6 7 8 9 ...36 Next

Back to top