Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    Stigma as a barrier to seeking health care among military personnel with mental health problems

    Sharp, M., Fear, N., Rona, R., Wessely, S., Greenberg, N., Jones, N. & Goodwin, L., 16/01/2015, In: Epidemiologic reviews. 37, 1, p. 144-162 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Quantum authentication

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 15/01/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  4. Published

    Targeting the ontology of war: from Clausewitz to Baudrillard

    Nordin, A. & Öberg, D., 15/01/2015, In: Millennium : Journal of International Studies. 43, 2, p. 392-419 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Where do the Labour leader contenders stand on immigration?

    Consterdine, E. (Artist), 9/01/2015

    Research output: Exhibits, objects and web-based outputsBlog

  6. Published

    From zero migration to the migration state: Whitehall cultures, institutional conversion and policy change

    Consterdine, E., 1/01/2015, In: International Journal of Public Policy. 11, 4-6, p. 129-142 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Spatializing and analyzing digital texts: Corpora, GIS, and places

    Gregory, I., Cooper, D., Hardie, A. & Rayson, P., 1/01/2015, Deep Maps and Spatial Narratives. Bodenhamer, D. J., Corrigan, J. & Harris, T. M. (eds.). Indiana University Press, p. 150-178 29 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    A model for characterising cybercrime

    Venables, A., Shaikh, S. & Shuttleworth, J., 01/2015, Standing Group on Organised Crime.

    Research output: Other contribution

  9. Published

    Photonic crystal-structures for THz vacuum electron devices

    Letizia, R., Mineo, M. & Paoloni, C., 01/2015, In: IEEE Transactions on Electron Devices. 62, 1, p. 178-183 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Power consumption profiling using energy time-frequency distributions in smart grids

    Marnerides, A., Schaeffer-Filho, A., Smith, P. & Mauthe, A., 01/2015, In: IEEE Communications Letters. 19, 1, p. 46-49 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Web technologies for environmental big data

    Vitolo, C., Elkhatib, Y., Reusser, D., Macleod, C. J. A. & Buytaert, W., 01/2015, In: Environmental Modelling and Software. 63, p. 185-198 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    “Return? It never left.”: exploring the "sacred" as a resource for bridging the gap between the religious and the secular

    Francis, M., Knott, K., Kutz, C. (Editor), Riss, H. (Editor) & Roy, O., 2015, Religious norms in the public sphere: proceedings of a conference held at UC Berkeley on May 6-7, 2011. Kutz, C., Riss, H. & Roy, O. (eds.). Florence, Italy: European University Institute, p. 48-57 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  13. Published

    A model for characterizing cyberpower

    Venables, A., Shaikh, S. & Shuttleworth, J., 2015, Critical Infrastructure Protection. USA: Springer, Vol. 9. p. 3-16 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  16. Published

    An active learning technique enhanced with electronic polls

    Such, J. M., Criado Pacheco, N. & Garcia-Fornes, A., 2015, In: International Journal of Engineering Education. 31, 4, p. 1048-1057 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  19. Published

    Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features

    Shirazi, S. N. U. H., Stephanakis, I. M., Chochliouros , I. P. & Sfakianakis, E., 2015, EANN '15: Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS). Iliadis, L. (ed.). ACM, 9 p. 27

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Are People Really Social on Porn 2.0?

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 2015, Proceedings of the AAAI Conference on Web and Social Media (ICWSM). AAAI, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Characterisation of the TRIUMF neutron facility using a Monte Carlo simulation code

    Monk, S., Abram, T. & Joyce, M., 2015, In: Radiation Protection Dosimetry. 164, 3, p. 228-238 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Closing the seasonal agricultural workers scheme: a triple loss

    Consterdine, E. & Samuk, S., 2015, Sussex Centre for Migration Research Working Papers , p. 1-35, 35 p.

    Research output: Working paper

  25. Published

    Confidence-sourcing among amateur soccer players: interpreting time, place and stimulus-relevance

    Miller, P. K., George, R. & Nicholson, S., 2015, In: Open Sports Science Journal. 8, 1, p. 8-17 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

Back to top