Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2018
  2. Published

    Genetic Risk for Psychiatric Disorders and Telomere Length

    Palmos, A., Breen, G., Goodwin, L., Frissa, S., Hatch, S., Hotopf, M., Thuret, S., Lewis, C. & Powell, T., 16/10/2018, In: Frontiers in Genetics. 9, 10 p., 468.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Measuring Human Values in Software Engineering

    Winter, E. R., Forshaw, S. W. & Ferrario, M. A. F. C., 12/10/2018, Proceedings of the 12th International Symposium on Empirical Software Engineering and Measurement: ESEM2018. ACM Press

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators

    Gainer, P., Linker, S., Dixon, C., Hustadt, U. & Fisher, M., 11/10/2018, Formal Methods and Software Engineering: 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Sun, J. & Sun, M. (eds.). Cham: Springer, p. 160-176 17 p. (Lecture Notes in Computer Science; vol. 11232).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    How Effectively Is Defective Code Actually Tested? An Analysis of JUnit Tests in Seven Open Source Systems

    Petric, J., Hall, T. & Bowes, D., 10/10/2018, Proceedings of the 14th International Conference on Predictive Models and Data Analytics in Software Engineering. New York, NY, USA: ACM, p. 42-51 10 p. (PROMISE'18).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Mining communication patterns in software development: A GitHub analysis

    Ortu, M., Hall, T., Marchesi, M., Tonelli, R., Bowes, D. & Destefanis, G., 10/10/2018, PROMISE'18 Proceedings of the 14th International Conference on Predictive Models and Data Analytics in Software Engineering. New York: ACM, p. 70-79 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    The Secure Development Handbook

    Weir, C. & Ford, N. (Illustrator), 1/10/2018, 1.1 ed. London: Amazon Kindle. 47 p.

    Research output: Book/Report/ProceedingsBook

  9. Published

    Stability of Evolving Fuzzy Systems based on Data Clouds

    Rong, H., Angelov, P. P., Gu, X. & Bai, J., 10/2018, In: IEEE Transactions on Fuzzy Systems. 26, 5, p. 2774-2784 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    The Darkest Hour

    Ryder, M., 30/09/2018, Michael Ryder. 178 p.

    Research output: Book/Report/ProceedingsBook

  11. Published

    Foldwatch: using origami-inspired paper prototypes to explore the extension of output space in smartwatches

    Fuchs, A., Sturdee, M. & Schöning, J., 29/09/2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction. New York: ACM, p. 47-59 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top