Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Open challenges in relationship-based privacy mechanisms for social network services

    Fogues, R. L., Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2015, In: International Journal of Human-Computer Interaction. 31, 5, p. 350-370 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Optimization studies on CSRR loaded waveguide for particle accelerator applications

    Sharples, E. & Letizia, R., 2015, Abstracts 2015 IEEE International Conference on Plasma Sciences (ICOPS). IEEE, 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Problem set for first order theorem provers in the TPTP format

    Caminati, M. B., Kerber, M. & Rowat, C., 2015

    Research output: Exhibits, objects and web-based outputsSoftware

  7. Published

    Proofs for Traffic Safety: Combining Diagrams and Logic

    Linker, S., 2015

    Research output: ThesisDoctoral Thesis

  8. Published

    ProTec - A Normal-Conducting Cyclinac for Proton Therapy Research and Radioisotope Production

    Apsimon, R. J., Burt, G. C., Mitchell, J., Pitman, S., Owen, H. & Degiovanni, A., 2015, Proceedings of the 6th International Particle Accelerator Conference. JACoW, p. 3883-3885 3 p. THPF084

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    RDE with forgetting: an approximate solution for large values of k with an application to fault detection problems

    Bezerra, C. G., Costa, B., Guedes, L. A. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 169-178 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Religion, Raum und Ort: Der Spatial Turn in der Religionsforschung

    Knott, K., 2015, 103 Jahre Religionswissenschaft in Münster. Radermacher, M., Stander, J. & Wilke, A. (eds.). Münster: Lit Verlag, p. 199-225 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    Religious differentiation and diversity in discourse and practice

    Knott, K., 2015, Routledge international handbook of diversity studies. Vertovec, S. (ed.). London: Routledge, p. 91-97 7 p. (Routledge International Handbooks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  13. Published

    Research and teaching using a hydraulically-actuated nuclear decommissioning robot

    West, C., Burrell, T., Montazeri, A., Monk, S. D. & Taylor, C. J., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  14. Published

    Review of autonomous navigation for indoor aerial robots within a nuclear decommissioning context

    Burrell, T., Montazeri, A., Monk, S. D. & Taylor, C. J., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  15. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  16. Published

    Security, technology and global politics: thinking with Virilio

    Lacy, M. J., 2015, London: Routledge. 168 p. (Prio New Security Studies)

    Research output: Book/Report/ProceedingsBook

  17. Published

    Sexual exploitation

    Gillespie, A., 2015, International child law. Buck, T. (ed.). 3rd ed. London: Routledge, p. 333-383 51 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  18. Published

    Social computing privacy and online relationships

    Misra, G. & Such, J. M., 2015, AISB Social Aspects of Cognition and Computing Symposium. p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Software engineering for privacy in-the-large

    Anthonysamy, P. & Rashid, A., 2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ). IEEE Press, p. 947-948 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Supply chain resilience: definition, review and theoretical foundations for further study

    Tukamuhabwa Rwakira, B., Stevenson, M., Busby, J. & Zorzini, M., 2015, In: International Journal of Production Research. 53, 18, p. 5592-5623 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In: International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  26. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top