Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2018
  2. Published

    Reintroducing Friendship to International Relations: Relational Ontologies from China to the West

    Nordin, A. H. M. & Smith, G. M., 1/09/2018, In: International Relations of the Asia Pacific. 18, 3, p. 369-396 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    From preparedness to risk: from the singular risk of nuclear war to the plurality of all hazards

    Deville, J. & Guggenheim, M., 09/2018, In: British Journal of Sociology. 69, 3, p. 799-824 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

    Kontogianni, F., Hope, L., Vrij, A., Taylor, P. J. & Gabbert, F., 09/2018, In: Journal of Applied Research in Memory and Cognition. 7, 3, p. 454-461 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    The first direct replication on using verbal credibility assessment for the detection of deceptive intentions

    Kleinberg, B., Warmelink, L., Arntz, A. & Verschuere, B., 09/2018, In: Applied Cognitive Psychology. 32, 5, p. 592-599 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Code cleaning for software defect prediction: A cautionary tale

    Shippey, T., Bowes, D., Counsell, S. & Hall, T., 29/08/2018, 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE, p. 239-243 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Giving a voice through design: adapting design methods to enhance the participation of people with communication difficulties

    McNaney , R., Wilson, C., Wallace, J., Brereton, M., Roper, A., Wilson, S. & Sturdee, M., 20/08/2018, PDC '18 Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2. New York: ACM, Vol. 2. 3 p. 40

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top