Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    The role of the privacy impact assessment in IT innovation in crises: an example

    Easton, C. & Buscher, M., 2015, The 12th International Conference on Information Systems for Crisis Response and Management. Palen, L., Buscher, M., Comes, T. & Hughes, A. (eds.). ISCRAM, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    THz Wakefield radiation generation via dielectric Bragg waveguide

    Sharples, E. & Letizia, R., 2015, Advanced Electromagnetic Materials in Microwaves and Optics (METAMATERIALS), 2015 9th International Congress on. IEEE, p. 289-291 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Time for a Change: Examining Temporality in Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 2015, 11 p.

    Research output: Book/Report/ProceedingsOther report

  5. Published

    Towards implicit contextual integrity

    Criado, N. & Such, J. M., 2015, The Second International Workshop on Agents and CyberSecurity (ACySE). p. 23-26 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Vickrey-clarke-groves (vcg) auctions

    Caminati, M., Kerber, M., Lange, C. & Rowat, C., 2015, In: College Inf. Sci. Technol., Pennsylvania State Univ., State College, PA, USA.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    What can we learn about immediate memory from the development of children's free recall?

    Jarrold, C., Hall, D., Harvey, C. E., Tam, H., Towse, J. N. & Zarandi, A. L., 2015, In: The Quarterly Journal of Experimental Psychology . 68, 9, p. 1871-1894 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    When are capital structure decisions nonseparable from production planning? the case of generalized royalty-based hybrid finance

    Kaivanto, K. & Zinober, A., 2015, Lancaster: Lancaster University, Department of Economics, 13 p. (Economics working paper series).

    Research output: Working paper

  11. 2014
  12. Published

    Mainstreaming domestic and gender-based violence into sociology and the criminology of violence

    Walby, S., Towers, J. & Francis, B., 18/12/2014, In: The Sociological Review. 62, S2, p. 187–214 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Autonomous or 'driverless' cars and disability: a legal and ethical analysis

    Bradshaw-Martin, H. & Easton, C., 15/12/2014, In: Web Journal of Current Legal Issues. 20, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Welfare that works? the Universal Credit information technology system and disabled people

    Easton, C., 15/12/2014, In: Web Journal of Current Legal Issues. 20, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  16. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A fast interpolation approach for the calculation of permittivity and conductivity to estimate the SAR

    Priyadarshi, S., Pitman, S., Glover, P., Shah, S., Ye, J., Hu, B. & Letizia, R., 8/12/2014, RF and Wireless Technologies for Biomedical and Healthcare Applications (IMWS-Bio), 2014 IEEE MTT-S International Microwave Workshop Series on. IEEE, p. 261-266 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Editorial message: CrossCloud Brokers 2014

    Elkhatib, Y. & Walraven, S., 8/12/2014, CrossCloud Brokers 2014: proceedings of the 2nd International Workshop on Cross-Cloud Systems . New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Event pattern discovery on IDS traces of cloud services

    Huang, S.-Y., Huang, Y. & Suri, N., 3/12/2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. IEEE, p. 25-32 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    An investigation towards real time dose rate monitoring, and fuel rod detection in a First Generation Magnox Storage Pond (FGMSP)

    Jackson, S., Monk, S. & Riaz, Z., 12/2014, In: Applied Radiation and Isotopes. 94, p. 254-259 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Compact backward wave oscillators for THz imaging systems

    Paoloni, C., Yue, L., Tang, X., Zhang, F., Popovic, B., Himes, L., Barchfeld, R., Gamzina, D., Letizia, R., Mineo, M. & Luhmann Jr., N. C., 12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  25. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  26. Published

    Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols

    Ghamari, M., Momahed Heravi, B., Roedig, U. & Honary, B., 12/2014, In: IET Networks. 3, 4, p. 284-292 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top