Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2018
  2. Published

    Decision-making in intensive care medicine - a review

    James, F. R., Power, N. & Laha, S., 1/08/2018, In: Journal of the Intensive Care Society. 19, 3, p. 247-258 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A Fuel-Payload Ratio Based Flight-Segmentation Benchmark

    Kaivanto, K. K. & Zhang, P., 08/2018, In: Transportation Research Part D: Transport and Environment. 63, p. 548–559 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Computationally Intelligent Techniques for Resource Management in MmWave Small Cell Networks

    Munir, H., Pervaiz, H., Hassan, S. A., Musavian, L., Ni, Q., Imran, M. A. & Tafazolli, R., 08/2018, In: IEEE Wireless Communications. 25, 4, p. 32-39 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Formalization and Automation of Quality Assurance Processes in Radiation Oncology

    Munbodh, R., Zaveri, H., Caminati, M. B. & Bowles, J., 31/07/2018, University of St Andrews.

    Research output: Other contribution

  6. Published

    Youth mobility scheme after Brexit won’t fill gaps left by end to free movement

    Consterdine, E., 16/07/2018

    Research output: Exhibits, objects and web-based outputsBlog

  7. Published

    Britain’s Brexit plan revealed: experts react

    Consterdine, E., 12/07/2018

    Research output: Exhibits, objects and web-based outputsBlog

  8. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  9. Published

    Message from the Chairs EuroSandP Workshops

    Weir, C. & Fahl, S., 6/07/2018, Proceedings of IEEE European Symposium on Security and Privacy (EuroS&P) 2018. IEEE, p. x 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation

    Saeed, A., Garraghan, P., Craggs, B., van der Linden, D., Rashid, A. & Asad Hussain, S., 2/07/2018, 2018 IEEE International Conference on Cloud Computing (CLOUD). IEEE, p. 606-613 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    ROSE: Cluster Resource Scheduling via Speculative Over-subscription

    Sun, X., Hu, C., Yang, R., Garraghan, P., Wo, T., Xu, J., Zhu, J. & Li, C., 2/07/2018, 38th IEEE International Conference on Distributed Systems Computing Systems. IEEE, p. 949-960 12 p. (2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top