Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    A systematic review of the comorbidity between PTSD and alcohol misuse

    Debell, F., Fear, N., Head, M., Batt-Rawden, S., Greenberg, N., Wessely, S. & Goodwin, L., 30/09/2014, In: Social Psychiatry and Psychiatric Epidemiology. 49, 9, p. 1401-1425 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    5G communications: race for more capacity triggers LTE in unlicensed band

    Al-Dulaimi, A., Al-Rubaye, S., Ni, Q. & Sousa, E., 24/09/2014, 33rd Wireless World Research Forum Proceedings. Guildford, Surrey: WWRF, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Semiconductor devices for quantum technologies

    Young, R., 22/09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  6. Published

    Fault-tolerant dynamic deduplication for utility computing

    Leesakul, W., Townend, P. & Garraghan, P., 18/09/2014, 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing. IEEE, p. 397-404 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Socio-technical security analysis of Industrial Control Systems (ICS)

    Green, B., Prince, D., Roedig, U., Busby, J. & Hutchison, D., 11/09/2014, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. Janicke, H. (ed.). Swindon: BCS Learning and Development Limited, p. 10-14 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Data density based clustering

    Hyde, R. & Angelov, P., 8/09/2014, Computational Intelligence (UKCI), 2014 14th UK Workshop on. IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Estimating packet reception rate in noisy environments

    Brown, J., Roedig, U., Boano, C. A. & Roemer, K., 8/09/2014, Proceedings of the 39rd IEEE Conference on Local Computer Networks, 2014. LCN 2014. IEEE, p. 583-591 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  11. Published

    Model-driven engineering practices in industry: social, organizational and managerial factors that lead to success or failure

    Hutchinson, J., Whittle, J. & Rouncefield, M., 1/09/2014, In: Science of Computer Programming. 89, Part B, p. 144-161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A Service-Indepenent Model for Linking Online User Profile Information

    Edwards, M. J., Rashid, A. & Rayson, P., 09/2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    AMAB: automated measurement and analysis of body motion

    Poppe, R., Van der Zee, S., Heylen, D. & Taylor, P. J., 09/2014, In: Behavior Research Methods. 46, 3, p. 625-633 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Dataset on usage of a live & VoD P2P IPTV service

    Elkhatib, Y., Mu, M. & Race, N., 09/2014, 14th IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Fast design method for THz backward wave amplifiers

    Paoloni, C., David, J.-F., Durand, A. & Mineo, M., 09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  16. Published

    Organizational sensemaking about risk controls: the case of offshore hydrocarbons production

    Busby, J. & Collins, A., 09/2014, In: Risk Analysis. 34, 9, p. 1738-1752 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    W-band PARC klystron

    Paoloni, C., 09/2014, 7th European/UK-China Workshop on Millimeter Waves and Terahertz Technologies (UCMMT 2014).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Sexual and general offending trajectories of men referred for civil commitment

    Francis, B., Harris, D., Wallace, S., Soothill, K. & Knight, R., 31/08/2014, In: Sexual Abuse. 26, 4, p. 311-329 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Practical use of formal verification for safety critical cyber-physical systems: A case study

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 25/08/2014, 2014 IEEE International Conference on Cyber-Physical Systems, Networks, and Applications. IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Ready, aim, click: we need new laws to govern cyberwarfare

    Chatterjee, B. B., 21/08/2014, The Conversation.

    Research output: Other contribution

  23. Published

    Ready, aim, click – digital weapons of destruction

    Chatterjee, B. B., 21/08/2014

    Research output: Other contribution

  24. Published

    Unmanned weapons systems and just wars: the psychological dimensions

    Power, N., Alison, L. & Ralph, J., 18/08/2014, Precision strike warfare and international intervention: strategic, ethico-legal and decisional implications. Aaronson, M., Aslam, W., Dyson, T. & Rauxloh, R. (eds.). London: Routledge, p. 188-205 18 p. (Routledge Global Security Studies).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Constructing schedules for time-critical data delivery in wireless sensor networks

    Pöttner, W.-B., Seidel, H., Brown, J., Roedig, U. & Wolf, L., 15/08/2014, In: ACM Transactions on Sensor Networks. 10, 3, 31 p., 44.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    DEC: dynamically evolving clustering autonomous and its application to structure

    Dutta Baruah, R. & Angelov, P., 14/08/2014, In: IEEE Transactions on Cybernetics. 44, 9, p. 1619-1631 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top