Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    Introducing a framework for scalable dynamic process discovery

    Redlich, D., Gilani, W., Molka, T., Drobek, M., Rashid, A. & Blair, G. S., 2014, Advances in Enterprise Engineering VIII : 4th Enterprise Engineering Working Conference, EEWC 2014, Funchal, Madeira Island, Portugal, May 5-8, 2014. Proceedings. Aveiro, D., Tribolet, J. & Gouveia, D. (eds.). Springer, p. 151-166 16 p. (Lecture Notes in Business Information Processing; vol. 174).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Language independent evaluation of translation style and consistency: comparing human and machine translations of Camus’ novel “The Stranger”

    El-Haj, M., Rayson, P. & Hall, D., 2014, Text, speech and dialogue: 17th International Conference, TSD 2014, Brno, Czech Republic, September 8-12, 2014. Proceedings. Sojka, P., Horák, A., Kopecek, I. & Pala, K. (eds.). Springer International Publishing, p. 116-124 9 p. (Lecture Notes in Computer Science; vol. 8655).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Management patterns for network resilience: design and verification of policy configurations

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 2014, Cyberpatterns: unifying design patterns with security and attack patterns. Switzerland: Springer International Publishing, Vol. 3. p. 85-95 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Metaphor, popular science and semantic tagging: distant reading with the Historical Thesaurus of English

    Alexander, M., Anderson, J., Dallachy, F., Kay, C., Piao, S. & Rayson, P., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    Multipath dissemination for collaborative mobile internet access

    Withnell, R. & Edwards, C., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Published

    Non-retroactivity, candour and ‘transitional relativism’: a response to the ECtHR judgment in Maktouf and Damjanović v. Bosnia and Herzegovina

    Sweeney, J., 2014, In: Diritti umani e diritto internazionale. 8, 3, p. 607-622 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Obscene conversations, the internet and the criminal law

    Gillespie, A., 2014, In: Criminal Law Review. 2014, p. 350-363 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Paying with plastic: the enduring presence of the credit card

    Deville, J., 2014, Accumulation: the material politics of plastic. Gabrys, J., Hawkins, G. & Michael, M. (eds.). London: Routledge, (CRESC Culture Economy and the Social).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    Quantum information system

    Stevenson, R. (Inventor), Bennett, A. (Inventor), Young, R. (Inventor) & Shields, A. J. (Inventor), 2014, Patent No. 8670672, Priority date 11/03/2014, Priority No. 12/834,926

    Research output: Patent

  11. Published

    Radical exoticism: Baudrillard and war

    Nordin, A., 2014, In: The International Journal of Baudrillard Studies. 11, 2

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Research challenges for business process models at run-time

    Redlich, D., Blair, G. S., Rashid, A., Molka, T. & Gilani, W., 2014, Models@run.time: foundations, applications, and roadmaps. Bencomo, N., France, R., Cheng, B. H. C. & Assmann, U. (eds.). Springer, p. 208-236 29 p. (Lecture Notes in Computer Science; vol. 8378).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Safeguarding cyborg childhoods: incorporating the on/offline behaviour of children into everyday social work practices

    May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P. & Greenwood, P., 2014, In: British Journal of Social Work. 44, 3, p. 596-614 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    SARIVA: Smartphone App for Real-time Intelligent Video Analytics

    Clarke, C., Angelov, P., Sadeghi Tehran, P. & Yusuf, M., 2014, In: Journal of Automation, Mobile Robotics and Intelligent Systems. 8, 4, p. 15-19 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Scalable dynamic business process discovery with the constructs competition miner

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014.. Accorsi, R., Ceravolo, P. & Russo, B. (eds.). p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  17. Published

    Subverting official language and discourse in China? type river crab for harmony

    Nordin, A. & Richaud, L., 2014, In: China Information. 28, 1, p. 47-67 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    The Cumbria spree killing: how mobility affects the policing of critical incidents

    Kirby, S., Graham, J. & Green, M., 2014, In: International Journal of Emergency Services. 3, 1, p. 34-48 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    The decline in the rate of domestic violence has stopped: removing the cap on repeat victimisation reveals more violence

    Walby, S., Towers, J. & Francis, B., 2014, Lancaster: Lancaster University. 4 p.

    Research output: Book/Report/ProceedingsOther report

  20. Published

    The digital divide, inclusion and access for disabled people in IT supported emergency response systems: a UK and EU-based analysis

    Easton, C., 2014, Proceedings 11th International Conference on Information Systems for Crisis Response and Management. p. 275-278 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  22. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    Trustworthy by design

    Knowles, B., Harding, M., Blair, L., Davies, N., Hannon, J., Rouncefield, M. & Walden, J., 2014, CSCW '14 Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. New York: ACM, p. 1060-1071 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Visceral emotions, within-community communication, and (ill-judged) endorsement of financial propositions

    Kaivanto, K., 2014, Lancaster: Lancaster University, Department of Economics, (Economics Working Paper Series; vol. 2014, no. 25).

    Research output: Working paper

Back to top