Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2017
  2. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    People watching: The perception of the relative body proportions of the self and others

    Linkenauger, S. A., R. Kirby, L., McCulloch, K. C. & Longo, M., 07/2017, In: Cortex. 92, p. 1-7 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Statistical CSIT Aided User Scheduling for Broadcast MU-MISO System

    Cao, Q., Sun, Y., Ni, Q., Li, S. & Tan, Z., 07/2017, In: IEEE Transactions on Vehicular Technology. 66, 7, p. 6102-6114 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    The electronic Spanish prisoner: romance frauds on the internet

    Gillespie, A. A., 30/06/2017, In: Journal of Criminal Law. 81, 3, p. 217-231 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Privacy requirements: present and future

    Anthonysamy, P., Rashid, A. & Chitchyan, R., 29/06/2017, Software Engineering: Software Engineering in Society Track (ICSE-SEIS), 2017 IEEE/ACM 39th International Conference on. IEEE, p. 13-22 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A verified algorithm enumerating event structures

    Bowles, J. & Caminati, M. B., 28/06/2017, Intelligent Computer Mathematics. Springer, Vol. 10383.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top