Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2017
  2. Published

    Predicting Collective Action from Micro-Blog Data

    Charitonidis, C., Rashid, A. & Taylor, P. J., 18/03/2017, Prediction and Inference from Social Networks and Social Media. Kawash, J., Agarwal, N. & Özyer, T. (eds.). Springer, Cham, p. 141-170 30 p. (Lecture Notes in Social Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants

    Chan, A., Winter, S., Saissi, H., Pattabiraman, K. & Suri, N., 13/03/2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 184-195 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Changing crime-mix patterns of offending over the life course: a comparative study in England & Wales and the Netherlands.

    Elliott, A., Francis, B. J., Soothill, K. L. & Blokland, A., 6/03/2017, The Routledge Handbook of Life-Course Criminology. Blokland, A. & van der Geest, V. (eds.). London: Routledge, (Routledge International Handbooks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  6. Published

    An improved equivalent circuit model of a four rod deflecting cavity

    Apsimon, R. J. & Burt, G. C., 1/03/2017, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 847, p. 52-60 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Fog Orchestration for Internet of Things Services

    Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J. & Rovatsos, M., 1/03/2017, In: IEEE Internet Computing. 21, 2, p. 16-24 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Gambling harm and crime careers

    May-Chahal, C. A., Humphreys, L. N., Clifton, A. K., Francis, B. J. & Reith, G., 1/03/2017, In: Journal of Gambling Studies. 33, 1, p. 65-84 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Mapping our underlying cognitions and emotions about good environmental behavior: why we fail to act despite our best intentions

    Power, N., Beattie, G. & McGuire, L., 1/03/2017, In: Semiotica. 2017, 215, p. 193-234 42 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top