Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    A randomized neural network for data streams

    Pratama, M., Angelov, P. P., Lu, J., Lughofer, E., Seera, M. & Lim, C. P., 19/05/2017, Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). USA: IEEE, p. 3423-3430 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A Real-time Approach for Novelty Detection and Trajectories Analysis for Anomaly Recognition in Video Surveillance Systems

    Sadeghi-Tehran, P. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on . IEEE, p. 108-113 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A recipe for multilingual semantic analysis

    Rayson, P. E., 19/10/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  6. Published

    A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation

    Tyson, G., Grace, P., Mauthe, A., Blair, G. S., Kaune, S. & Content Network of Excellence (FP6-IST-038423) (Funder), 9/06/2009, Distributed Applications and Interoperable Systems : 9th IFIP WG 6.1 International Conference, DAIS 2009, Lisbon, Portugal, June 9-11, 2009. Proceedings. Senivongse, T. & Oliveira, R. (eds.). Berlin: Springer, p. 30-43 14 p. (Lecture Notes in Computer Science; vol. 5523).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K. A., Qadir, J. & Ni, Q., 1/03/2019, In: IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways

    Eiza, M. H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1578-1585 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A retrospective comparative study of three data modelling techniques in anticoagulation therapy.

    McDonald, S., Angelov, P. & Xydeas, C., 28/05/2008, BMEI 2008. International Conference on BioMedical Engineering and Informatics, 2008.. Sanya, China: IEEE, p. 219-225 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  11. Published

    A route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  12. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In: Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    A scalable user fairness model for adaptive video streaming over SDN-assisted future networks

    Mu, M., Broadbent, M., Farshad, A., Hart, N., Hutchison, D., Ni, Q. & Race, N., 1/08/2016, In: IEEE Journal on Selected Areas in Communications. 34, 8, p. 2168-2184 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

    Kumar, A., Yadav, A. S., Gill, S. S., Pervaiz, H., Ni, Q. & Buyya, R., 30/11/2022, In: Simulation Modelling Practice and Theory. 120, 27 p., 102621.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    A Selective Delayed Channel Access (SDCA) for the high-throughput IEEE 802.11n

    Skordoulis, D., Ni, Q. & C. Zarakovitis, C., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. New York: IEEE, p. 1173-1178 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A Self-Learning Fuzzy Classifier with Feature Selection for Intelligent interrogation of mid-IR spectroscopy data from exfoliative cervical cytology using selflearning classifier eClass.

    Kelly, J. G., Angelov, P. P., Walsh, M. J., Pollock, H. M., Pitt, M. A., Martin-Hirsch, P. L. & Martin, F. L., 2008, In: International Journal of Computational Intelligence Research. 4, 4, p. 392-401 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    A Semi-autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    D'Antonio, S., Romano, S., Simpson, S., Smith, P. & Hutchison, D., 10/2008, Self-Organizing Systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer, p. 230-241 12 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    A Service-Indepenent Model for Linking Online User Profile Information

    Edwards, M. J., Rashid, A. & Rayson, P., 09/2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    A simple fuzzy rule-based system through vector membership and kernel-based granulation.

    Angelov, P. & Yager, R., 9/07/2010, 5th IEEE International Conference Intelligent Systems (IS), 2010 . IEEE, p. 349-354 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    A site-controlled quantum dot system offering both high uniformity and spectral purity

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 1/06/2009, In: Applied Physics Letters. 94, 22, p. - 3 p., 223121.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A spatial analysis of the relationship between theology and religious studies: metaphors of containment and separation, insider and outsider

    Knott, K., 2009, Theology and Religious Studies in Higher Education: Global Perspectives. Bird, D. & Smith, S. G. (eds.). London ; New York: Continuum, p. 117-138 21 p. (Continuum advances in religious studies).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    A survey of mobility in information-centric networks

    Tyson, G., Sastry, N., Cuevas, R., Rimac, I. & Mauthe, A., 1/12/2013, In: Communications of the ACM. 56, 12, p. 90-98 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    A survey of mobility in information-centric networks: challenges and research directions

    Tyson, G., Sastry, N., Rimac, I., Cuevas, R. & Mauthe, A., 2012, NoM '12: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications. New York: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In: IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    A systematic survey of online data mining technology intended for law enforcement

    Edwards, M., Rashid, A. & Rayson, P., 09/2015, In: ACM Computing Surveys. 48, 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    A test of the effectiveness of speaker verification for differentiating between identical twins

    Ariyaeeinia, A., Morrison, C., Malegaonkar, A. & Black, S., 12/2008, In: Science and Justice. 48, 4, p. 182-186 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    A test of the Whitaker scoring system for estimating age from the bones of the foot

    Davies, C., Black, S. M. & Hackman, L., 2013, In: International Journal of Legal Medicine. 127, 2, p. 481-489 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    A time-sensitive historical thesaurus-based semantic tagger for deep semantic annotation

    Piao, S. S., Dallachy, F., Baron, A., Demmen, J. E., Wattam, S., Durkin, P., McCracken, J., Rayson, P. E. & Alexander, M., 11/2017, In: Computer Speech and Language. 46, p. 113-135 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    A trace-driven analysis of caching in content-centric networks

    Tyson, G., Kaune, S., Miles, S., El-khatib, Y., Mauthe, A. & Taweel, A., 07/2012, Computer Communications and Networks (ICCCN), 2012 21st International Conference on . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    A use-based approach for enhancing UCON

    Grompanopoulos, C., Gouglidis, A. & Mavridis, I., 1/12/2013, Security and Trust Management. Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer Verlag, p. 81-96 16 p. (Lecture Notes in Computer Science ; vol. 7783 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    A Utility-based QoS Model for Emerging Multimedia Applications

    Mu, M., Mauthe, A. & Garcia, F., 2009, The Second International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Xplore, p. 521-528 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A Video-based Attack for Android Pattern Lock

    Ye, G., Tang, Z., Fang, D., Chen, X., Wolff, W., Aviv, A. & Wang, Z., 07/2018, In: ACM Transactions on Privacy and Security. 21, 4, 31 p., 19.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    A working memory test battery: Java-based collection of seven working memory tasks

    Stone, J. M. & Towse, J., 5/06/2015, In: Journal of Open Research Software. 3, 9 p., e5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    A workload-aware mapping approach for data-parallel programs

    Grewe, D., Wang, Z. & O'Boyle, M., 2011, HiPEAC '11 Proceedings of the 6th International Conference on High Performance and Embedded Architectures and Compilers. New York: ACM, p. 117-126 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Active learning accelerated automatic heuristic construction for parallel program mapping

    Ogilvie, W., Petoumenos, P., Wang, Z. & Leather, H., 2014, PACT '14 Proceedings of the 23rd international conference on Parallel architectures and compilation. New York: ACM, p. 481-482 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Adaptive bitrate selection: a survey

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 11/2017, In: Communications Surveys and Tutorials, IEEE Communications Society. 19, 4, p. 2985-3014 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Adaptive contention resolution procedure for emerging WiMAX networks

    Delicado, J., Delicado, F. M., Orozco-Barbosa, L. & Ni, Q., 2010, Wireless and Mobile Networking Conference (WMNC), 2010 Third Joint IFIP. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Adaptive Deep Learning Model Selection on Embedded Systems

    Taylor, B., Sanz Marco, V., Wolff, W., Elkhatib, Y. & Wang, Z., 19/06/2018, LCTES 2018 Proceedings of the 19th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems. New York: ACM, p. 31-43 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Adaptive delayed channel access for IEEE 802.11n WLANs

    Skordoulis, D., Ni, Q., Min, G. & Borg, K., 05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 167-171 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Adaptive inferential sensors based on evolving fuzzy models

    Angelov, P. & Kordon, A., 04/2010, In: IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics. 40, 2, p. 529-539 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Adaptive management of cognitive radio networks employing femtocells

    Al-dulaimi, A., Anpalagan, A., Al-rubaye, S. & Ni, Q., 12/2017, In: IEEE Systems Journal. 11, 4, p. 2687-2698 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Adaptive materials: utilising additive manufactured scaffolds to control self-organising material aggregation

    Blaney, A., Alexander, J. M., Dunn, N. S., Richards, D. C., Rennie, A. E. W. & Anwar, J., 12/2015, Proceedings of the 14th Rapid Design, Prototyping and Manufacturing Conference. Rennie, A. & Bibb, R. (eds.). Loughborough: Lancaster University, p. 49-57 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Adaptive medium access control for VoIP services in IEEE 802.11 WLANs

    Abu-tair, M. I., Min, G., Ni, Q. & Liu, H., 1/05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 487-491 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Adaptive monitoring for mobile networks in challenging environments

    Richerzhagen, N., Stingl, D., Mauthe, A. U. & Steinmetz, R., 3/08/2015, Proceedings of 24th International Conference on Computer Communications and Networks, ICCCN 2015. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Adaptive optimization for OpenCL programs on embedded heterogeneous systems

    Taylor, B., Sanz Marco, V. & Wang, Z., 21/06/2017, LCTES 2017 Proceedings of the 18th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems. New York: ACM, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Adaptive Optimization of Sparse Matrix-Vector Multiplication on Emerging Many-Core Architectures

    Chen, S., Fang, J., Chen, D., Xu, C. & Wang, Z., 28/06/2018, The 20th IEEE International Conference on High Performance Computing and Communications (HPCC) . IEEE, p. 649-658 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Adaptive Resilience for Computer Networks

    Ali, A., Hutchison, D., Angelov, P. & Smith, P., 4/10/2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  58. E-pub ahead of print

    Adaptive Web Browsing on Mobile Heterogeneous Multi-cores

    Ren, J., Wang, X., Fang, J., Feng, Y. & Wang, Z., 24/09/2018, (E-pub ahead of print) In: IEEE Computer Architecture Letters. 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Adding Haptic Feedback to Mobile TV

    Alexander, J., Marshall, M. T. & Subramanian, S., 2011, Extended Abstracts of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, p. 1975-1980 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Adding Preemption to TinyOS

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 06/2007, EmNets '07 Proceedings of the 4th workshop on Embedded networked sensors. p. 88-92 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Advances in base- and mobile-station aided cooperative wireless communications: an overview

    Zhang, R., Wang, L., Parr, G., Aliu, O. G., Awoseyila, B., Azarmi, N., Bhatti, S., Bodanese, E., Chen, H., Dianati, M., Dutta, A., Fitch, M., Giridhar, K., Hailes, S., Hari, K. V. S., Imran, M. A., Jagannatham, AK., Karandikar, A., Kawade, S., Ali Khan, M. Z., & 14 othersKompalli, S. C., Langdon, P., Narayanan, B., Mauthe, A., McGeehan, J., Mehta, N., Millet, K., Moessner, K., Rajashekar, R., Ramkumar, B., Ribeiro, V., Vasudevan, K., Hanzo, L. & Bigham, J., 1/03/2013, In: IEEE Vehicular Technology Magazine. 8, 1, p. 57-69 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK

    Angelov, P. P., Shen, Q., Jayne, C. & Gegov, A., 7/09/2016, Springer. 508 p. (Advances in Intelligent Systems and Computing; vol. 513)

    Research output: Book/Report/ProceedingsBook

  63. Published

    Advances in Fourier-transform infrared spectroscopy analysis to characterise chemical-induced alterations in the Syrian hamster embryo assay-towards biomarkers stability

    Trevisan, J., Angelov, P. P., Carmichael, P. L., Scott, A. & Martin, F. L., 11/2012, In: Mutagenesis. 27, 6, p. 792-792 1 p.

    Research output: Contribution to Journal/MagazineMeeting abstractpeer-review

  64. Published
  65. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Age estimation from radiographic images of the knee

    Hackman, L. & Black, S., 05/2013, In: Journal of Forensic Sciences. 58, 3, p. 732-737 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Age estimation in the living: the practitioner's guide

    Black, S. (ed.), Aggrawal, A. (ed.) & Payne-James, J. (ed.), 30/08/2010, Chichester: WILEY-BLACKWELL. 299 p.

    Research output: Book/Report/ProceedingsBook

  68. Published

    Age Estimation in the Living: Osteology and Age Estimation

    Cunningham, C. A. & Black, S. M., 2016, Encyclopedia of Forensic and Legal Medicine. Payne-James, J. & Byard, R. W. (eds.). 2nd ed. Elsevier Inc., p. 79-83 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  69. Published

    Age Estimation in the Living

    Hackman, L. & Black, S., 2016, Encyclopedia of Forensic and Legal Medicine. Elsevier Inc., p. 34-40 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  70. Published

    Age estimation in the living using skeletal maturity of the hand and wrist

    Black, S. M. & Clancy, J. A., 2008, In: Journal of Anatomy. 213, 3, p. 353 1 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Age estimation using foot radiographs from a modern Scottish population

    Hackman, L., Davies, C. M. & Black, S., 01/2013, In: Journal of Forensic Sciences. 58, S1, p. S146-S150 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    Age evaluation from the skeleton

    Hackman, S. L., Black, S. & Buck, A., 2010, Age estimation in the living: The practitioners guide. Black, S., Aggrawal, A. & Payne-James, J. (eds.). Chichester: WILEY-BLACKWELL, p. 202-235 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  73. Published

    Agent-based computational modelling of social risk responses

    Busby, J. S., Onggo, B. S. S. & Liu, Y., 16/06/2016, In: European Journal of Operational Research. 251, 3, p. 1029-1042 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    Aggregation with fragment retransmission for very high-speed WLANs

    Li, T., Ni, Q., Malone, D., Leith, D., Xiao, Y. & Turletti, T., 04/2009, In: IEEE/ACM Transactions on Networking . 17, 2, p. 591-604 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    ALEA: a fine-grained energy profiling tool

    Mukhanov, L., Petoumenos, P., Wang, Z., Parasyris, N., Nikolopoulos, D. S., R. de Supinski, B. & Leather, H., 1/03/2017, In: ACM Transactions on Architecture and Code Optimization. 14, 1, 25 p., 1.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    AlGaAs/GaAs/AlGaAs quantum wells as a sensitive tool for the MOVPE reactor environment

    Dimastrodonato, V., Mereni, L. O., Young, R. J. & Pelucchi, E., 15/10/2010, In: Journal of Crystal Growth. 312, 21, p. 3057-3062 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Algorithms for Real-Time Clustering and Generation of Rules from Data

    Filev, D. & Angelov, P., 2007, Advances in Fuzzy Clustering and Its Applications. de Oliveira, J. V. & Pedrycz, W. (eds.). Chichester: John Willey and Sons, p. 353-370 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  78. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    ALMA for evolving systems

    Angelov, P., 8/06/2012, 12th NCEI, Auckland, New Zealand. Auckland

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNAbstract

  80. Published

    AMAB: automated measurement and analysis of body motion

    Poppe, R., Van der Zee, S., Heylen, D. & Taylor, P. J., 09/2014, In: Behavior Research Methods. 46, 3, p. 625-633 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    An adaptive medium access control scheme for mobile ad hoc networks under self-similar traffic

    Abu-Tair, M., Min, G., Ni, Q. & Liu, H., 2010, In: Journal of Supercomputing. 53, 1, p. 212-230 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi–Sugeno fuzzy systems

    Angelov, P., Sadeghi-Tehran, P. & Ramezani, R., 03/2011, In: International Journal of Intelligent Systems. 26, 3, p. 189-205 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    An Approach to Autonomous Self-localization of a Mobile Robot in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier

    Zhou, X. & Angelov, P., 2/04/2007, Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on. IEEE, p. 131-138 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    An effective ant-colony based routing algorithm for mobile ad-hoc network

    Liu, Y., Zhang, H., Ni, Q., Zhou, Z. & Zhu, G., 05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 100-103 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    An Empirical Characterisation of Electronic Document Navigation

    Alexander, J. & Cockburn, A., 2008, Proceedings of Graphics Interface 2008. Toronto, Ont., Canada, Canada: Canadian Information Processing Society, p. 123-130 8 p. (GI '08).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    An empirical investigation of gaze selection in mid-air gestural 3D manipulation

    Velloso, E., Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 315-330 16 p. (Lecture Notes in Computer Science ; vol. 9297).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    'An error is feedback’: the experience of communication error management in crisis negotiations

    Oostinga, M., Giebels, E. & Taylor, P. J., 01/2018, In: Police Practice and Research. 19, 1, p. 17-30 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    An evolving approach to unsupervised and Real-Time fault detection in industrial processes

    Gomes Bezerra, C., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 30/11/2016, In: Expert Systems with Applications. 63, p. 134-144 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    An evolving graph-based reliable routing scheme for VANETs

    Eiza, M. H. & Ni, Q., 05/2013, In: IEEE Transactions on Vehicular Technology. 62, 4, p. 1493-1504 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    An evolving machine learning method for human activity recognition systems

    Andreu, J. & Angelov, P., 2013, In: Journal of Ambient Intelligence and Humanized Computing. 4, 2, p. 195-206 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2007, Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on. IEEE, p. 267-271 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    An Exploratory Study of Information Retrieval Techniques in Domain Analysis

    Alves, V., Schwanninger, C., Barbosa, L., Rashid, A., Sawyer, P., Rayson, P., Pohl, C. & Rummler, A., 2008, 12th International Software Product Line Conference, 2008. SPLC '08. . IEEE Publishing, p. 67-76 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    An extended theory of planned behaviour model of the psychological factors affecting commuters’ transport mode choice

    Donald, I., Cooper, S. & Conchie, S., 12/2014, In: Journal of Environmental Psychology. 40, p. 39-48 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Previous 1 2 3 4 5 6 7 8 ...17 Next

Back to top