Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Unpublished

    Experiments in 17th century English: manual and automatic conceptual history

    Pumfrey, S., Rayson, P. & Mariani, J., 2010, (Unpublished). 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Zhang, H. & Wang, Z., 8/08/2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Exploitation of GPUs for the parallelisation of probably parallel legacy code

    Wang, Z., Powell, D., Franke, B. & O'Boyle, M., 2014, Compiler construction: 23rd International Conference, CC 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings. Cohen, A. (ed.). Berlin: Springer Verlag, p. 154-173 20 p. (Lecture Notes in Computer Science ; vol. 8409).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Exploiting a Semantic Annotation Tool for Metaphor Analysis

    Hardie, A., Koller, V., Rayson, P. & Semino, E., 2007.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  5. Published

    Exploiting Binary-level Code Virtualization to Protect Android Applications Against App Repackaging

    He, Z., Ye, G., Yuan, L., Tang, Z., Wang, X., Ren, J., Wang, W., Yang, J., Fang, D. & Wang, Z., 6/06/2019, In: IEEE Access. 7, p. 115062 - 115074 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Exploiting Code Diversity to Enhance Code Virtualization Protection

    Xue, C., Tang, Z., Ye, G., Li, G., Gong, X., Wang, W., Fang, D. & Wang, Z., 11/12/2018, 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 620-627 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Exploiting dynamic scheduling for VM-based code obfuscation

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Xing, T., Ye, G., Zhang, J. & Wang, Z., 23/08/2016, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE, p. 489-496 8 p. (2016 IEEE Trustcom/BigDataSE/I​SPA).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes

    Tang, Z., Zhao, Y., Yang, L., Qi, S., Fang, D., Chen, X., Gong, X. & Wang, Z., 17/01/2017, In: Mobile Information Systems. 2017, 14 p., 1248578.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Exploring Deep Mapping Concepts: Crosthwaite’s Map and West’s Picturesque Stations

    Reinhold, A., Donaldson, C. E., Gregory, I. N. & Rayson, P. E., 14/09/2017, Proceedings of Workshops and Posters at the 13th International Conference on Spatial Information Theory (COSIT 2017). Fogliaroni, P., Ballatore, A. & Clementini, E. (eds.). Cham: Springer, p. 265-273 9 p. (Lecture Notes in Geoinformation and Cartography).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Exploring fine-grained sentiment values in online product reviews

    Teh, P. L., Rayson, P., Pak, I. & Piao, S., 2015, 2015 IEEE Conference on Open Systems. IEEE, p. 114-118 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Exploring interactions with physically dynamic bar charts

    Taher, F., Hardy, J., Karnik, A., Weichel, C., Jansen, Y., Hornbaek, K. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3237-3246 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Exploring the relationship between stride, stature and hand size for forensic assessment

    Guest, R. M., Miguel-Hurtado, O., Stevenage, S. & Black, S., 1/11/2017, In: Journal of Forensic and Legal Medicine. 52, p. 46-55 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Forthcoming

    Exploring the Representation of Cyber-Risk Data Through Sketching

    Miller, T., Sturdee, M. & Prince, D., 22/10/2023, (Accepted/In press). 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  14. Published

    External Skull

    Black, S., 25/09/2015, Gray's Anatomy. Standring, S. (ed.). 41st ed. London: Elsevier, p. 416-428 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    Extracting biological information with computational analysis of Fourier transform infrared (FTIR) biospectroscopy datasets: current practices to future perspectives

    Trevisan, J., Angelov, P., Carmichael, P. L., Scott, A. & Martin, F., 2012, In: Analyst. 137, 14, p. 3202-3215 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Extracting random numbers from quantum tunnelling through a single diode

    Bernardo Gavito, R., Bagci, I. E., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C., Missous, M., Roedig, U. & Young, R. J., 19/12/2017, In: Scientific Reports. 7, 6 p., 17879.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Eye Drop: an interaction concept for gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 2/12/2013, MUM '13 Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Eye pull, eye push: moving objects between large screens and personal devices with gaze and touch

    Turner, J., Alexander, J., Bulling, A., Schmidt, D. & Gellersen, H., 2013, Human-Computer Interaction – INTERACT 2013: 14th IFIP TC 13 International Conference, Cape Town, South Africa, September 2-6, 2013, Proceedings, Part II. Kotzé, P., Marsden, G., Lindgaard, G., Wesson, J. & Winckler, M. (eds.). Berlin: Springer, p. 170-186 17 p. (Lecture Notes in Computer Science; vol. 8118).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Unpublished

    Facilitating functional adaptation in autonomic networks

    Louca, A., Mauthe, A. & Sifalakis, M., 05/2009, (Unpublished) Lancaster University. 20 p.

    Research output: ThesisMaster's Thesis

  20. Published

    Failing to encourage physical activity with wearable technology: what next?

    Ellis, D. A. & Piwek, L., 18/09/2018, In: Journal of the Royal Society of Medicine. 111, 9, p. 310-313 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Fast automatic heuristic construction using active learning

    Ogilvie, W., Petoumenos, P., Wang, Z. & Leather, H., 09/2014, Languages and Compilers for Parallel Computing: 27th International Workshop, LCPC 2014, Hillsboro, OR, USA, September 15-17, 2014, Revised Selected Papers. Brodman, J. & Tu, P. (eds.). Springer, p. 146-160 15 p. (Lecture Notes in Computer Science; vol. 8967).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Fast feedforward non-parametric deep learning network with automatic feature extraction

    Angelov, P. P., Gu, X. & Principe, J., 14/05/2017, p. 534-541. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  24. Published

    Fault diagnosis in DSL networks using support vector machines

    Marnerides, A., Malinowski, S., Morla, R. & Kim, H. S., 15/05/2015, In: Computer Communications. 62, p. 72-84 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Feet movement in desktop 3D interaction

    Simeone, A. L., Velloso, E., Alexander, J. & Gellersen, H., 26/04/2014, 3D User Interfaces (3DUI), 2014 IEEE Symposium on. IEEE, p. 71-74 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Female terrorism: a review

    Jacques, K. & Taylor, P. J., 2009, In: Terrorism and Political Violence. 21, 3, p. 499-515 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Fiction and Physicality: a designerly approach towards complexities of emerging technologies

    Hur, Y., Sturdee, M., Alonso, M. B., Markopoulos, P. & Alexander, J., 28/07/2017, In: The Design Journal. 20, Suppl. 1, p. S3849-S3862 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Fieldwork is good: the study perception and the affect domain

    Boyle, A., Maguire, S., Martin, A., Milsom, C., Nash, R., Rawlinson, S., Wurthmann, S. & Conchie, S., 2007, In: Journal of Geography in Higher Education. 31, 2, p. 299-317 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Figuring out children’s number representations: lessons from cross-cultural work

    Towse, J., Muldoon, K. & Simms, V., 03/2014, Oxford handbook of numerical cognition. Cohen Kadosh, R. & Dowker, A. (eds.). Oxford: Oxford University Press

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  30. Published

    Filter pruning with uniqueness mechanism in the frequency domain for efficient neural networks

    Zhang, S., Gao, M., Ni, Q. & Han, J., 14/04/2023, In: Neurocomputing. 530, p. 116-124 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Fimag: The United Kingdom Disaster Victim/Forensic Identification Imaging System

    Rutty, G. N., Robinson, C., Morgan, B., Black, S., Adams, C. & Webster, P., 11/2009, In: Journal of Forensic Sciences. 54, 6, p. 1438-1442 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks

    Zhang, J., Tang, Z., Li, M., Fang, D., Chen, X. & Wang, Z., 01/2019, In: Computers and Security. 80, p. 273-290 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Finding a voice for numerical cognition

    Towse, J., 29/10/2015, In: Journal of Numerical Cognition. 1, 1, p. 1-6 6 p.

    Research output: Contribution to Journal/MagazineEditorial

  34. Published

    Fine Grained Component Engineering of Adaptive Overlays: Experiences and Perspectives

    Tyson, G., Grace, P., Blair, G. S. & Mauthe, A., 6/07/2009, Lancaster University, 20 p.

    Research output: Working paper

  35. Published

    Flash Crowd Detection within the realms of an Internet Service Provider (ISP)

    Marnerides, A., Pezaros, D. & Hutchison, D., 23/06/2008. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  36. Published

    Forecasting Time-Series for NN GC1 using Evolving Takagi-Sugeno (eTS) Fuzzy Systems with On-line Inputs Selection

    Andreu, J. & Angelov, P., 2010, 2010 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2010). New York: IEEE, p. 1479-1483 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Foreign Currency Exchange Rate Prediction using Neuro-Fuzzy Systems

    Yong, Y. L., Lee, Y., Gu, X., Angelov, P. P., Ling Ngo, D. C. & Shafipour Yourdshahi, E., 1/12/2018, Procedia Computer Science. Elsevier, Vol. 144. p. 232-238 7 p. (Procedia Computer Science; vol. 144).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Forensic anthropology: much more than a pile of old bones

    Black, S. M., 09/2008, In: Journal of Anatomy. 213, 3, p. 344 1 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Forensic anthropology: 2000-2010

    Black, S. (ed.) & Ferguson, E. (ed.), 2011, London: Taylor & Francis. 428 p.

    Research output: Book/Report/ProceedingsBook

  40. Published

    Forensic gait analysis: A primer for courts

    Black, S. (ed.), Wall, M. (ed.), Abboud, R., Baker, R. & Stebbins, J., 11/2017, London: The Royal Society. 33 p. (Primers for Courts)

    Research output: Book/Report/ProceedingsCommissioned report

  41. Published

    Forensic hand image comparison as an aid for paedophile investigations

    Black, S. M., Mallett, X., Rynn, C. & Duffield, N., 2009, In: Police Professional. 184, p. 21-24 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Forensic human identification: an introduction

    Thompson, T. & Black, S. (ed.), 2007, Boca Raton, Fla.: CRC Press. 518 p.

    Research output: Book/Report/ProceedingsBook

  43. Published

    Forensic Identification

    Black, S. & Bikker, J., 6/10/2016, Missing Persons. Greene, K. S. & Alys, L. (eds.). United Kingdom: Routledge, p. 188-199 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  44. Published

    Forensics Software for Detecting Online Paedophile Activity

    Walkerdine, J., Greenwood, P., Rashid, A., Rayson, P., May-Chahal, C., Duquenoy, P., Watson, P., Jones, M. & Brennan, M., 11/2009. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  45. Published

    Foreword to "Using Imperfect Semiconductor Systems for Unique Identification"

    Young, R. J. & Roberts, J. (ed.), 1/12/2017, Using Imperfect Semiconductor Systems for Unique Identification. Cham: Springer, 2 p. (Springer Theses).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  46. Published

    Foreword: Mathematical Cognition, Language, and Culture: Understanding the Links

    Towse, J. N., 9/01/2018, Language and Culture in Mathematical Cognition. Berch, D., Geary, D. & Koepke, K. M. (eds.). Academic Press, p. xv-xix (Mathematical Cognition and Learning; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  47. Published

    Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+

    Gouglidis, A., Grompanopoulos, C. & Mavridou, A., 25/06/2018, Proceedings of the 1st International Workshop on Methods and Tools for Rigorous System Design (MeTRiD 2018). Bliudze, S. & Bensalem, S. (eds.). EPTCS, p. 52-64 13 p. (EPTCS; vol. 272).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    FORTEL: Forecasting routing technique using location information for Mobile Ad hoc networks

    Noureddine, H., Hamed, A. & Ni, Q., 2010, Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), 2010 IEEE 21st International Symposium on. IEEE, p. 473-478 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Framework for the integrated video quality assessment

    Mu, M., Romaniak, P., Mauthe, A., Leszczuk, M., Janowski, L. & Cerqueira, E., 12/2012, In: Multimedia Tools and Applications. 61, 3, p. 787-817 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Framework for the Integrated Video Quality Assessment

    Romaniak, P., Mu, M., Mauthe, A., D'Antonio, S. & Leszczuk, M., 2008, 18th ITC Specialist Seminar on Quality of Experience Proceedings. Fiedler, M., Blouin, F. & Arlos, P. (eds.). Karlskrona: Blekinge Institute of Technology, p. 81-90 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...9 10 11 12 13 14 15 16 ...33 Next

Back to top