Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    Using a keyness metric for single and multi document summarisation

    El-Haj, M. & Rayson, P., 08/2013, Proceedings of the MultiLing 2013 Workshop on Multilingual Multi-document summarization . Sofia, Bulgaria: Association for Computational Linguistics, p. 64-71 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Using a semantic annotation tool for the analysis of metaphor in discourse.

    Koller, V., Hardie, A., Rayson, P. & Semino, E., 2008, In: metaphorik.de. 15, p. 141-160 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Using context switches for VM scaling

    Hadley, J., Roedig, U. & Elkhatib, Y., 9/12/2016. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  6. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In: The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Using Evolving Fuzzy Models to predict Crude Oil Distillation Side Streams

    Macias-Hernandez, J. J., Angelov, P. & Zhou, X., 2011, Computer-Aided Design, Manufacturing, Modeling and Simulation . He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Zurich: Trans-Tech Publications, p. 432-437 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. E-pub ahead of print

    Using J-K-fold Cross Validation to Reduce Variance When Tuning NLP Models

    Moss, H., Leslie, D. S. & Rayson, P. E., 06/2018, (E-pub ahead of print) Proceedings of COLING 2018. Association for Computational Linguistics (ACL Anthology), p. 2978–2989 12 p. (Proceedings of COLING 2018).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Using machine learning to partition streaming programs

    Wang, Z. & O'Boyle, M., 09/2013, In: ACM Transactions on Architecture and Code Optimization. 10, 3, 25 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Using quantum effects in nanomaterials for unique identification

    Young, R. J., Roberts, J. & Speed, P., 5/01/2016, In: SPIE Newsroom. 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Using software defined networking to enhance the delivery of video-on-demand

    Georgopoulos, P., Broadbent, M., Farshad, A., Plattner, B. & Race, N., 15/09/2015, In: Computer Communications. 69, p. 79-87 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Using verifiable author data: Gender and spelling differences in Twitter and SMS

    Baron, A., Tagg, C., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 06/2011. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  14. Published

    Utilising motion capture technology to identify nonverbal indicators of trust judgements

    Watson, S., Conchie, S., Taylor, P. J. & Poppe, R., 23/08/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  15. Published

    Utilising motion capture technology to identify trusted testimony in military encounters

    Watson, S. J., Conchie, S. M., Taylor, P. J. & Poppe, R., 2/11/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  16. Published

    Validating the Sensor Network Calculus by Simulations

    Roedig, U., Gollan, N. & Schmitt, J., 10/2007, WICON '07 Proceedings of the 3rd international conference on Wireless internet. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Vol. 34. 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Valley-free violation in Internet routing: analysis based on BGP Community data

    Giotsas, V. & Zhou, S., 2012, 2012 IEEE International Conference on Communications, ICC 2012. IEEE, p. 1193-1197 5 p. 6363987

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    VARD2: a tool for dealing with spelling variation in historical corpora

    Baron, A. & Rayson, P., 05/2008. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  19. Published

    Variation in working memory due to normal development

    Towse, J. N. & Hitch, J. G., 2007, Variation in working memory. Conway, A., Jarrold, C., Kane, M., Miyake, A. & Towse, J. (eds.). New York: Oxford University Press, p. 109-133 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  20. Published

    Variation in working memory.

    Conway, A. R. A., Jarrold, C., Kane, M. J., Myake, A. & Towse, J. N., 2007, New York: Oxford University Press. 321 p.

    Research output: Book/Report/ProceedingsBook

  21. Published

    Vehicle plate recognition using improved neocognitron neural network

    Kangin, D., Kolev, G. & Angelov, P., 2013, Artificial Neural Networks and Machine Learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 628-640 13 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Vehicle-Driver Communication using Off-The-Shelf Transceivers

    Ghamari, M., Chung, A., Roedig, U., Honary, B. & Pickering, C. A., 09/2010, IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 . IEEE, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Verbal lie detection

    Vrij, A., Taylor, P. J. & Picornell, I., 13/11/2015, Communication in investigative and legal contexts: integrated approaches from forensic psychology, linguistics and law enforcement. Oxburgh, G., Myklebust, T., Grant, T. & Milne, R. (eds.). Wiley, (Psychology of Crime, Policing and Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  24. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  25. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top