Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    AlGaAs/GaAs/AlGaAs quantum wells as a sensitive tool for the MOVPE reactor environment

    Dimastrodonato, V., Mereni, L. O., Young, R. J. & Pelucchi, E., 15/10/2010, In: Journal of Crystal Growth. 312, 21, p. 3057-3062 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Algorithms for Real-Time Clustering and Generation of Rules from Data

    Filev, D. & Angelov, P., 2007, Advances in Fuzzy Clustering and Its Applications. de Oliveira, J. V. & Pedrycz, W. (eds.). Chichester: John Willey and Sons, p. 353-370 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    ALMA for evolving systems

    Angelov, P., 8/06/2012, 12th NCEI, Auckland, New Zealand. Auckland

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNAbstract

  5. Published

    AMAB: automated measurement and analysis of body motion

    Poppe, R., Van der Zee, S., Heylen, D. & Taylor, P. J., 09/2014, In: Behavior Research Methods. 46, 3, p. 625-633 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    An adaptive medium access control scheme for mobile ad hoc networks under self-similar traffic

    Abu-Tair, M., Min, G., Ni, Q. & Liu, H., 2010, In: Journal of Supercomputing. 53, 1, p. 212-230 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi–Sugeno fuzzy systems

    Angelov, P., Sadeghi-Tehran, P. & Ramezani, R., 03/2011, In: International Journal of Intelligent Systems. 26, 3, p. 189-205 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    An Approach to Autonomous Self-localization of a Mobile Robot in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier

    Zhou, X. & Angelov, P., 2/04/2007, Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on. IEEE, p. 131-138 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    An effective ant-colony based routing algorithm for mobile ad-hoc network

    Liu, Y., Zhang, H., Ni, Q., Zhou, Z. & Zhu, G., 05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 100-103 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    An Empirical Characterisation of Electronic Document Navigation

    Alexander, J. & Cockburn, A., 2008, Proceedings of Graphics Interface 2008. Toronto, Ont., Canada, Canada: Canadian Information Processing Society, p. 123-130 8 p. (GI '08).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    An empirical investigation of gaze selection in mid-air gestural 3D manipulation

    Velloso, E., Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 315-330 16 p. (Lecture Notes in Computer Science ; vol. 9297).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    'An error is feedback’: the experience of communication error management in crisis negotiations

    Oostinga, M., Giebels, E. & Taylor, P. J., 01/2018, In: Police Practice and Research. 19, 1, p. 17-30 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    An evolving approach to unsupervised and Real-Time fault detection in industrial processes

    Gomes Bezerra, C., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 30/11/2016, In: Expert Systems with Applications. 63, p. 134-144 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    An evolving graph-based reliable routing scheme for VANETs

    Eiza, M. H. & Ni, Q., 05/2013, In: IEEE Transactions on Vehicular Technology. 62, 4, p. 1493-1504 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    An evolving machine learning method for human activity recognition systems

    Andreu, J. & Angelov, P., 2013, In: Journal of Ambient Intelligence and Humanized Computing. 4, 2, p. 195-206 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2007, Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on. IEEE, p. 267-271 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    An Exploratory Study of Information Retrieval Techniques in Domain Analysis

    Alves, V., Schwanninger, C., Barbosa, L., Rashid, A., Sawyer, P., Rayson, P., Pohl, C. & Rummler, A., 2008, 12th International Software Product Line Conference, 2008. SPLC '08. . IEEE Publishing, p. 67-76 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    An extended theory of planned behaviour model of the psychological factors affecting commuters’ transport mode choice

    Donald, I., Cooper, S. & Conchie, S., 12/2014, In: Journal of Environmental Psychology. 40, p. 39-48 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Previous 1...4 5 6 7 8 9 10 11 ...65 Next

Back to top