Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    Joint cognition and the role of human agency in random number choices

    Maehara, Y., Saito, S. & Towse, J. N., 1/04/2019, In: Psychological Research. 83, 3, p. 574–589 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Joint cognition: thought contagion and the consequences of cooperation when sharing the task of random sequence generation

    Towse, J. N., Towse, A. S., Saito, S., Maehara, Y. & Miyake, A., 15/03/2016, In: PLoS ONE. 11, 3, 22 p., e0151306.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Joint Channel Parameter Estimation Using Evolutionary Algorithm

    Li, W. & Ni, Q., 2010, Communications (ICC), 2010 IEEE International Conference on. New York: IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Joint Antenna and User Selection for Untrusted Relay Networks

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 9/12/2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. IEEE, 6 p. 8647350

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Jaccard’s heel: are radex models of criminal behaviour falsifiable when derived using Jaccard coefficient?

    Taylor, P., Donald, I. J., Jacques, K. & Conchie, S., 02/2012, In: Legal and Criminological Psychology. 17, 1, p. 41-58 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    It's no riddle, choose the middle: the effect of number of crimes and topographical detail on police officer predictions of serial burglars' home locations.

    Bennell, C., Snook, B., Taylor, P. J. & Corey, S., 1/01/2007, In: Criminal Justice and Behavior. 34, 1, p. 119-132 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Islam: Conversion

    Knott, K., 23/01/2017, 9 p. Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  9. Published

    Islam: the five pillars

    Knott, K., 2016, 8 p. Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  10. Published

    Isis: Protecting Children in Online Social Networks

    Rashid, A., Rayson, P., Greenwood, P., Walkerdine, J., Duquenoy, P., Watson, P., Brennan, M. & Jones, M., 2/06/2009, International Conference Advances in the Analysis of Online Paedophile Activity. Seifi, M. (ed.). Paris: Antipaedo Project, p. 33-38 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Is there an optimal type for high reliability organization? A study of the UK offshore industry

    Busby, J. S., Collins, A. & Miles, R., 2008, ESREL 2008 and 17th SRA-Europe Conference (Valencia) - 2008. N/A: unknown, p. 1251-1258 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Is risk-based regulation feasible? The case of polylbrominated diphenyl ethers (PBDEs)

    MacGillivray, B., Alcock, R. & Busby, J., 02/2011, In: Risk Analysis. 31, 2, p. 266-281 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    IPv6 AS relationships, cliques, and congruence

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 2015, Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings. Mirkovic, J. & Liu, Y. (eds.). Berlin: Springer, p. 111-122 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8995).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    IoT-Driven Automated Object Detection Algorithm for Urban Surveillance Systems in Smart Cities

    Hu, L. & Ni, Q., 1/04/2018, In: IEEE Internet of Things Journal. 5, 2, p. 747-754 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Investigative sense-making in criminal contexts

    Ormerod, T. C., Barrett, E. & Taylor, P. J., 07/2008, Naturalistic decision making and macrocognition. Shraagen, J. M., Militello, L., Ormerod, T. C. & Lipshitz, R. (eds.). London: Ashgate

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  16. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  17. Published

    Investigative psychology

    Donald, I. J. & Taylor, P., 2007, Encyclopedia of law and society: American and global perspectives. Clark, D. S. (ed.). London: Sage

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  18. Published

    Investigation of routing reliability of vehicular ad hoc networks

    Eiza, M., Ni, Q., Owens, T. & Min, G., 1/07/2013, In: EURASIP Journal on Wireless Communications and Networking. 2013, 15 p., 179.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Investigation of bandwidth request mechanisms under point-to-multmipomint mode of WiMAX networks

    Ni, Q., Vinel, A., Xiao, Y., Turlikov, A. & Jiang, T., 2007, In: IEEE Communications Magazine. 45, 5, p. 132-138 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Investigating the use of a dynamic physical bar chart for data exploration and presentation

    Taher, F., Jansen, Y., Woodruff, J., Hardy, J., Hornbaek, K. & Alexander, J., 01/2017, In: IEEE Transactions on Visualization and Computer Graphics. 23, 1, p. 451-460 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach

    Bozorgchenani, A., Zarakovitis, C. C., Chien, S. F., Ni, Q., Gouglidis, A., Mallouli, W. & Lim, H. S., 1/05/2024, In: IEEE Transactions on Network Science and Engineering. 11, 3, p. 3039-3052 14 p., 10415224.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Makaroff, D., Smith, P., Race, N. J. P. & Hutchison, D., 2008, 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. . IEEE, p. 610-616 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Introduction to criminal human dismemberment

    Black, S., Rutty, G., Hainsworth, S. & Thomson, G., 18/05/2017, Criminal Dismemberment: Forensic and Investigative Analysis. Black, S., Rutty, G., Hainsworth, S. V. & Thomson, G. (eds.). Taylor & Francis, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    Introduction: English corpus linguistics - Looking back, moving forward

    Hoffmann, S., Rayson, P. & Leech, G., 1/07/2012, In: Language and Computers. 74, p. 1-4 4 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  25. Published

    Introduction: the DVI casebook, UK incidents

    Mallett, X., Hackman, L. & Black, S., 2011, Disaster Victim Identification: Experience and Practice. Black, S., Sunderland, G., Hackman, L. & Mallett, X. (eds.). Boca Raton, Fla.: CRC Press, (Global perspectives on Disaster Victim Identification).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  26. Published

    Introduction

    Knott, K. & McLoughlin, S., 2010, Diasporas : concepts, intersections, identities. Knott, K. & McLoughlin, S. (eds.). London ; New York: Zed Books, p. 1-16 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  27. Published

    Introducing NextShareMobile, An Interactive Second Screen Application

    Knowles, W., Mu, M., Bamford, W., Race, N. & Needham, C., 2012, MobiSys '12 Proceedings of the 10th international conference on Mobile systems, applications, and services. New York: ACM, p. 489-490 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Interrupting the social amplification of risk process: a case study in collective emissions reduction

    Busby, J. S., Alcock, R. E. & MacGillivray, B. H., 2009, In: Environmental Science and Policy. 12, 3, p. 297-308 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Interrogating the secular: a spatial approach

    Knott, K., 11/2013, Secular and sacred: the Scandinavian case of religion in human rights, law and public space. Wyller, T., van Breemer, R. & Casanova, J. (eds.). Göttingen: Vandenhoeck & Ruprecht, p. 34-55 22 p. (Research in Contemporary Religion ; vol. 15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  30. Published

    Internet traffic classification using energy time-frequency distributions

    Marnerides, A., Pezaros, D., Kim, H.-C. & Hutchison, D., 9/06/2013, 2013 IEEE International Conference on Communications (ICC). IEEE, p. 2513-2518 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Internet traffic characterisation: Third-order statistics & higher-order spectra for precise traffic modelling

    Marnerides, A., Pezaros, D. & Hutchison, D., 7/04/2018, In: Computer Networks. 134, p. 183-201 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Interference-Aware Radio Resource Allocation for 5G Ultra-Reliable Low-Latency Communication

    Malik, H., Alam, M. M., Le Moullec, Y. & Ni, Q., 9/12/2018, 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings. IEEE, 6 p. 8644301

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Interference-aware energy efficiency maximization in 5G ultra-dense networks

    Yang, C., Li, J., Ni, Q., Anpalagan, A. & Guizani, M., 02/2017, In: IEEE Transactions on Communications. 65, 2, p. 728-739 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Interference Avoidance in Cognitive Radio Networks Using Cooperative Localization

    Farooq-i-Azam, M., Ni, Q., Dong, M., Pervaiz, H., Zarakovitis, C. & Alsolami, F., 31/12/2022, In: IEEE Systems Journal. 16, 4, p. 5120-5130 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Inter-cell collaborative spectrum monitoring for cognitive cellular networks in fading environment

    Deepak, G. C., Navaie, K. & Ni, Q., 2015, IEEE International Conference on Communications (ICC), 2015 . IEEE, p. 7498-7503 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Interactions under the desk: a characterisation of foot movements for input in a seated position

    Velloso, E., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part . Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 384-401 18 p. (Lecture Notes in Computer Science; vol. 9296).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  38. Published

    Interaction Patterns in Crisis Negotiations: Persuasive Arguments and Cultural Differences

    Giebels, E. & Taylor, P. J., 01/2009, In: Journal of Applied Psychology. 94, 1, p. 5-19 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Intent-driven Closed-Loop Control and Management Framework for 6G Open RAN

    Zhang, J., Yang, C., Dong, R., Wang, Y., Anpalagan, A., Ni, Q. & Guizani, M., 15/02/2024, In: IEEE Internet of Things Journal. 11, 4, p. 6314-6327 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Intelligent Systems' 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland

    Angelov, P. (Editor), T. Atanassov, K. (Editor), Doukovska, L. (Editor), Hadjiski, M. (Editor), Jotsov, V. (Editor), Kacprzyk, J. (Editor), Kasabov, N. (Editor), Sotirov, S. (Editor), Szmidt, E. (Editor) & Zadrozny, S. (Editor), 2015, Springer. 863 p. (Advances in Intelligent Systems and Computing; vol. 322)

    Research output: Book/Report/ProceedingsProceedings

  41. Published

    Intelligent Multisensor Cooperative Localization Under Cooperative Redundancy Validation

    Yin, L., Ni, Q. & Deng, Z., 30/04/2021, In: IEEE Transactions on Cybernetics. 51, 4, p. 2188-2200 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Intelligent leader follower behaviour for unmanned ground-based vehicles

    Sadeghi Tehran, P., Andreu, J., Angelov, P. & Zhou, X., 2011, In: Journal of Automation, Mobile Robotics and Intelligent Systems. 5, 1, p. 36-47 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Intelligent heuristic construction with active learning

    Ogilvie, W., Wang, Z., Petoumenos, P. & Leather, H., 01/2015, Compilers for Parallel Computing (CPC).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Intelligent energy efficient localization using variable range beacons in industrial wireless sensor networks

    Farooq-I-Azam, M., Ni, Q. & Ansari, E., 12/2016, In: IEEE Transactions on Industrial Informatics. 12, 6, p. 2206-2216 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Intellectuals, international relations and the constant emergency

    Lacy, M., 2011, In: Third World Quarterly. 32, 9, p. 1673-1690 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Integrating profile-driven parallelism detection and machine-learning based mapping

    Wang, Z., Tournavitis, G., Franke, B. & O'Boyle, M., 2014, In: ACM Transactions on Architecture and Code Optimization. 11, 1, 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Integrating corpus linguistics and spatial technologies for the analysis of literature

    Murrieta-Flores, P., Gregory, I., Cooper, D., Donaldson, C., Baron, A., Hardie, A. & Rayson, P., 2013, Corpus Linguistics 2013 Abstracts. Hardie, A. & Love, R. (eds.). UCREL, p. 222-225 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Insider/outsider perspectives

    Knott, K., 2010, The Routledge companion to the study of religion. Hinnells, J. R. (ed.). London ; New York: Routledge

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  49. Published

    Inside, outside and the space in-between: Territories and boundaries in the study of religion

    Knott, K., 2009, Religion on the borders : new challenges in the academic study of religion. Thurfjell, D. & Jackson, P. (eds.). Stockholm: Södertörn University Press, p. 69-101 32 p. (Södertörn studies on religion; vol. 1).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    Inside, outside and the space in-between: Territories and boundaries in the study of religion

    Knott, K., 2008, In: Temenos. 44, 1, p. 41-66 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Innovators of Early Modern English spelling change: Using DICER to investigate spelling variation trends

    Baron, A., Rayson, P. & Archer, D., 2011.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  52. Published

    Information assurance techniques: perceived cost effectiveness

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 07/2016, In: Computers and Security. 60, p. 117-133 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Inferring multilateral peering

    Giotsas, V., Zhou, S., Luckie, M. & Claffy, K., 2013, CoNEXT '13 Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. New York: ACM, p. 247-258 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Unpublished

    Inferring Internet AS Relationships Based on BGP Routing Policies

    Giotsas, V. & Zhou, S., 2011, (Unpublished).

    Research output: Working paperOther

  55. Published

    Inferring complex AS relationships

    Giotsas, V., Luckie, M., Huffaker, B. & Claffy, K., 5/11/2014, IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency

    Al-rubaye, S., Kadhum, E., Ni, Q. & Anpalagan, A., 1/02/2019, In: IEEE Internet of Things Journal. 6, 1, p. 267-277 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Indistinguishable proofs of work or knowledge

    Baldimtsi, F., Kiayias, A., Zacharias, T. & Zhang, B., 4/12/2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Cheon, J. H. & Takagi, T. (eds.). Heidelberg: Springer, p. 902-933 32 p. (Lecture Notes in Computer Science; vol. 10032).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Incremental anomaly identification by adapted SVM method

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 08/2013, International Joint Conference on Neural Networks, IJCNN-2013, Dallas, TX, USA, 3-9 August, 2013. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Increasing the light extraction and longevity of TMDC monolayers using liquid formed micro-lenses

    Woodhead, C., Roberts, J., Noori, Y., Cao, Y., Bernardo Gavito, R., Tovee, P. D., Kozikov, A., Novoselov, K. S. & Young, R. J., 7/12/2016, In: 2D Materials. 4, 1, 8 p., 015032.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Increasing the bit density from a quantum-confinement physically unclonable function

    Shokeir, H., Bernardo Gavito, R., Manuel, R.-O., Granados, D. & Young, R. J., 21/06/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  63. Published

    Increasing quantum light extraction from TMDC's

    Woodhead, C., Young, R. J., Noori, Y., Roberts, J., Cao, Y., Bernardo Gavito, R., Kozikov, A. & Novoselov, K., 22/03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  64. Published

    Increasing Light Absorption and Collection Using Engineered Structures

    Noori, Y., Woodhead, C. S. & Young, R. J., 4/04/2018, Two-dimensional Materials for Photodetector. Nayak, P. K. (ed.). InTech, p. 193-212 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  65. Published

    Increasing Interoperability for Embedding Corpus Annotation Pipelines in Wmatrix and other corpus retrieval tools

    Rayson, P. E., 7/05/2018, 6th Workshop on the Challenges in the Management of Large Corpora: Proceedings of the 11th Edition of the Language Resources and Evaluation Conference - Miyazaki, Japan. Banski, P., Kupietz, M., Biber, H., Breiteneder, E., Clematide, S. & Witt, A. (eds.). p. 33-36 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    In response to the recently published article: Lottering, N., MacGregor, M.D., Barry, M.D., Reynolds, M.S., Gregory, L.S. (2014). Introducing standardized protocols for anthropological measurement of virtual sub-adult crania using computed tomography 2(1): 34–38

    Brough, A. L., Morgan, B., Black, S. M. & Rutty, G. N., 07/2014, In: Journal of Forensic Radiology and Imaging. 2, 3, p. 160 1 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Improving Wireless Sensor Network Resilience with the INTERSECTION Framework

    Tyson, G., Lindsay, A., Simpson, S. & Hutchison, D., 10/05/2010, Mobile Lightweight Wireless Systems : Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Chatzimisios, P., Verikoukis, C., Santamaría, I., Laddomada , M. & Hoffmann, O. (eds.). Berlin: Springer, p. 415-426 12 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 45).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Improving transmission reliability of low-power medium access control protocols using average diversity combining

    Ghamari, M., Heravi, B. M., Roedig, U., Honary, B. & Pickering, C. A., 1/12/2012, In: IET Wireless Sensor Systems. 2, 4, p. 377-384 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Improving the precision of corpus methods: The standardized version of Early Modern English Medical Texts

    Lehto, A., Baron, A., Ratia, M. & Rayson, P., 2010, Early Modern English Medical Texts: Corpus description and studies. Taavitsainen, I. & Pahta, P. (eds.). Amsterdam: John Benjamins, p. 279-289 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  70. Published

    Improving the Energy Efficiency of the MANTIS Kernel

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 01/2007, EWSN'07 Proceedings of the 4th European conference on Wireless sensor networks. p. 261-276 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Improving the discovery of IXP peering links through passive BGP measurements

    Giotsas, V. & Zhou, S., 2013, 2013 Proceedings IEEE INFOCOM . IEEE, p. 3249-3254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  73. Published

    Improving Spark Application Throughput Via Memory Aware Task Co-location: A Mixture of Experts Approach

    Sanz Marco, V., Taylor, B., Porter, B. F. & Wang, Z., 11/12/2017, Middleware '17 Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference. New York: ACM, p. 95-108 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Improving occupational safety: using a trusted information source to communicate about risk

    Conchie, S. & Burns, C., 2009, In: Journal of Risk Research. 12, 1, p. 13-25 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    Improving interactive TV experience using second screen mobile applications

    Mu, M., Knowles, W., Mauthe, A. U., Sani, Y. & Race, N. J. P., 14/12/2015, Proceedings of IEEE International Symposium on Multimedia, ISM 2015. IEEE, p. 373-376 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Improving first order temporal fact extraction with unreliable data

    Luo, B., Feng, Y., Wang, Z. & Zhao, D., 2/12/2016, Natural Language Understanding and Intelligent Applications: 5th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2016, and 24th International Conference on Computer Processing of Oriental Languages, ICCPOL 2016, Kunming, China, December 2–6, 2016, Proceedings. Lin, C.-Y., Xue, N., Zhao, D., Huang, X. & Feng, Y. (eds.). Cham: Springer, p. 251-262 12 p. (Lecture Notes in Computer Science; vol. 10102).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    IMPROVEMENTS RELATING TO THE AUTHENTICATION OF PHYSICAL ENTITIES

    Young, R. J. (Inventor) & Falko, V. (Inventor), 18/01/2018, IPC No. G06K19/10; G06K7/14; G06Q30/00; G07D7/12; B42D25/29, Patent No. US2018018846 (A1) AU2016211063 (A1) CN107810517 (A) EP3251103 (A1) GB2538181 (A) GB2538181 (B) , Priority date 27/01/2015, Priority No. GB20150001342 20150127 ; WO2016GB50164 20160126

    Research output: Patent

  78. Published

    Imprecision and uncertainty in information representation and processing: new tools based on intuitionistic fuzzy sets and generalized nets

    Angelov, P. P. (Editor) & Sotirov, S. (Editor), 01/2016, Springer. 425 p.

    Research output: Book/Report/ProceedingsBook

  79. Published

    Implicit trust and automatic attitude activation

    Burns, C. & Conchie, S., 2015, Handbook of research methods on trust . 2nd ed. UK: Edward Elgar, p. 292-301 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  80. Published

    Implicit trust and automatic attitude activation

    Burns, C. & Conchie, S., 2011, Handbook of research methods on trust. Lyon, F., Möllering, G. & Saunders, M. (eds.). Cheltenham: Edward Elgar

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  81. Published

    Implementation of a MAC protocol for QoS support in wireless sensor networks

    Suriyachai, P., Roedig, U. & Scott, A., 9/03/2009, IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009.. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Implementation of a Deterministic Wireless Sensor Network

    Suriyachai, P., Roedig, U. & Scott, A., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  83. Published

    Implementation and Evaluation of Distance-Based Message Authentication

    Chung, A. & Roedig, U., 11/2010, IEEE 7th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2010 . IEEE, p. 519-524 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Implementation and Evaluation of Combined Positioning and Communciation.

    Alcock, P., Brown, J. & Roedig, U., 12/2010, Real-World Wireless Sensor Networks : 4th International Workshop, REALWSN 2010, Colombo, Sri Lanka, December 16-17, 2010. Proceedings. Marron, P. J., Voigt, T., Corke, P. & Mottola, L. (eds.). Berlin: Springer, p. 126-137 12 p. (Lecture Notes in Computer Science; vol. 6511).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Imperfect quantum materials for applications in information security

    Young, R. J., 17/05/2018, p. 64. 1 p.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  86. Published

    Iliac cortical thickness in the neonate

    Cunningham, C. A. & Black, S. M., 09/2009, In: Journal of Anatomy. 215, 3, p. 364-370 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs

    Skordoulis, D., Ni, Q., Chen, H.-H., Stephens, A. P., Liu, C. & Jamalipour, A., 02/2008, In: IEEE Wireless Communications. 15, 1, p. 40-47 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Ideological Transmission III: Political and Religious Organisations

    Lee, B. J. & Knott, K., 10/09/2018, Lancaster: Centre for Research and Evidence on Security Threats.

    Research output: Book/Report/ProceedingsCommissioned report

  89. Published

    Ideological Transmission II: Peers, Education and Prisons

    Lee, B. J. & Knott, K., 15/11/2017, Lancaster: Centre for Research and Evidence on Security Threats. 51 p.

    Research output: Book/Report/ProceedingsCommissioned report

  90. Published

    Ideological Transmission I: The Family

    Lee, B. J. & Knott, K., 2016, Lancaster: Centre for Research and Evidence on Security Threats. 50 p.

    Research output: Book/Report/ProceedingsCommissioned report

  91. Published

    Ideological Transmission: Mind map

    Knott, K. & Lee, B. J., 30/01/2017, CREST Security Review, 3, p. 30-31 2 p.

    Research output: Contribution to specialist publicationArticle

  92. Published

    Identity and identification

    Black, S., 2015, Forensic science and beyond: Authenticity, Provenance and Assurance Evidence and Case Studies. London: Government Office for Science, p. 64-73 10 p. (Annual Report of the Government Chief Scientific Adviser).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  93. Published

    Identifying Legitimate Clients under Distributed Denial-of-Service Attacks

    Simpson, S., Lindsay, A. & Hutchison, D., 1/09/2010, 4th International Conference on Network and System Security (NSS), 2010 . IEEE, p. 365-370 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published
  95. Published

    Iconic religion in urban space

    Knott, K., Krech, V. & Meyer, B., 2016, In: Material Religion. 12, 2, p. 123-136 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    Hybrid type-I InAs/GaAs and type-II GaSb/GaAs quantum dot structure with enhanced photoluminescence

    Ji, H.-M., Liang, B., Simmonds, P. J., Juang, B.-C., Yang, T., Young, R. J. & Huffaker, D. L., 9/03/2015, In: Applied Physics Letters. 106, 10, 5 p., 103104.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Hybrid 2D Membrane-Nanoparticle Heterostructures via Langmuir-Blodgett Deposition

    Black, A., Roberts, J., Acebron, M., Bernardo Gavito, R., Alsharif, G., J. Urbanos, F., Juarez, B. H., Granados, D., Robinson, B. J., Vázquez De Parga, A. L. & Young, R. J., 13/05/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  98. Published

    H-Unique - In search of uniqueness - harnessing anatomical hand variation

    Williams, B., Gu, X. & Black, S., 14/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  99. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  100. Published

    Human Activity Recognition in Intelligent Home Environments: An Evolving Approach

    Antonio Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 2010, ECAI 2010 - 19th European Conference on Artificial Intelligence. Coelho, H., Studer, R. & Wooldridge, M. (eds.). Amsterdam: IOS Press, p. 1047-1048 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...5 6 7 8 9 10 11 12 ...17 Next

Back to top