Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    An intelligent genetic algorithm for PAPR reduction in a multi-carrier CDMA wireless system

    Zhang, Y., Ni, Q., Chen, H. H. & Song, Y., 2008, Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08. International. IEEE, p. 1052-1057 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    An Introduction to the History of Age Estimation in the Living

    Schmeling, A. & Black, S., 30/08/2010, Age Estimation in the Living. Black, S., Payne-James, J. & Aggrawal, A. (eds.). Chichester: WILEY-BLACKWELL, p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    An investigation of the subjective experiences of sex after drug or alcohol intoxication

    Sumnall, H., Riley, S., Conchie, S., Beynon, C. & Cole, J., 2007, In: Journal of Psychopharmacology. 21, 5, p. 525-537 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    AN OPTICAL RETRIEVAL SYSTEM, DATA STORAGE SYSTEM, DATA STORAGE MEDIUM AND METHOD OF OPTICAL RETRIEVAL AND DATA STORAGE

    KABUSHIKI, KAISHA., Yuan, Z., Young, R., Shields, A. J. & Stevenson, R. M., 31/12/2008, IPC No. PCT/GB2008/002236, Patent No. WO/2009/001105

    Research output: Patent

  7. Published

    An overview on fault diagnosis and nature-inspired optimal control of industrial process applications

    Precup, R-E., Angelov, P., Jales Costa, B. S. & Sayed-Mouchaweh, M., 12/2015, In: Computers in Industry. 74, p. 75-94 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    An uniformly stable backpropagation algorithm to train a feedforward neural network

    Rubio, J. D. J., Angelov, P. & García, E., 03/2011, In: IEEE Transactions on Neural Networks. 22, 3, p. 356-366 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    An unsaturated model for request mechanisms in WiMAX

    Ni, Q. & Hu, L., 01/2010, In: IEEE Communications Letters. 14, 1, p. 45-47 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Analysing complicity in risk

    Busby, J. S., 2008, In: Risk Analysis. 28, 6, p. 1571-1582 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 30/06/2021, 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, p. 908-913 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Analysing forensic processes: taking time into account

    Taylor, P., Jacques, K., Giebels, E., Levine, M. & Gendreau, P., 2008, In: Issues in Forensic Psychology. 8, p. 45-57 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Analysing radiative and non-radiative recombination in InAs quantum dots grown on Si substrates for integrated laser applications

    Orchard, J., Woodhead, C., Shutts, S., Wu, J., Sobiesierski, A., Young, R. J., Beanland, R., Liu, H., Smowton, P. & Mowbray, D., 15/03/2016, Proceedings Volume 9758, Quantum Dots and Nanostructures: Growth, Characterization, and Modeling XIII. Huffaker, D. L., Eisele, H. & Dick, K. A. (eds.). SPIE, Vol. 9758. 7 p. 975809. (Proceedings of SPIE).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Analysing the risks of individual and collective intentionality

    Busby, J. S. & Bennett, S. A., 2008, In: Journal of Risk Research. 11, 6, p. 797-819 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

    Sturdee, M. & Alexander, J., 3/01/2018, In: ACM Computing Surveys. 51, 1, p. 2:1-2:32 32 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  18. Published

    Analysis of adaptation law of the robust evolving cloud-based controller

    Andonovski, G., Blazic, S., Angelov, P. P. & Skrjanc, I., 3/12/2015, Proceedings 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Analysis of evolving social network: methods and results from cell phone data set case study

    Dutta Baruah, R. & Angelov, P., 2013, In: International Journal of Social Network Mining. 1, 3-4, p. 254-279 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict

    Prentice, S., Taylor, P. J., Rayson, P., Hoskins, A. & O'Loughlin, B., 03/2011, In: Information Systems Frontiers . 13, 1, p. 61-73 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Anomalous behaviour detection based on heterogeneous data and data fusion

    Mohd Ali, A. & Angelov, P., 05/2018, In: Soft Computing. 22, 10, p. 3187-3201 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Anomaly detection in the cloud using data density

    Shirazi, S. N. U. H., Simpson, S., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 27/06/2016, Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE, p. 616-623 8 p. 7820324. (Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Anthropological measurement of lower limb and foot bones using multi-detector computed tomography

    Robinson, C., Eisma, R., Morgan, B., Jeffery, A., Graham, E. A. M., Black, S. & Rutty, G. N., 11/2008, In: Journal of Forensic Sciences. 53, 6, p. 1289-1295 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Anthropological measurement of the juvenile clavicle using multi-detector computed tomography-affirming reliability

    Brough, A. L., Bennett, J., Morgan, B., Black, S. & Rutty, G. N., 2013, In: Journal of Forensic Sciences. 58, 4, p. 946-951 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Anthropology: bone pathology and antemortem trauma

    Black, S., 4/11/2015, Encyclopedia of Forensic and Legal medicine. Byard, R. W. & Payne-James, J. (eds.). Elsevier, p. 105-113 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  29. Published

    Anticipating bipedalism

    Cunningham, C. A. & Black, S. M., 06/2009, In: Journal of Anatomy. 214, 6, p. 817-829 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Antimonide quantum dot nanostructures for novel photonic device applications

    Krier, A., Carrington, P., Zhuang, Q., Young, R., Hayne, M., Lu, Q., James Asirvatham, J., Wagener, M., Botha, J. R., Koenraad, P. M. & Smakman, E. P., 5/11/2013, The wonder of nanotechnology: quantum optoelectronic devices and applications . SPIE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  33. Published

    AoI-Minimal Online Scheduling for Wireless Powered IoT: A Lyapunov Optimization-based Approach

    Hu, H., Xiong, K., Yang, H-C., Ni, Q., Gao, B., Fan, P. & Letaief, K. B., 1/12/2023, In: IEEE Transactions on Green Communications and Networking. 7, 4, p. 2081-2092

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. E-pub ahead of print

    AoI-minimal Power Adjustment in RF-EH-powered Industrial IoT Networks: A Soft Actor-Critic-Based Method

    Ge, Y., Xiong, K., Wang, Q., Ni, Q., Fan, P. & Letaief, K. B., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Mobile Computing. 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    AoI-Minimal Trajectory Planning and Data Collection in UAV-Assisted Wireless Powered IoT Networks

    Hu, H., Xiong, K., Qu, G., Ni, Q., Fan, P. & Letaief, K. B., 15/01/2021, In: IEEE Internet of Things Journal. 8, 2, p. 1211-1223 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Forthcoming

    Apparatus and method for projecting light through a light dispersive medium

    Young, R. J. & Reid, V. M., 13/11/2015, (Accepted/In press) Priority date 13/11/2015, Priority No. GB1520076.9

    Research output: Patent

  37. Published

    AppIS: Protect Android Apps Against Runtime Repackaging Attacks

    Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D. & Wang, Z., 17/12/2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 25-32 8 p. (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Application of non-orthogonal multiple access in cooperative spectrum-sharing networks over Nakagami-m fading channels

    Lv, L., Ni, Q., Ding, Z. & Chen, J., 06/2017, In: IEEE Transactions on Vehicular Technology. 66, 6, p. 5506-5511 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Application of reinforcement learning for security enhancement in cognitive radio networks

    Ling, M. H., Yau, K. A., Qadir, J., Poh, G. S. & Ni, Q., 12/2015, In: Applied Soft Computing. 37, p. 809-829 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Applications of evolving intelligent systems to oil and gas industry.

    Macias Hernandez, J. & Angelov, P., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 401-422 22 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  42. Published

    Applying the study of religions in the security domain: knowledge, skills and collaboration

    Knott, K., 11/2018, In: Journal of Religious and Political Practice. 4, 3, p. 332-351 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Applying virtual ID

    Black, S. & Hackman, L., 2/09/2010, In: Police Professional. 220, p. 16-18 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    AppMonitor: A Tool for Recording User Actions in Unmodified Windows Applications

    Alexander, J., Cockburn, A. & Lobb, R., 2008, In: Behavior Research Methods. 40, 2, p. 413-421 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Arabic Dialect Identification in the Context of Bivalency and Code-Switching

    El Haj, M., Rayson, P. E. & Aboelezz, M., 9/05/2018, LREC 2018, Eleventh International Conference on Language Resources and Evaluation. Calzolari, N., Choukri, K., Cieri, C., Declerck, T., Goggi, S., Hasida, K., Isahara, H., Maegaard, B., Mariani, J., Mazo, H., Moreno, A., Odijk, J., Piperidis, S. & Tokunaga, T. (eds.). p. 3622-3627 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Architectures of evolving fuzzy rule-based classifiers

    Angelov, P., Zhou, X., Filev, D. & Lughofer, E., 9/10/2007, Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on. IEEE, p. 2050-2055 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Area energy and area spectrum efficiency trade-off in 5G heterogeneous networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on . IEEE, p. 1178-1183 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    ARTOT: Autonomous Real-Time Object detection and Tracking by a moving camera

    Angelov, P., Gude, C., Sadeghi-Tehran, P. & Ivanov, T., 09/2012, Intelligent Systems (IS), 2012 6th IEEE International Conference. IEEE, p. 446-452 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...33 Next

Back to top