Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2018
  2. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  3. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  4. Published

    A heuristic for maximising energy efficiency in OFDMA systems with QoS constraints

    Letchford, A. N., Ni, Q. & Zhong, Z., 1/07/2018, Combinatorial Optimization: 5th International Symposium. Lee, J., Rinaldi, G. & Mahjoub, A. R. (eds.). Springer, p. 303-312 10 p. (Lecture Notes in Computer Science; vol. 10856).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  5. Published

    Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach

    Xu, P., Wang, L., Guan, Z., Zheng, X., Chen, X., Tang, Z., Fang, D., Gong, X. & Wang, Z., 1/07/2018, p. 1050-1056. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    A Video-based Attack for Android Pattern Lock

    Ye, G., Tang, Z., Fang, D., Chen, X., Wolff, W., Aviv, A. & Wang, Z., 07/2018, In: ACM Transactions on Privacy and Security. 21, 4, 31 p., 19.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Can you detect early dementia from an email? A proof of principle study of daily computer use to detect cognitive and functional decline

    Stringer, G., Couth, S., Brown, L. J. E., Montaldi, D., Gledson, A., Mellor, J., Sutcliffe, A., Sawyer, P., Keane, J., Bull, C., Zeng, X., Rayson, P. & Leroi, I., 07/2018, In: International Journal of Geriatric Psychiatry. 33, 7, p. 867-874 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  9. Published

    DISCO: Interference-Aware Distributed Cooperation with Incentive Mechanism for 5G Heterogeneous Ultra-Dense Networks

    Yang, C., Xiao, J., Li, J., Shao, X., Anpalagan, A., Ni, Q. & Guizani, M., 07/2018, In: IEEE Communications Magazine. 56, 7, p. 198-204 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Safe space: Examining the effect of interview location on self-disclosure

    Winters, C., Taylor, P. J. & Luther, K., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  11. Published

    Secure MISO-NOMA Transmission With Artificial Noise

    Lv, L., Ding, Z., Ni, Q. & Chen, J., 07/2018, In: IEEE Transactions on Vehicular Technology. 67, 7, p. 6700-6705 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top