Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2017
  2. Published

    Siren: a platform for deployment of VNFs in distributed infrastructures

    Fawcett, L. & Race, N. J. P., 3/04/2017, SOSR '17 Proceedings of the Symposium on SDN Research. New York: ACM, p. 201-202 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Cybernetics of the mind: learning individual's perceptions autonomously

    Angelov, P. P., Gu, X., Iglesias, J., Ledezma, A., Sanchis, A., Sipele, O. & Ramezani, R., 04/2017, In: IEEE Systems, Man, and Cybernetics Magazine. 3, 2, p. 6-17 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Reordering Webpage Objects for Optimizing Quality-of-Experience

    Li, W., Zhao, Z., Min, G., Duan, H., Ni, Q. & Zhao, Z., 29/03/2017, In: IEEE Access. 5, p. 6626-6635 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    ALEA: a fine-grained energy profiling tool

    Mukhanov, L., Petoumenos, P., Wang, Z., Parasyris, N., Nikolopoulos, D. S., R. de Supinski, B. & Leather, H., 1/03/2017, In: ACM Transactions on Architecture and Code Optimization. 14, 1, 25 p., 1.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    The online use of Violence and Journey metaphors by patients with cancer, as compared with health professionals: a mixed methods study

    Semino, E., Demjen, Z., Demmen, J., Koller, V., Payne, S., Hardie, A. & Rayson, P., 1/03/2017, In: BMJ Supportive and Palliative Care. 7, 1, p. 60-66 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Fully online clustering of evolving data streams into arbitrarily shaped clusters

    Hyde, R., Angelov, P. & MacKenzie, A. R., 03/2017, In: Information Sciences. 382-383, p. 96-114 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top