Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2015
  2. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In: International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  4. Published

    The epiphyseal scar: changing perceptions in relation to skeletal age estimation

    Davies, C., Hackman, L. & Black, S., 2015, In: Annals of Human Biology. 42, 4, p. 348-357 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Towards a semantic tagger for analysing contents of Chinese corporate reports

    Piao, S. S., Hu, X. & Rayson, P. E., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    What can we learn about immediate memory from the development of children's free recall?

    Jarrold, C., Hall, D., Harvey, C. E., Tam, H., Towse, J. N. & Zarandi, A. L., 2015, In: The Quarterly Journal of Experimental Psychology . 68, 9, p. 1871-1894 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. 2014
  11. Published

    Biometrics within the SuperIdentity project: A new approach to spanning multiple identity domains

    Guest, R., Miguel-Hurtado, O., Stevenage, S. V., Neil, G. J. & Black, S., 15/12/2014, 2014 International Carnahan Conference on Security Technology (ICCST). Institute of Electrical and Electronics Engineers Inc., p. 152-157 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

Back to top