Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2013
  2. Published

    Simulation and evaluation of network resilience with PReSET

    Schaeffer-Filho, A., Mauthe, A., Hutchison, D., Smith, P., Yu, Y. & Fry, M., 1/05/2013, Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. Piscataway, N.J.: IEEE, p. 1086-1087 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Age estimation from radiographic images of the knee

    Hackman, L. & Black, S., 05/2013, In: Journal of Forensic Sciences. 58, 3, p. 732-737 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    An evolving graph-based reliable routing scheme for VANETs

    Eiza, M. H. & Ni, Q., 05/2013, In: IEEE Transactions on Vehicular Technology. 62, 4, p. 1493-1504 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Managing the social amplification of risk: a simulation of interacting actors

    Busby, J. & Onggo, S., 05/2013, In: Journal of the Operational Research Society. 64, 5, p. 638-653 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    The vascular collar of the ilium

    Cunningham, C. A. & Black, S. M., 05/2013, In: Clinical Anatomy. 26, 4, p. 502-508 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Small business cyber security workshop 2013: towards digitally secure business growth

    Prince, D. & King, N., 29/04/2013, Lancaster: Lancaster University. 22 p.

    Research output: Book/Report/ProceedingsOther report

  8. Published

    Defend Your Home! Jamming Unsolicited Messages in the Smart Home

    Brown, J., Bagci, I. E., King, A. & Roedig, U., 19/04/2013, HotWiSec '13 Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy. New York: ACM Press, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Proceedings of the 2013 IEEE Conference on Evolving and Adaptive Intelligent Systems

    Angelov, P. (Editor), Kasabov, N. (Editor) & Filev, D. (Editor), 04/2013, IEEE. 120 p.

    Research output: Book/Report/ProceedingsProceedings

  10. Published

    Towards generic human activity recognition for ubiquitous applications

    Andreu, J. & Angelov, P., 04/2013, In: Journal of Ambient Intelligence and Humanized Computing. 4, 2, p. 155-156 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  11. Published

    Transformational leadership, intrinsic motivation and trust: A moderated-mediated model of workplace safety

    Conchie, S., 04/2013, In: Journal of Occupational Health Psychology. 18, 2, p. 198-210 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top