Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Would you do that? understanding social acceptance of gestural interfaces

    Montero, C. S., Alexander, J., Marshall, M. T. & Subramanian, S., 2010, Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services. New York, NY, USA: ACM, p. 275-278 4 p. (MobileHCI '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Writing the Vernacular: Transcribing and Tagging the Newcastle Electronic Corpus of Tyneside English

    Beal, J., Corrigan, K., Smith, N. & Rayson, P., 2007, In: Studies in Variation, Contacts and Change in English. 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    WSN Evaluation in Industrial Environments First results and lessons learned

    Pöttner, W-B., Wolf, L., Cecilio, J., Furtado, P., Silva, R., Silva, J. S., Santos, A., Gil, P., Cardoso, A., Zinonos, Z., Ó, J. M. D., McCarthy, B., Brown, J., Roedig, U., O'Donovan, T., Sreenan, C. J., He, Z., Voigt, T. & Jugel, A., 1/06/2011, Proceedings of the 3rd International Workshop on Performance Control in Wireless Sensor Networks (PWSN/DCOSS 2011).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

    Ye, G., Tang, Z., Fang, D., Zhu, Z., Feng, Y., Xu, P., Chen, X. & Wang, Z., 15/10/2018, 25th ACM Conference on Computer and Communications Security (CCS). New York: ACM, p. 332-348 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    You cannot hide your telephone lies: providing a model statement as an aid to detect deception in insurance telephone calls

    Leal, S., Vrij, A., Warmelink, L., Vernham, Z. & Fisher, R. P., 02/2015, In: Legal and Criminological Psychology. 20, 1, p. 129-146 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...158 159 160 161 162 Next

Back to top