Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    A randomized neural network for data streams

    Pratama, M., Angelov, P. P., Lu, J., Lughofer, E., Seera, M. & Lim, C. P., 19/05/2017, Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). USA: IEEE, p. 3423-3430 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A Real-time Approach for Novelty Detection and Trajectories Analysis for Anomaly Recognition in Video Surveillance Systems

    Sadeghi-Tehran, P. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on . IEEE, p. 108-113 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A recipe for multilingual semantic analysis

    Rayson, P. E., 19/10/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  6. Published

    A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation

    Tyson, G., Grace, P., Mauthe, A., Blair, G. S., Kaune, S. & Content Network of Excellence (FP6-IST-038423) (Funder), 9/06/2009, Distributed Applications and Interoperable Systems : 9th IFIP WG 6.1 International Conference, DAIS 2009, Lisbon, Portugal, June 9-11, 2009. Proceedings. Senivongse, T. & Oliveira, R. (eds.). Berlin: Springer, p. 30-43 14 p. (Lecture Notes in Computer Science; vol. 5523).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K. A., Qadir, J. & Ni, Q., 1/03/2019, In: IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways

    Eiza, M. H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1578-1585 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A retrospective comparative study of three data modelling techniques in anticoagulation therapy.

    McDonald, S., Angelov, P. & Xydeas, C., 28/05/2008, BMEI 2008. International Conference on BioMedical Engineering and Informatics, 2008.. Sanya, China: IEEE, p. 219-225 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  11. Published

    A route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  12. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In: Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    A scalable user fairness model for adaptive video streaming over SDN-assisted future networks

    Mu, M., Broadbent, M., Farshad, A., Hart, N., Hutchison, D., Ni, Q. & Race, N., 1/08/2016, In: IEEE Journal on Selected Areas in Communications. 34, 8, p. 2168-2184 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

    Kumar, A., Yadav, A. S., Gill, S. S., Pervaiz, H., Ni, Q. & Buyya, R., 30/11/2022, In: Simulation Modelling Practice and Theory. 120, 27 p., 102621.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    A Selective Delayed Channel Access (SDCA) for the high-throughput IEEE 802.11n

    Skordoulis, D., Ni, Q. & C. Zarakovitis, C., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. New York: IEEE, p. 1173-1178 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A Self-Learning Fuzzy Classifier with Feature Selection for Intelligent interrogation of mid-IR spectroscopy data from exfoliative cervical cytology using selflearning classifier eClass.

    Kelly, J. G., Angelov, P. P., Walsh, M. J., Pollock, H. M., Pitt, M. A., Martin-Hirsch, P. L. & Martin, F. L., 2008, In: International Journal of Computational Intelligence Research. 4, 4, p. 392-401 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    A Semi-autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    D'Antonio, S., Romano, S., Simpson, S., Smith, P. & Hutchison, D., 10/2008, Self-Organizing Systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer, p. 230-241 12 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    A Service-Indepenent Model for Linking Online User Profile Information

    Edwards, M. J., Rashid, A. & Rayson, P., 09/2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    A simple fuzzy rule-based system through vector membership and kernel-based granulation.

    Angelov, P. & Yager, R., 9/07/2010, 5th IEEE International Conference Intelligent Systems (IS), 2010 . IEEE, p. 349-354 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    A site-controlled quantum dot system offering both high uniformity and spectral purity

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 1/06/2009, In: Applied Physics Letters. 94, 22, p. - 3 p., 223121.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A spatial analysis of the relationship between theology and religious studies: metaphors of containment and separation, insider and outsider

    Knott, K., 2009, Theology and Religious Studies in Higher Education: Global Perspectives. Bird, D. & Smith, S. G. (eds.). London ; New York: Continuum, p. 117-138 21 p. (Continuum advances in religious studies).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    A survey of mobility in information-centric networks

    Tyson, G., Sastry, N., Cuevas, R., Rimac, I. & Mauthe, A., 1/12/2013, In: Communications of the ACM. 56, 12, p. 90-98 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    A survey of mobility in information-centric networks: challenges and research directions

    Tyson, G., Sastry, N., Rimac, I., Cuevas, R. & Mauthe, A., 2012, NoM '12: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications. New York: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In: IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    A survey of rural Wireless Mesh Network (WMN) deployments

    Ajayi, A. O., Roedig, U., Edwards, C. & Race, N., 28/08/2014, Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, p. 119-125 7 p. 14664869

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    A systematic survey of online data mining technology intended for law enforcement

    Edwards, M., Rashid, A. & Rayson, P., 09/2015, In: ACM Computing Surveys. 48, 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    A test of the effectiveness of speaker verification for differentiating between identical twins

    Ariyaeeinia, A., Morrison, C., Malegaonkar, A. & Black, S., 12/2008, In: Science and Justice. 48, 4, p. 182-186 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    A test of the Whitaker scoring system for estimating age from the bones of the foot

    Davies, C., Black, S. M. & Hackman, L., 2013, In: International Journal of Legal Medicine. 127, 2, p. 481-489 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    A time-sensitive historical thesaurus-based semantic tagger for deep semantic annotation

    Piao, S. S., Dallachy, F., Baron, A., Demmen, J. E., Wattam, S., Durkin, P., McCracken, J., Rayson, P. E. & Alexander, M., 11/2017, In: Computer Speech and Language. 46, p. 113-135 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    A trace-driven analysis of caching in content-centric networks

    Tyson, G., Kaune, S., Miles, S., El-khatib, Y., Mauthe, A. & Taweel, A., 07/2012, Computer Communications and Networks (ICCCN), 2012 21st International Conference on . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    A use-based approach for enhancing UCON

    Grompanopoulos, C., Gouglidis, A. & Mavridis, I., 1/12/2013, Security and Trust Management. Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer Verlag, p. 81-96 16 p. (Lecture Notes in Computer Science ; vol. 7783 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    A Utility-based QoS Model for Emerging Multimedia Applications

    Mu, M., Mauthe, A. & Garcia, F., 2009, The Second International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Xplore, p. 521-528 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A Video-based Attack for Android Pattern Lock

    Ye, G., Tang, Z., Fang, D., Chen, X., Wolff, W., Aviv, A. & Wang, Z., 07/2018, In: ACM Transactions on Privacy and Security. 21, 4, 31 p., 19.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    A working memory test battery: Java-based collection of seven working memory tasks

    Stone, J. M. & Towse, J., 5/06/2015, In: Journal of Open Research Software. 3, 9 p., e5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    A workload-aware mapping approach for data-parallel programs

    Grewe, D., Wang, Z. & O'Boyle, M., 2011, HiPEAC '11 Proceedings of the 6th International Conference on High Performance and Embedded Architectures and Compilers. New York: ACM, p. 117-126 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Achieving ICS resilience and security through granular data flow management

    Green, B., Krotofil, M. & Hutchison, D., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 93-101 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Active learning accelerated automatic heuristic construction for parallel program mapping

    Ogilvie, W., Petoumenos, P., Wang, Z. & Leather, H., 2014, PACT '14 Proceedings of the 23rd international conference on Parallel architectures and compilation. New York: ACM, p. 481-482 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    ActuEating: Designing, Studying and Exploring Actuating Decorative Artefacts

    Nabil, S., Everitt, A., Sturdee, M. A., Alexander, J. M., Bowen, S., Wright, P. & Kirk, D., 8/06/2018, DIS '18 Proceedings of the 2018 Designing Interactive Systems Conference. New York: ACM, p. 327-339 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Adaptation for the masses: towards decentralised adaptation in large-scale P2P recommenders

    Frey, D., Kermarrec, A-M., Maddock, C., Mauthe, A. & Taïani, F., 10/2014, ARM '14 Proceedings of 13th Workshop on Adaptive and Reflective Middleware. New York: ACM, 6 p. 4

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Adaptive bitrate selection: a survey

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 11/2017, In: Communications Surveys and Tutorials, IEEE Communications Society. 19, 4, p. 2985-3014 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Adaptive contention resolution procedure for emerging WiMAX networks

    Delicado, J., Delicado, F. M., Orozco-Barbosa, L. & Ni, Q., 2010, Wireless and Mobile Networking Conference (WMNC), 2010 Third Joint IFIP. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Adaptive Deep Learning Model Selection on Embedded Systems

    Taylor, B., Sanz Marco, V., Wolff, W., Elkhatib, Y. & Wang, Z., 19/06/2018, LCTES 2018 Proceedings of the 19th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems. New York: ACM, p. 31-43 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Adaptive delayed channel access for IEEE 802.11n WLANs

    Skordoulis, D., Ni, Q., Min, G. & Borg, K., 05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 167-171 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Adaptive inferential sensors based on evolving fuzzy models

    Angelov, P. & Kordon, A., 04/2010, In: IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics. 40, 2, p. 529-539 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...33 Next

Back to top