Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    Why Transmission?

    Knott, K., 30/01/2017, CREST Security Review, 3, p. 3-4 2 p.

    Research output: Contribution to specialist publicationEditorial

  2. Published

    Windows to the Soul? Deliberate Eye Contact as a Cue to Deceit

    Mann, S., Vrij, A., Leal, S., Granhag, P. A., Warmelink, L. & Forrester, D., 09/2012, In: Journal of Nonverbal Behavior. 36, 3, p. 205-215 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Wireless charging systems for electric vehicles

    Amjad, M., Farooq-i-Azam, M., Ni, Q., Dong, M. & Ansari, E. A., 31/10/2022, In: Renewable and Sustainable Energy Reviews. 167, 21 p., 112730.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Wireless Mesh Networks: Middleware for Network Eccentric and Mobile Applications

    Ishmael, J. & Race, N., 2009, Middleware for Network Eccentric and Mobile Applications. Garbinato, B., Miranda, H. & Rodrigues, L. (eds.). Springer Berlin Heidelberg, p. 149-166 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Wireless Sensor Networks, 6th European Conference, EWSN 2009, Cork, Ireland, February 11-13, 2009. Proceedings

    Sreenan, C. J. (ed.) & Roedig, U. (ed.), 2009, Springer. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  6. Published

    Wireless sensor networks: design for real-life deployment and deployment experiences

    Gaura, E., Roedig, U. & Brusey, J., 2010, In: Measurement Science and Technology. 21, 12, 1 p., 120101.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  7. Published

    With development, list recall includes more chunks, not just larger ones.

    Cowan, N., Hismjatullina, A., AuBuchon, A. M., Saults, J. S., Horton, N., Leadbitter, K. & Towse, J. N., 09/2010, In: Developmental Psychology. 46, 5, p. 1119-1131 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Word frequency and key word statistics in corpus linguistics

    Baron, A., Rayson, P. & Archer, D., 2009, In: Anglistik. 20, 1, p. 41-67 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Working memory as a construct in cognitive science: An illustrious past and a highly promising future

    Saito, S. & Towse, J., 2007, In: Psychologia. 50, p. 69-75 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Working memory as the interface between processing and retention : a developmental perspective

    Towse, J., Hitch, J. G. & Horton, N., 07/2007, Advances in child development and behavior. Kail, R. (ed.). Amsterdam: Elsevier Academic Press, Vol. 35. p. 215-251 37 p. (Advances in child development and behavior; vol. 35).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    World Wide ICS Honeypots: A Study into the Deployment of Conpot Honeypots

    Maesschalck, S., Giotsas, V. & Race, N., 7/12/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  12. Published

    Would you do that? understanding social acceptance of gestural interfaces

    Montero, C. S., Alexander, J., Marshall, M. T. & Subramanian, S., 2010, Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services. New York, NY, USA: ACM, p. 275-278 4 p. (MobileHCI '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Writing the Vernacular: Transcribing and Tagging the Newcastle Electronic Corpus of Tyneside English

    Beal, J., Corrigan, K., Smith, N. & Rayson, P., 2007, In: Studies in Variation, Contacts and Change in English. 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    WSN Evaluation in Industrial Environments First results and lessons learned

    Pöttner, W-B., Wolf, L., Cecilio, J., Furtado, P., Silva, R., Silva, J. S., Santos, A., Gil, P., Cardoso, A., Zinonos, Z., Ó, J. M. D., McCarthy, B., Brown, J., Roedig, U., O'Donovan, T., Sreenan, C. J., He, Z., Voigt, T. & Jugel, A., 1/06/2011, Proceedings of the 3rd International Workshop on Performance Control in Wireless Sensor Networks (PWSN/DCOSS 2011).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

    Ye, G., Tang, Z., Fang, D., Zhu, Z., Feng, Y., Xu, P., Chen, X. & Wang, Z., 15/10/2018, 25th ACM Conference on Computer and Communications Security (CCS). New York: ACM, p. 332-348 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    You cannot hide your telephone lies: providing a model statement as an aid to detect deception in insurance telephone calls

    Leal, S., Vrij, A., Warmelink, L., Vernham, Z. & Fisher, R. P., 02/2015, In: Legal and Criminological Psychology. 20, 1, p. 129-146 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...29 30 31 32 33 Next

Back to top