Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2018
  2. Published

    Performance Analysis of Relaying Systems with Fixed and Energy Harvesting Batteries

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 04/2018, In: IEEE Transactions on Communications. 66, 4, p. 1386-1398 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Defeat Your Enemy Hiding Behind Public WiFi: WiGuard Can Protect Your Sensitive information from CSI-based Attack

    Zhang, J., Tang, Z., Li, M., Chen, X., Fang, D. & Wang, Z., 28/03/2018, In: Applied Sciences. 8, 4, 24 p., 515.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    British Muslims: A History

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  5. Published

    British Muslims: Charities and Organisations

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  6. Published

    British Muslims: Demography and Communities

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  7. Published

    British Muslims: Families and Family Life

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  8. Published

    British Muslims: Gender and Generations

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  9. Published

    British Muslims: Mosques

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  10. Published

    British Muslims: Sectarian Movements

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  11. Published

    Muslims and Islam in the UK: A Research Synthesis

    Knott, K., 26/03/2018, 87 p. Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  12. Published

    Muslims and Islam in the UK: Executive Summary

    Knott, K., 26/03/2018, Lancaster : Centre for Research and Evidence on Security Threats.

    Research output: Other contribution

  13. Published

    Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing

    Chang, L., Li, X., Wang, J., Meng, H., Chen, X., Fang, D., Tang, Z. & Wang, Z., 19/03/2018, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Measuring Short Text Reuse For The Urdu Language

    Sameen, S., Muhammad, S., Nawab, R. M. A., Rayson, P. E. & Muneer, I., 9/03/2018, In: IEEE Access. 6, p. 7412-7421 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Non-attending patients in general practice

    Ellis, D. A., McQueenie, R., McConnachie, A., Wilson, P. & Williamson, A., 5/03/2018, In: Lancet Public Health. 3, 3, 1 p., e113.

    Research output: Contribution to Journal/MagazineComment/debatepeer-review

  17. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    A Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes

    Gu, X., Angelov, P. P., Zhang, C. & Atkinson, P. M., 03/2018, In: IEEE Geoscience and Remote Sensing Letters. 15, 3, p. 345-349 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Parsimonious Random Vector Functional Link Network for Data Streams

    Pratama, M., Angelov, P. P., Lughofer, E. & Joo Er, M., 03/2018, In: Information Sciences. 430-431, p. 519-537 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Predicting fear of crime: Personality outperforms prior victimisation

    Ellis, D. A. & Renouf, K., 03/2018, In: Journal of Forensic Psychiatry and Psychology. 29, 3, p. 403-418 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Special issue of Big Data Research Journal on "Big Data and Neural Networks"

    Angelov, P., Manolopoulos, Y. & Papadopoulos, A., 03/2018, In: Big data research. 11, p. III-IV 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  22. Published

    Large Area Heterostructures from Graphene and Silica Encapsulated Colloidal Quantum Dots via the Langmuir-Blodgett Method

    Black, A., Roberts, J., Acebron, M., Bernardo Gavito, R., Alsharif, G., J. Urbanos, F., Juarez, B. H., Kolosov, O. V., Robinson, B. J., Vázquez De Parga, A. L., Granados, D. & Young, R. J., 28/02/2018, In: ACS Applied Materials and Interfaces. 10, 8, p. 6805-6809 5 p., 10.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Examinations of email fraud susceptibility: Perspectives from academic research and industry practice

    Jones, H. & Towse, J. N., 27/02/2018, Psychological and Behavioral Examinations in Cyber Security. McAlaney, J., Frumkin, L. & Benson, V. (eds.). Hershey, PA: IGI Global, p. 80-97 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    Optical reading of a security element [2]

    Young, R. J. & Roedig, U., 21/02/2018, IPC No. G06K19/06; G06K7/12; G06K9/00, Patent No. GB20170013634 20170824 , Priority date 24/08/2017, Priority No. GB20170013634 20170824

    Research output: Patent

  25. Published

    RL-Budget: A Learning-Based Cluster Size Adjustment Scheme for Cognitive Radio Networks

    Javed, Z., Yau, K. A., Mohamad, H., Ramli, N., Qadir, J. & Ni, Q., 14/02/2018, In: IEEE Access. 6, p. 1055-1072 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Generating a Nondeterministic Response to a Challenge

    Roberts, J., Bernardo Gavito, R. & Young, R. J., 1/02/2018, IPC No. G06F7/58; H04L9/32, Patent No. GB1613003.1 GB2543126 (A) GB2543126 (B) WO2018020202, Priority date 27/07/2016, Priority No. GB20160013003 20160727

    Research output: Patent

  27. Published

    Generating a unique response to a challenge

    Bernardo Gavito, R., Roberts, J., Roedig, U. & Young, R. J., 1/02/2018, IPC No. G06F21/73; H04L9/32, Patent No. GB1613002.3 WO2018020201 (A1) GB2543125 (A) GB2543125 (B) , Priority date 27/07/2016, Priority No. GB20160013002 20160727

    Research output: Patent

  28. Published

    A GNSS/5G Integrated Positioning Methodology in D2D Communication Networks

    Yin, L., Ni, Q. & Deng, Z., 02/2018, In: IEEE Journal on Selected Areas in Communications. 36, 2, p. 351-362 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Communication error management in law enforcement interactions: a receiver’s perspective

    Oostinga, M., Giebels, E. & Taylor, P. J., 02/2018, In: Psychology, Crime and Law. 24, 2, p. 134-155 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Digital traces of behavior within addiction: Response to Griffiths (2017)

    Ellis, D. A., Kaye, L., Wilcockson, T. & Ryding, F., 02/2018, In: International Journal of Mental Health and Addiction. 16, 1, p. 240-245 6 p.

    Research output: Contribution to Journal/MagazineComment/debatepeer-review

  31. Published

    Empirical Fuzzy Sets

    Angelov, P. P. & Gu, X., 02/2018, In: International Journal of Intelligent Systems. 33, 2, p. 362-395 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Guest Editorial: Body Sensor Networks

    Koutsakis, P., Spachos, P. & Marnerides, A., 29/01/2018, In: IET Wireless Sensor Systems. 8, 1, p. 1-2 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  33. Published

    IMPROVEMENTS RELATING TO THE AUTHENTICATION OF PHYSICAL ENTITIES

    Young, R. J. & Falko, V., 18/01/2018, IPC No. G06K19/10; G06K7/14; G06Q30/00; G07D7/12; B42D25/29, Patent No. US2018018846 (A1) AU2016211063 (A1) CN107810517 (A) EP3251103 (A1) GB2538181 (A) GB2538181 (B) , Priority date 27/01/2015, Priority No. GB20150001342 20150127 ; WO2016GB50164 20160126

    Research output: Patent

  34. Published

    Room temperature mid-infrared emission from faceted InAsSb multi quantum wells embedded in InAs nanowires

    Alhodaib, A., Noori, Y., Carrington, P. J., Sanchez, A., Thompson, M. D., Young, R. J., Krier, A. & Marshall, A. R. J., 10/01/2018, In: Nano Letters. 18, 1, p. 235-240 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Foreword: Mathematical Cognition, Language, and Culture: Understanding the Links

    Towse, J. N., 9/01/2018, Language and Culture in Mathematical Cognition. Berch, D., Geary, D. & Koepke, K. M. (eds.). Academic Press, p. xv-xix (Mathematical Cognition and Learning; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  36. Published

    Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

    Sturdee, M. & Alexander, J., 3/01/2018, In: ACM Computing Surveys. 51, 1, p. 2:1-2:32 32 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Scale Up Event Extraction Learning via Automatic Training Data Generation

    Zeng, Y., Feng, Y., Ma, R., Wang, Z., Yan, R., Shi, C. & Zhao, D., 1/01/2018, The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18). Palo Alto: AAAI, p. 6045-6052 8 p. (AAAI ; vol. 32).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    'An error is feedback’: the experience of communication error management in crisis negotiations

    Oostinga, M., Giebels, E. & Taylor, P. J., 01/2018, In: Police Practice and Research. 19, 1, p. 17-30 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks

    Naqvi, S. A. R., Hassan, S. A., Pervaiz, H. & Ni, Q., 01/2018, In: IEEE Communications Magazine. 56, 1, p. 36-42 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Self-organised direction aware data partitioning algorithm

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 01/2018, In: Information Sciences. 423, p. 80-95 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    30-Second Forensic Science: 50 key topics revealing criminal investigation from behind the scenes, each explained in half a minute

    Black, S. (ed.) & Nic Daeid, N. (ed.), 2018, Brighton: Ivy Press. (30 Second)

    Research output: Book/Report/ProceedingsBook

  42. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  43. Published

    China and discourses of desecuritization: A reply to Vuori

    Lacy, M. J., 2018, In: Global Discourse. 8, 1, p. 137-138 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

    Tian, D., Zhou, J., Chen, M., Sheng, Z., Ni, Q. & Leung, V. C. M., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, p. 90-98 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery

    Zhai, S., Tang, Z., Wang, D., Li, Q., Li, Z., Chen, X., Fang, D., Chen, F. & Wang, Z., 2018, In: Sensors. 18, 7, 23 p., 2075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  47. Published

    Looking at the same interaction and seeing something different: The role of information, judgment perspective and behavioral coding on judgment 'accuracy'

    Wall, H., Taylor, P. J., Campbell, C., Heim, D. & Richardson, B., 2018, In: Journal of Individual Differences. 39, p. 123-141 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Metaphor, Cancer and the End of Life: A Corpus-based Study

    Semino, E., Demjen, Z., Hardie, A., Payne, S. A. & Rayson, P. E., 2018, London: Routledge. 308 p.

    Research output: Book/Report/ProceedingsBook

  49. Published

    Missed Medical Appointments during Shifts to and from Daylight Saving Time

    Ellis, D. A., Luther, K. & Jenkins, R., 2018, In: Chronobiology International. 35, 4, p. 584-588 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  51. 2017
  52. Published

    Extracting random numbers from quantum tunnelling through a single diode

    Bernardo Gavito, R., Bagci, I. E., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C., Missous, M., Roedig, U. & Young, R. J., 19/12/2017, In: Scientific Reports. 7, 6 p., 17879.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 12 3 4 5 6 7 8 9 ...33 Next

Back to top