Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2017
  2. Published
  3. Published

    AppIS: Protect Android Apps Against Runtime Repackaging Attacks

    Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D. & Wang, Z., 17/12/2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 25-32 8 p. (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Improving Spark Application Throughput Via Memory Aware Task Co-location: A Mixture of Experts Approach

    Sanz Marco, V., Taylor, B., Porter, B. F. & Wang, Z., 11/12/2017, Middleware '17 Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference. New York: ACM, p. 95-108 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Malware detection in migrated virtual machines

    El-Moussa, F., Mauthe, A. U., Marnerides, A. & Watson, M., 7/12/2017, Patent No. 20170351861

    Research output: Patent

  6. Published

    Demographic and practice factors predicting repeated non-attendance in primary care: a national retrospective cohort analysis

    Ellis, D. A., McQueenie, R., McConnachie, A., Wilson, P. & Williamson, A., 4/12/2017, In: Lancet Public Health. 2, 12, p. e551-559 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Supply chain resilience in a developing country context: A case study on the interconnectedness of threats, strategies, and outcomes

    Tukamuhabwa Rwakira, B., Stevenson, M. & Busby, J. S., 4/12/2017, In: Supply Chain Management: An International Journal. 22, 6, p. 486-505 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Body farms

    Black, S., 1/12/2017, In: Forensic Science, Medicine and Pathology. 13, 4, p. 475-476 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Foreword to "Using Imperfect Semiconductor Systems for Unique Identification"

    Young, R. J. & Roberts, J. (ed.), 1/12/2017, Using Imperfect Semiconductor Systems for Unique Identification. Cham: Springer, 2 p. (Springer Theses).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

  10. Published

    Adaptive management of cognitive radio networks employing femtocells

    Al-dulaimi, A., Anpalagan, A., Al-rubaye, S. & Ni, Q., 12/2017, In: IEEE Systems Journal. 11, 4, p. 2687-2698 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Empirical data analytics

    Angelov, P. P., Gu, X. & Kangin, D., 12/2017, In: International Journal of Intelligent Systems. 32, 12, p. 1261-1284 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    NOMA-Enabled Cooperative Unicast–Multicast: Design and Outage Analysis

    Yang, L., Chen, J., Ni, Q., Shi, J. & Xue, X., 12/2017, In: IEEE Transactions on Wireless Communications. 16, 12, p. 7870-7889 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Ideological Transmission II: Peers, Education and Prisons

    Lee, B. J. & Knott, K., 15/11/2017, Lancaster: Centre for Research and Evidence on Security Threats. 51 p.

    Research output: Book/Report/ProceedingsCommissioned report

  15. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    A deeply annotated testbed for geographical text analysis: The Corpus of Lake District Writing

    Rayson, P. E., Reinhold, A., Butler, J., Donaldson, C. E., Gregory, I. N. & Taylor, J. E., 7/11/2017, GeoHumanities'17 Proceedings of the 1st ACM SIGSPATIAL Workshop on Geospatial Humanities. New York: Association for Computing Machinery (ACM), p. 9-15 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    On the Significance of Process Comprehension for Conducting Targeted ICS Attacks

    Green, B., Krotofil, M. & Abbasi, A., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 57-67 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Exploring the relationship between stride, stature and hand size for forensic assessment

    Guest, R. M., Miguel-Hurtado, O., Stevenage, S. & Black, S., 1/11/2017, In: Journal of Forensic and Legal Medicine. 52, p. 46-55 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data

    Qi, L., Zhang, X., Dou, W. & Ni, Q., 11/2017, In: IEEE Journal on Selected Areas in Communications. 35, 11, p. 2616-2624 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    A time-sensitive historical thesaurus-based semantic tagger for deep semantic annotation

    Piao, S. S., Dallachy, F., Baron, A., Demmen, J. E., Wattam, S., Durkin, P., McCracken, J., Rayson, P. E. & Alexander, M., 11/2017, In: Computer Speech and Language. 46, p. 113-135 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Adaptive bitrate selection: a survey

    Sani, Y., Mauthe, A. U. & Edwards, C. J., 11/2017, In: Communications Surveys and Tutorials, IEEE Communications Society. 19, 4, p. 2985-3014 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Forensic gait analysis: A primer for courts

    Black, S. (ed.), Wall, M. (ed.), Abboud, R., Baker, R. & Stebbins, J., 11/2017, London: The Royal Society. 33 p. (Primers for Courts)

    Research output: Book/Report/ProceedingsCommissioned report

  25. Published

    Network service orchestration standardization: a technology survey

    Rotsos, C., King, D., Farshad, A., Bird, J., Fawcett, L., Georgalas, N., Gunkel, M., Shiomoto, K., Wang, A., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 11/2017, In: Computer Standards and Interfaces. 54, 4, p. 203-215 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    On the Energy and Spectral Efficiency Tradeoff in Massive MIMO Enabled HetNets with Capacity-Constrained Backhaul Links

    Hao, Y., Ni, Q., Li, H. & Hou, S., 11/2017, In: IEEE Transactions on Communications. 65, 11, p. 4720-4733 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

    Shirazi, S. N. U. H., Gouglidis, A., Farshad, A. & Hutchison, D., 11/2017, In: IEEE Journal on Selected Areas in Communications. 35, 11, p. 2586-2595 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    DexPro: A Bytecode Level Code Protection System for Android Applications

    Zhao, B., Tang, Z., Li, Z., Song, L., Gong, X., Fang, D., Liu, F. & Wang, Z., 21/10/2017, Cyberspace Safety and Security. Wen, S., Wu, W. & Castiglione, A. (eds.). Cham: Springer, p. 367-382 16 p. (Lecture Notes in Computer Science; vol. 10581).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    A cascade of deep learning fuzzy rule-based image classifier and SVM

    Angelov, P. P. & Gu, X., 5/10/2017, Systems, Man, and Cybernetics (SMC), 2017 IEEE International Conference on: Human Intelligence for Systems and Cybernetics. IEEE, p. 746-751 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Optimise web browsing on heterogeneous mobile platforms: a machine learning based approach

    Ren, J., Gao, L., Wang, H. & Wang, Z., 5/10/2017, IEEE International Conference on Computer Communications (INFOCOM), 2017. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    When wearable devices fail: Towards an improved understanding of what makes a successful wearable intervention

    Ellis, D. A. & Piwek, L., 2/10/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  32. Published

    Mobile Live Video Streaming Optimization via Crowdsourcing Brokerage

    Wu, T., Dou, W., Ni, Q., Yu, S. & Chen, G., 10/2017, In: IEEE Transactions on Multimedia. 19, 10, p. 2267-2281 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Self-organized Relay Selection for Cooperative Transmission in Vehicular Ad-hoc Networks

    Tian, D., Zhou, J., Sheng, Z., Chen, M., Ni, Q. & Leung, V. C. M., 10/2017, In: IEEE Transactions on Vehicular Technology. 66, 10, p. 9534-9549 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Optical identification using imperfections in 2D materials

    Cao, Y., Robson, A. J., Alharbi, A., Roberts, J., Woodhead, C., Noori, Y., Bernardo Gavito, R., Roedig, U., Falko, V. & Young, R. J., 28/09/2017, In: 2D Materials. 4, 4, 8 p., 045021.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Nondeterministic response to a challenge

    Young, R. J. & Bernardo Gavito, R., 20/09/2017, IPC No. G06F7/58, Patent No. GB2548428 WO2018029440 (A1) , Priority date 8/08/2016, Priority No. GB20160013595 20160808

    Research output: Patent

  36. Published

    Optical Reading of a Security Element

    Roberts, J. & Young, R. J., 20/09/2017, IPC No. G06K19/06; G06K9/00, Patent No. GB2548493 (B) GB2548493 (A) , Priority date 17/03/2017, Priority No. GB20170004308 20170317

    Research output: Patent

  37. Published

    Exploring Deep Mapping Concepts: Crosthwaite’s Map and West’s Picturesque Stations

    Reinhold, A., Donaldson, C. E., Gregory, I. N. & Rayson, P. E., 14/09/2017, Proceedings of Workshops and Posters at the 13th International Conference on Spatial Information Theory (COSIT 2017). Fogliaroni, P., Ballatore, A. & Clementini, E. (eds.). Cham: Springer, p. 265-273 9 p. (Lecture Notes in Geoinformation and Cartography).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A Comparison Between Genetics Papers Relating to Immune Disorders and Psychiatric Disorders

    El-Haj, M., Piao, S. S., Rayson, P. E. & Knight, J., 11/09/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  39. Published

    SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation

    Tang, Z., Wang, L., Kuang, K., Xue, C., Gong, X., Chen, X., Fang, D. & Wang, Z., 11/09/2017, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, p. 261-268 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    End-to-end Deep Learning of Optimization Heuristics

    Cummins, C., Petoumenos, P., Wang, Z. & Leather, H., 9/09/2017, The 26th International Conference on Parallel Architectures and Compilation Techniques (PACT) 2017. IEEE, p. 219-232 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In: The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    A new type of distance metric and its use for clustering

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 09/2017, In: Evolving Systems. 8, 3, p. 167-177 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    COUNTER - COrpus of Urdu News TExt Reuse

    Muhammad, S., Nawab, R. M. A. & Rayson, P. E., 09/2017, In: Language Resources and Evaluation. 51, 3, p. 777-803 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Jumping the gun: faster response latencies to deceptive questions in a realistic scenario

    Mapala, T., Warmelink, L. N. & Linkenauger, S. A., 31/08/2017, In: Psychonomic Bulletin and Review. 24, 4, p. 1350-1358 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    N-state random switching based on quantum tunnelling

    Bernardo Gavito, R., J. Urbanos, F., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C. S., Missous, M., Roedig, U. & Young, R. J., 31/08/2017, In: Proceedings of SPIE. 10354, p. 103541T 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Statistical Delay QoS Driven Energy Efficiency and Effective Capacity Tradeoff for Uplink Multi-User Multi-Carrier Systems

    Yu, W., Musavian, L. & Ni, Q., 31/08/2017, In: IEEE Transactions on Communications. 65, 8, p. 3494-3508 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Countering Violent Extremism: An Introduction

    Marsden, S. V., Knott, K. & Lewis, J., 29/08/2017, Centre for Research and Evidence on Security Threats. 7 p.

    Research output: Book/Report/ProceedingsCommissioned report

  50. Published

    Protect sensitive information against channel state information based attacks

    Zhang, J., Tang, Z., Chen, X., Fang, D., Li, R. & Wang, Z., 18/08/2017, 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

    Green, B., Le, A. T., Antrobus, R., Roedig, U., Hutchison, D. & Rashid, A., 14/08/2017. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Previous 1...3 4 5 6 7 8 9 10 ...33 Next

Back to top