Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In: IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Proceedings of the 4th European Workshop on Usable Security

    Ur, B. (ed.) & Weir, C. (ed.), 1/09/2019, IEEE.

    Research output: Book/Report/ProceedingsProceedings

  3. Published

    Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

    Usama, M., Qadir, J., Raza, A., Arif, H., Yau, K-L. A., Elkhatib, Y., Hussain, A. & Al-Fuqaha, A., 19/09/2017, In: arxiv.org. 37 p.

    Research output: Contribution to Journal/MagazineJournal article

  4. Published

    Empirical Signal Strength-based Location Estimation: An Investigative Approach

    Vahdat, I., Honary, S. & Honary, B., 07/2007, 9th International Symposium on Communication Theory and Applications. Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

    Van der Zee, S., Poppe, R., Taylor, P. J. & Anderson, R., 12/04/2019, In: PLoS ONE. 14, 4, 18 p., e0215000.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Personality assessment and behavioral prediction at first impression

    Vartanian, O., Stewart, K., Mandel, D., Pavlovic, N., McLellan, L. & Taylor, P., 02/2012, In: Personality and Individual Differences. 52, 3, p. 250-254 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (ed.), Jin, X. (ed.), Jarvis, S. (ed.), Liu, L. (ed.), Calvo, R. A. (ed.), Hu, J. (ed.), Min, G. (ed.), Georgalas, N. (ed.) & Wu, Y. (ed.), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Interactions under the desk: a characterisation of foot movements for input in a seated position

    Velloso, E., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part . Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 384-401 18 p. (Lecture Notes in Computer Science; vol. 9296).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    An empirical investigation of gaze selection in mid-air gestural 3D manipulation

    Velloso, E., Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 315-330 16 p. (Lecture Notes in Computer Science ; vol. 9297).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    The feet in human--computer interaction: a survey of foot-based interaction

    Velloso, E., Schmidt, D., Alexander, J., Gellersen, H. & Bulling, A., 1/11/2015, In: ACM Computing Surveys. 48, 2, p. 1-35 35 p., 21.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Gaze-supported gaming: MAGIC techniques for first person shooters

    Velloso, E., Fleming, A., Alexander, J. & Gellersen, H., 2015, CHI PLAY '15 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. New York: ACM, p. 343-347 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Design and vertical tests of double-quarter wave cavity prototypes for the high-luminosity LHC crab cavity system

    Verdú-Andrés, S., Burt, G. C. & Shipman, N., 13/08/2018, In: Physical Review Accelerators and Beams. 21, 8, 14 p., 082002.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  19. Published

    Management of Multimedia Networks and Services 7th IFIP/IEEE International Conference, MMNS 2004, San Diego, CA, USA, October 3-6, 2004. Proceedings

    Vicente, J. (ed.) & Hutchison, D. (ed.), 2004, Berlin: Springer Verlag. (Lecture Notes in Computer Science; vol. 3271)

    Research output: Book/Report/ProceedingsBook

  20. Published

    On-Line Construction and Rule Base Simplification by Replacement in Fuzzy Systems Applied to a Wastewater Treatment Plant

    Victor, J., Dourado, A. & Angelov, P., 07/2005. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  21. Published

    Mobile and Ambient Environments of the Future - Research Challenges for Wireless Ad-hoc and Sensor Networks

    Vida, R., Farkas, K., Grigoras, D., Roedig, U., saSilva, J., Todorova, P., Pitsillides, A., Vassiliou, V. & Wolf, L., 06/2006, In: China Communications. 3, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Group communication techniques in overlay networks

    Vik, K-H., Halvorsen, P., Griwodz, C., Zimmermann, R. & Roedig, U., 2009, In: ACM SIGMM Records. 1, 2, p. 9-10 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Capacity analysis of reservation-based random access for broadband wireless access networks

    Vinel, A., Ni, Q., Staehle, D. & Turlikov, A., 02/2009, In: IEEE Journal on Selected Areas in Communications. 27, 2, p. 172-181 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Optimization of PBG-Waveguides for Terahertz-Driven Electron Acceleration

    Vint, A., Burt, G. & Letizia, R., 1/04/2020, In: IEEE Transactions on Plasma Science. 48, 4, p. 1202-1209 8 p., 9046851.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Web technologies for environmental big data

    Vitolo, C., Elkhatib, Y., Reusser, D., Macleod, C. J. A. & Buytaert, W., 01/2015, In: Environmental Modelling and Software. 63, p. 185-198 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    On the applicability of network coding in wireless sensor networks

    Voigt, T., Roedig, U., Landsiedel, O., Samarasinghe, K. & Prasad, M. B. S., 07/2012, In: ACM SIGBED Review. 9, 3, p. 46-48 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Mitigating Inter-Network Interference in LoRa Networks

    Voigt, T., Bor, M., Roedig, U. & Alonso, J., 20/02/2017, EWSN ’17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks. New York: ACM Press, p. 323-328 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Verbal lie detection

    Vrij, A., Taylor, P. J. & Picornell, I., 13/11/2015, Communication in investigative and legal contexts: integrated approaches from forensic psychology, linguistics and law enforcement. Oxburgh, G., Myklebust, T., Grant, T. & Milne, R. (eds.). Wiley, (Psychology of Crime, Policing and Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  29. Published

    Adaptive transmission power control and coding for wireless sensor networks

    Wadekar, R., Stankovic, L. & Honary, B., 12/2007, The IET Communications Conference on Wireless, Mobile and Sensor Networks 2007. Shanghai, China: IET Press, p. 1063-1066 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Improved Error Protection using Adaptive PUM Codes

    Wadekar, R., Fagoonee, L. & Honary, B., 07/2007, 9th International Symposium on Communication Theory and Applications. Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Rich contexts do not always enrich the accuracy of personality judgements

    Wall, H., J. Taylor, P., Dixon, J., Conchie, S. & Ellis, D., 11/2013, In: Journal of Experimental Social Psychology. 49, 6, p. 1190-1195 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Getting the balance right? a mismatch in interaction demands between target and judge impacts on judgement accuracy for some traits but not others

    Wall, H., Taylor, P. J. & Campbell, C., 01/2016, In: Personality and Individual Differences. 88, p. 66-72 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Looking at the same interaction and seeing something different: The role of information, judgment perspective and behavioral coding on judgment 'accuracy'

    Wall, H., Taylor, P. J., Campbell, C., Heim, D. & Richardson, B., 2018, In: Journal of Individual Differences. 39, p. 123-141 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    The customizable fault/error model for dependable distributed systems

    Walter, C. J. & Suri, N., 2/01/2003, In: Theoretical Computer Science. 290, 2, p. 1223-1251 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Cognitive computing and wireless communications on the edge for healthcare service robots

    Wan, S., Gu, Z. & Ni, Q., 1/01/2020, In: Computer Communications. 149, p. 99-106 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Multimedia over massive MIMO wireless systems

    Wang, H., Ge, X., Zi, R., Zhang, J. & Ni, Q., 28/08/2015, Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International. IEEE, p. 1492-1497 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Use of an injection locked magnetron to drive a superconducting RF cavity

    Wang, H., Davis, K., Rimmer, R., Tahir, I., Dexter, A. C., Burt, G. & Carter, R. G., 1/12/2010, IPAC 2010 - 1st International Particle Accelerator Conference. p. 4026-4028 3 p. (IPAC 2010 - 1st International Particle Accelerator Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    6G-Enabled Short-Term Forecasting for Large-Scale Traffic Flow in Massive IoT Based on Time-Aware Locality-Sensitive Hashing

    Wang, F., Zhu, M., Wang, M., Khosravi, M. R., Ni, Q., Yu, S. & Qi, L., 1/04/2021, In: IEEE Internet of Things Journal. 8, 7, p. 5321-5331 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    A Novel Wireless Leaf Area Index Sensor Based on a Combined U-Net Deep Learning Model

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/08/2022, In: IEEE Sensors Journal. 22, 16, p. 16573 - 16585 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Online Service Migration in Mobile Edge with Incomplete System Information: A Deep Recurrent Actor-Critic Learning Approach

    Wang, J., Hu, J., Min, G., Ni, Q. & El-Ghazawi, T., 1/11/2023, In: IEEE Transactions on Mobile Computing. 22, 11, p. 6663-6675 13 p., 11.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Forthcoming

    User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

    Wang, W., Yu, W., Foh, C. H., Gao, D. & Ni, Q., 19/09/2022, (Accepted/In press) Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Cross-layer Framework for Energy Harvesting-LPWAN Resource Management based on Fuzzy Cognitive Maps and Adaptive Glowworm Swarm Optimization for Smart Forest

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/05/2024, In: IEEE Sensors Journal. 24, 10, p. 17067 - 17079

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    A Fast Model of a 1-D Nonlinear Beam-Wave Interaction for a 225GHz TWT

    Waring, R., Hu, Y. & Paoloni, C., 23/06/2015, 8th UK-Europe-China Workshop on mm-waves and THz Technologies . IEEE, 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    A fast model of a 1-D nonlinear beam-wave interaction for a 225 GHz TWT

    Waring, R., Hu, Y. & Paoloni, C., 14/09/2015, 2015 8th UK, Europe, China Millimeter Waves and THz Technology Workshop (UCMMT). IEEE, p. 1-3 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Lagrangian simulator for Millimetre Wave TWT Based on Non-rotationally Symmetric Slow-Wave Structure

    Waring, R. & Paoloni, C., 09/2017, In: Journal of Electromagnetic Waves and Applications. 31, 17, p. 1902-1913 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Lagrangian Large Signal Model for Double Corrugated Waveguides

    Waring, R. & Paoloni, C., 25/09/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  47. Published

    Lagrangian Large Signal Model for Double Corrugated Waveguide

    Waring, R. & Paoloni, C., 04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  48. Published

    Comparison of couplers for 0.346 THz DCW-BWO

    Waring, R., Paoloni, C., Gamzina, D., Popovic, B., Himes, L., Letizia, R., Tang, Y., Li, H., Pan, P., Feng, J. & Luhmann, N. C., 7/03/2017, Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016. Yu, J. & Chen, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 208-209 2 p. 7874013. (Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top