Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices

    Komninos, N., Honary, B. & Darnell, M., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 294-300 7 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    An efficient TDMA start-up and restart synchronization approach for distributed embedded systems

    Claesson, V., Lönn, H. & Suri, N., 13/09/2004, In: IEEE Transactions on Parallel and Distributed Systems. 15, 8, p. 725-739 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    An Empirical Characterisation of Electronic Document Navigation

    Alexander, J. & Cockburn, A., 2008, Proceedings of Graphics Interface 2008. Toronto, Ont., Canada, Canada: Canadian Information Processing Society, p. 123-130 8 p. (GI '08).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    An empirical investigation of gaze selection in mid-air gestural 3D manipulation

    Velloso, E., Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 315-330 16 p. (Lecture Notes in Computer Science ; vol. 9297).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    'An error is feedback’: the experience of communication error management in crisis negotiations

    Oostinga, M., Giebels, E. & Taylor, P. J., 01/2018, In: Police Practice and Research. 19, 1, p. 17-30 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    An evolutionary approach to fuzzy rule-based model synthesis using indices for rules

    Angelov, P., 1/08/2003, In: Fuzzy Sets and Systems. 137, 3, p. 325-338 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    An evolving approach to unsupervised and Real-Time fault detection in industrial processes

    Gomes Bezerra, C., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 30/11/2016, In: Expert Systems with Applications. 63, p. 134-144 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    An evolving graph-based reliable routing scheme for VANETs

    Eiza, M. H. & Ni, Q., 05/2013, In: IEEE Transactions on Vehicular Technology. 62, 4, p. 1493-1504 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    An evolving machine learning method for human activity recognition systems

    Andreu, J. & Angelov, P., 2013, In: Journal of Ambient Intelligence and Humanized Computing. 4, 2, p. 195-206 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2007, Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on. IEEE, p. 267-271 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    An ICT Architecture for Enabling Ancillary Services in Distributed Renewable Energy Sources Based on the SGAM Framework

    Stocker, A., Alshawish, A., Bor, M., Vidler, J., Gouglidis, A., Scott, A., Marnerides, A., de Meer, H. & Hutchison, D., 12/05/2022, In: Energy Informatics. 5, 1, 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    An ILNP-based solution for future heterogeneous wireless networks

    Isah, M. & Edwards, C. J., 06/2013, PGNET 2013: Proceedings of the 14th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting. Liverpool, United Kingdom: Liverpool John Moores University, School of Computing & Mathematical Sciences, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  18. Published

    An improved equivalent circuit model of a four rod deflecting cavity

    Apsimon, R. J. & Burt, G. C., 1/03/2017, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 847, p. 52-60 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    An improved watermarking technique for the casting of digital signatures

    Katsaros, I. & Honary, B., 10/2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. London: IEEE, p. 490-493 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    An intelligent genetic algorithm for PAPR reduction in a multi-carrier CDMA wireless system

    Zhang, Y., Ni, Q., Chen, H. H. & Song, Y., 2008, Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08. International. IEEE, p. 1052-1057 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    An open architecture mechanism for control of dynamic processing resources

    Lund, D., Martin, I. & Honary, B., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 469–473 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    AN OPTICAL RETRIEVAL SYSTEM, DATA STORAGE SYSTEM, DATA STORAGE MEDIUM AND METHOD OF OPTICAL RETRIEVAL AND DATA STORAGE

    KABUSHIKI, KAISHA., Yuan, Z., Young, R., Shields, A. J. & Stevenson, R. M., 31/12/2008, IPC No. PCT/GB2008/002236, Patent No. WO/2009/001105

    Research output: Patent

  25. Published

    An optimization based design for integrated dependable real-time embedded systems

    Islam, S., Suri, N., Balogh, A., Csertán, G. & Pataricza, A., 2009, In: Design Automation for Embedded Systems. 13, 4, p. 245-285 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top