Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    A study on helix pitch tolerance impact on TWT small-signal gain

    D'Agostino, S. & Paoloni, C., 12/2002, In: IEEE Electron Device Letters. 23, 12, p. 746-748 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed.

    Mohr, M., Edwards, C. & McCarthy, B., 18/04/2008, In: Computer Communications. 31, 6, p. 1148 - 1159

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    A Stochastic Programming Model for Slot Allocation at Congested Airports

    Fairbrother, J., Shone, R., Glazebrook, K. & Zografos, K. G., 17/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  5. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A Smart approach for GPT cryptosystem based on rank codes

    Rashwan, H., Gabidulin, E. M. & Honary, B., 2010, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on. IEEE, p. 2463-2467 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published
  9. Published

    A situational analysis of how barriers to systemic failure are undermined during accident sequences

    Busby, J. S., Chung, P. W. H. & Wen, Q., 2004, In: Journal of Risk Research. 7, 7/8, p. 811-826 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A site-controlled quantum dot system offering both high uniformity and spectral purity

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 1/06/2009, In: Applied Physics Letters. 94, 22, p. - 3 p., 223121.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

    Hirst, S. A. & Honary, B., 2001, Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 38-43 6 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    A simple fuzzy rule-based system through vector membership and kernel-based granulation.

    Angelov, P. & Yager, R., 9/07/2010, 5th IEEE International Conference Intelligent Systems (IS), 2010 . IEEE, p. 349-354 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    A Sensor Fusion Method for Smart phone Orientation Estimation

    Ayub, S., Bahraminasab, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    A semiconductor source of triggered entangled photon pairs

    Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 12/01/2006, In: Nature. 439, 7073, p. 179-182 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    A Semi-autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    D'Antonio, S., Romano, S., Simpson, S., Smith, P. & Hutchison, D., 10/2008, Self-Organizing Systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer, p. 230-241 12 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A Self-Learning Fuzzy Classifier with Feature Selection for Intelligent interrogation of mid-IR spectroscopy data from exfoliative cervical cytology using selflearning classifier eClass.

    Kelly, J. G., Angelov, P. P., Walsh, M. J., Pollock, H. M., Pitt, M. A., Martin-Hirsch, P. L. & Martin, F. L., 2008, In: International Journal of Computational Intelligence Research. 4, 4, p. 392-401 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    A Selective Delayed Channel Access (SDCA) for the high-throughput IEEE 802.11n

    Skordoulis, D., Ni, Q. & C. Zarakovitis, C., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. New York: IEEE, p. 1173-1178 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Unpublished

    A Secure Quorum Based Membership Mechanism for P2P Systems

    Mauthe, A., Liebau, N., Heckmann, O., Kovacevic, A., Tafreschi, O., Fidler, M. & Steinmetz, R., 08/2006, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  23. Published

    A Secure Group-Oriented Framework for Intelligent Virtual Environments

    Such, J. M., Alberola, J. M., Barella, A. & Garcia-Fornes, A., 2011, In: Computing and Informatics. 30, 6, p. 1225-1246 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

    Kumar, A., Yadav, A. S., Gill, S. S., Pervaiz, H., Ni, Q. & Buyya, R., 30/11/2022, In: Simulation Modelling Practice and Theory. 120, 27 p., 102621.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    A secure collaborative spectrum sensing strategy in cyber-physical systems

    Lin, H., Hu, J., Ma, J., Xu, L. & Yu, Z., 22/12/2017, In: IEEE Access. 5, p. 27679-27690 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top