Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A partial order scalogram analysis of communication behavior in crisis negotiation with the prediction of outcome.

    Taylor, P. J., 2002, In: International Journal of Conflict Management. 13, 1, p. 4-37 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Linguistic style matching and negotiation outcome.

    Taylor, P. J. & Thomas, S., 08/2008, In: Negotiation and Conflict Management Research. 1, 3, p. 263-281 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Testing the relationship between local cue-response patterns and global dimensions of communication behavior.

    Taylor, P. J. & Donald, I. J., 1/01/2007, In: British Journal of Social Psychology. 46, 2, p. 273-298 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    On the complexity and accuracy of geographic profiling strategies

    Taylor, P. J., Bennell, C., Snook, B. & Zito, M., 1/01/2005, In: Journal of Quantitative Criminology. 21, 1, p. 1-26 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A cylindrical model of communication behaviour in crisis negotiations.

    Taylor, P. J., 1/01/2002, In: Human Communication Research. 28, 1, p. 7-48 42 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Jaccard’s heel: are radex models of criminal behaviour falsifiable when derived using Jaccard coefficient?

    Taylor, P., Donald, I. J., Jacques, K. & Conchie, S., 02/2012, In: Legal and Criminological Psychology. 17, 1, p. 41-58 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    The Bounds of Cognitive Heuristic Performance on the Geographic Profiling Task

    Taylor, P. J., Bennell, C. & Snook, B., 04/2009, In: Applied Cognitive Psychology. 23, 3, p. 410-430 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Analysing forensic processes: taking time into account

    Taylor, P., Jacques, K., Giebels, E., Levine, M. & Gendreau, P., 2008, In: Issues in Forensic Psychology. 8, p. 45-57 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    The structure of communication behavior in simulated and actual crisis negotiations

    Taylor, P. J. & Donald, I., 10/2004, In: Human Communication Research. 30, 4, p. 443-478 36 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Hostage negotiation opens up

    Taylor, P. & Donohue, W. A., 2006, The negotiator's fieldbook: the desk reference for the experienced negotiator. Schneider, A. & Honeymoon, C. (eds.). Chicago: American Bar Association, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  11. Published

    Problems of classification in investigative psychology

    Taylor, P., Bennell, C. & Snook, B., 2002, Classification, clustering, and data analysis: Recent advances and applications. Jajuga, K., Sokolowski, A. & Bock, H-H. (eds.). Heidelberg: Springer Verlag, p. 479-487 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  12. Published

    Probing Communities: Study of a Village Photo Display

    Taylor, N., Cheverst, K., Fitton, D., Race, N. J. P., Rouncefield, M., Graham, C. & EPSRC (Funder), 11/2007, OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces. p. 17-24 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Editorial

    Taylor, P. J., 09/2012, In: Legal and Criminological Psychology. 17, 2, p. 195-195 1 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  14. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  15. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  16. Published

    Detecting insider threats to organizations through language change

    Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A. & Menacere, T., 08/2013, In: Law and Human Behavior. 37, 4, p. 267-275 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    How technology is revolutionising our understanding of human cooperation

    Taylor, P. J., 2013, Twente: Twente University Press.

    Research output: Book/Report/ProceedingsBook

  18. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  19. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  20. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In: Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Culture moderates changes in linguistic self-presentation and detail provision when deceiving others

    Taylor, P. J., Larner, S., Conchie, S. M. & Menacere, T., 7/06/2017, In: Royal Society Open Science. 4, 11 p., 170128.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Optimal data compression and forwarding in wireless sensor networks

    Tavli, B., Bagci, I. E. & Ceylan, O., 05/2010, In: IEEE Communications Letters. 14, 5, p. 408-410 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Data processing and communication strategies for lifetime optimization in wireless sensor networks

    Tavli, B., Kayaalp, M., Bagci, I. E. & Ceylan, O., 10/2010, In: AEÜ - International Journal of Electronics and Communications. 64, 10, p. 992-998 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Novel link adaptation for TETRA cellular systems

    Tarchi, D., Fantacci, R., Tanriover, C. & Honary, B., 04/2009, In: International Journal of Communication Systems. 22, 4, p. 483-501 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Improving Turbo Code Error Performance by Multifold Coding.

    Tanriover, C., Honary, B., Xu, J. & Lin, S., 05/2002, In: IEEE Communications Letters. 6, 5, p. 196-198 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Unequal Two-fold Turbo Codes and Digital Image Transmission

    Tanriover, C. C. & Honary, B., 12/2003, 7th International Symposium on Digital Signal Processing and Communication Systems .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Image transmission using unequal error protection combined with two-fold turbo coding

    Tanriover, C. C. & Honary, B., 10/2003, Mobile Future and Symposium on Trends in Communications, 2003. SympoTIC '03. Joint First Workshop on . IEEE, p. i-v 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Crossover codeword algorithm for iteration control

    Tanriover, C. C. & Honary, B., 09/2002, Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th. Vancouver, Canada: IEEE, Vol. 3. p. 1662-1665 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Multifold turbo codes

    Tanriover, C. C., Xu, J., Lin, S. & Honary, B., 06/2001, Information Theory, 2001. Proceedings. 2001 IEEE International Symposium on. Washington D.C., USA: IEEE, p. 145

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Progress in development of a 346GHz BWO

    Tang, Y., Ma, S., Pan, P., Feng, J., Waring, R., Letizia, R., Paoloni, C., Popovic, B., Zheng, Y., Himes, L., Gamzina, D. & Luhmann, N. C., 9/03/2017, Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016. Yu, J. & Chen, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 254-256 3 p. 7874029. (Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Robust sensor fault reconstruction using right eigenstructure assignment

    Tan, C. P., Kuang, Y. C. & Edwards, C., 2006, DELTA '06: Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications. Washington, DC, USA: IEEE Computer Society, p. 435-439 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach

    Tan, F., Wang, Y., Wang, Q., Bu, L., Zheng, R. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    WiP abstract: A framework on profiling cross-domain noise propagation in control CPS

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 14/04/2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE, p. 224 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Exploring interactions with physically dynamic bar charts

    Taher, F., Hardy, J., Karnik, A., Weichel, C., Jansen, Y., Hornbaek, K. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3237-3246 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    A Characterization of Actuation Techniques for Generating Movement in Shape-Changing Interfaces

    Taher, F., Vidler, J. & Alexander, J., 05/2017, In: International Journal of Human-Computer Interaction. 33, 5, p. 385-398 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Investigating the use of a dynamic physical bar chart for data exploration and presentation

    Taher, F., Jansen, Y., Woodruff, J., Hardy, J., Hornbaek, K. & Alexander, J., 01/2017, In: IEEE Transactions on Visualization and Computer Graphics. 23, 1, p. 451-460 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    "I didn't spel that wrong did i. Oops": Analysis and standardisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 27/05/2010. 23 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  48. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2012, In: Lingvisticæ Investigationes. 35, 2, p. 367-388 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    MAP-based modeling and design of wireless sensor networks with OMNeT++

    Szczytowski, P., Khelil, A. & Suri, N., 13/07/2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems. IEEE, p. 162-169 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    LEHP: Localized energy hole profiling in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 22/06/2010, The IEEE symposium on Computers and Communications. IEEE, p. 100-106 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    MAP++: support for map-based WSN modeling and design with OMNeT++.

    Szczytowski, P., Khelil, A. & Suri, N., 2009, 2nd International ICST Workshop on OMNeT++. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  57. Published

    OSA: one-class recursive SVM algorithm with negative samples for fault detection

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 2013, Artificial neural networks and machine learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 194-207 14 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Incremental anomaly identification by adapted SVM method

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 08/2013, International Joint Conference on Neural Networks, IJCNN-2013, Dallas, TX, USA, 3-9 August, 2013. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  60. Published

    Implementation of a Deterministic Wireless Sensor Network

    Suriyachai, P., Roedig, U. & Scott, A., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  61. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Implementation of a MAC protocol for QoS support in wireless sensor networks

    Suriyachai, P., Roedig, U. & Scott, A., 9/03/2009, IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009.. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Time-Critical Data Delivery in Wireless Sensor Networks

    Suriyachai, P., Brown, J. & Roedig, U., 06/2010, Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2010). Rajaraman, R., Moscibroda, T., Dunkels, A. & Scaglione, A. (eds.). Berlin: Springer, p. 216-229 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Dimensioning of Time-Critical WSNs -- Theory, Implementation and Evaluation

    Suriyachai, P., Roedig, U., Scott, A., Gollan, N. & Schmitt, J., 08/2011, In: International Journal of Mobile Communications. 6, 5, p. 360-369 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  66. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Design of an optimal Bayesian incentive compatible broadcast protocol for ad hoc networks with rational nodes

    Suri, N. & Narahari, Y., 2008, In: IEEE Journal on Selected Areas in Communications. 26, 7, p. 1138-1148 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    On dependability driven software and hardware integration

    Suri, N., 12/05/2004, Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.. IEEE, p. 45-49 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Panel statement: Why progress in (composite) fault tolerant real-time systems has been slow (-er than expected... & what can we do about it?)

    Suri, N., 18/10/2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004.. IEEE, p. 112-113 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    The need for a generalized compositional framework

    Suri, N., 3/03/2004, 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.. IEEE, p. 340 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Message from the program chair

    Suri, N., 2005, Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05). IEEE, 1 p. (Proc. IEEE Int. Symp. High Assur. Syst. Eng.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    An auction algorithm for procuring wireless channel in a heterogenous wireless network

    Suri, N. & Narahari, Y., 11/04/2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    An efficient pricing based protocol for broadcasting in wireless ad hoc networks

    Suri, N., Narahari, Y. & Manjunath, D., 8/01/2006, 2006 1st International Conference on Communication Systems Software & Middleware. IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Broadcast in ad hoc wireless networks with selfish nodes: A Bayesian incentive compatibility approach

    Suri, N. & Narahari, Y., 7/01/2007, 2007 2nd International Conference on Communication Systems Software and Middleware. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Message from the DCCS program chair

    Suri, N., 24/06/2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, p. ii 1 p. (Proc. Int. Conf. Dependable Syst. Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  76. Published

    Design of a parallel interconnect based on communication pattern considerations.

    Suri, N. & Mendelson, A., 2001, In: Parallel Algorithms Appl.. 16, 4, p. 243-271 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Dependable Embedded Systems Special Day Panel: Issues and Challenges in Dependable Embedded Systems.

    Suri, N., Fetzer, C., Abraham, J. A., Poledna, S., Mendelson, A. & Mitra, S., 2008, 2008 Design, Automation and Test in Europe. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published
  79. Published

    Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

    Suri, N., 30/03/2020, 2019 38th Symposium on Reliable Distributed Systems (SRDS). Lyon, France, Vol. 2019. p. 71-82 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Distributed Systems Security

    Suri, N., 1/10/2019, CyBOK Knowledge Base. Lupu, E. (ed.). Bristol: University of Bristol, p. 38

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  81. Published

    Collaborative IT Outsourcing in the Public Sector: A Case Analysis of Standard Business Reporting in Australia

    Sun, R., Gregor, S. & Keating, B., 10/12/2014, Proceedings of the 25th Australasian Conference on Information Systems. p. 1-11 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Information Technology Platforms: Conceptualisation and a Review of Emerging Research in IS Research

    Sun, R., Gregor, S. & Keating, B., 2015, Proceedings of the 26th Australasian Conference on Information Systems. p. 1-17 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Demystifying the Paradox of Stability and Flexibility in Information Systems Design: An Affordance Perspective

    Sun, R. & Zhang, M., 12/12/2018, Proceedings of the 38th International Conference on Information Systems. p. 1-15 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Generativity and the Paradox of Stability and Flexibility in a Platform Architecture: A Case of the Oracle Cloud Platform

    Sun, R., Gregor, S. & Fielt, E., 31/12/2021, In: Information and Management. 58, 8, 21 p., 103548.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    Impact of content ideology on social media opinion polarization: The moderating role of functional affordances and symbolic expressions

    Sun, R., Zhu, H. & Guo, F., 31/01/2023, In: Decision Support Systems. 164, 13 p., 113845.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2012, Advanced Agent Technology. Dechesne, F., Hattori, H., ter Mors, A., Such, J. M., Weyns, D. & Dignum, F. (eds.). Berlin: Springer Verlag, p. 411-425 15 p. (Lecture Notes in Computer Science; vol. 7068).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Self-disclosure decision making based on intimacy and privacy

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C., 30/11/2012, In: Information Sciences. 211, p. 93-111 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Enhancing privacy in Multi-agent Systems

    Such, J. M., 2012, In: AI Communications. 25, 4, p. 377-379 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    A Secure Group-Oriented Framework for Intelligent Virtual Environments

    Such, J. M., Alberola, J. M., Barella, A. & Garcia-Fornes, A., 2011, In: Computing and Informatics. 30, 6, p. 1225-1246 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A., 10/2011, In: Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    Partial identities as a foundation for trust and reputation

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Botti, V., 10/2011, In: Engineering Applications of Artificial Intelligence. 24, 7, p. 1128-1136 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Magentix2: a privacy-enhancing agent platform

    Such, J. M., Garcia-Fornes, A., Espinosa, A. & Bellver, J., 01/2013, In: Engineering Applications of Artificial Intelligence. 26, 1, p. 96-109 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In: Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  95. Published

    Automated buyer profiling control based on human privacy attitudes

    Such, J. M., Garcia-Fornes, A. & Botti, V., 11/2013, In: Electronic Commerce Research and Applications. 12, 6, p. 386-396 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    Privacy policy negotiation in social media

    Such, J. M. & Rovatsos, M., 02/2016, In: ACM Transactions on Autonomous and Adaptive Systems. 11, 1, 29 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Adaptive conflict resolution mechanism for multi-party privacy management in social media

    Such, J. M. & Criado, N., 2014, WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. New York: ACM, p. 69-72 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  99. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  100. Published

    Resolving multi-party privacy conflicts in social media

    Such, J. M. & Criado Pacheco, N., 2/06/2016, In: IEEE Transactions on Knowledge and Data Engineering. 28, 7, p. 1851-1863 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...26 Next

Back to top