Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Service-based, Multi-Provider, Fog Ecosystem with Joint Optimization of Request Mapping and Response Routing

    AL-Naday, M., Thomos, N., Hu, J., Volckaert, B., de Turck, F. & Reed, M. J., 1/05/2023, In: IEEE Transactions on Services Computing. 16, 3, p. 2203-2214 12 p., 3.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    SWS improved analysis based on inhomogeneous dielectric loading

    Aloisio, M. & Paoloni, C., 2008, 2008 IEEE INTERNATIONAL VACUUM ELECTRONICS CONFERENCE. NEW YORK: IEEE, p. 298-299 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Analytical computations, measurements and 3-D EM simulations for the calculation of cold parameters in helical SWSs

    Aloisio, M., Carter, R. & Paoloni, C., 2007, EIGHTH IEEE INTERNATIONAL VACUUM ELECTRONICS CONFERENCE. NEW YORK: IEEE, ELECTRON DEVICES SOC & RELIABILITY GROUP, p. 413-414 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency

    Al-rubaye, S., Kadhum, E., Ni, Q. & Anpalagan, A., 1/02/2019, In: IEEE Internet of Things Journal. 6, 1, p. 267-277 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Power Interchange Analysis for Reliable Vehicle-to-Grid Connectivity

    Al-Rubaye, S., Al-Dulaimi, A. & Ni, Q., 21/08/2019, In: IEEE Communications Magazine. 57, 8, p. 105-111 7 p., 8808171.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Kleptography and steganography in blockchains

    Al-Salami, N., 2020, Lancaster University. 168 p.

    Research output: ThesisDoctoral Thesis

  7. Published

    Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity

    Al-Salami, N. & Zhang, B., 6/10/2020, 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS). IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    The UK Programmable Fixed and Mobile Internet Infrastructure: Overview, capabilities and use cases deployment

    Alshaer, H., Uniyal, N., Katsaros, K., Antonakoglou, K., Simpson, S., Abumarshoud, H., Falaki, H., McCherry, P., Rotsos, C., Mahmoodi, T., Kaleshi, D., Hutchison, D., Haas, H. & Simeonidou, D., 1/09/2020, In: IEEE Access. 8, p. 175398 - 175411 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  10. Published

    Multihomed mobile network architecture

    Alsukayti, I. & Edwards, C., 05/2015, IFIP Networking Conference (IFIP Networking) 2015. IFIP, p. 195-203 9 p. 1570067595

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...5 6 7 8 9 10 11 12 ...255 Next

Back to top