Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Towards a context aware multipath-TCP

    Withnell, R. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on. IEEE, p. 225-228 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Safe space: Examining the effect of interview location on self-disclosure

    Winters, C., Taylor, P. J. & Luther, K., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    The impact of fault models on software robustness evaluations

    Winter, S., Sârbu, C., Suri, N. & Murphy, B., 21/05/2011, Proceedings of the 33rd International Conference on Software Engineering . ACM, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    SimFI: From single to simultaneous software fault injections

    Winter, S., Tretter, M., Sattler, B. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    GRINDER: On Reusability of Fault Injection Tools

    Winter, S., Piper, T., Schwahn, O., Natella, R., Suri, N. & Cotroneo, D., 23/05/2015, 2015 IEEE/ACM 10th International Workshop on Automation of Software Test. IEEE, p. 75-79 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    No PAIN, No Gain? The utility of parallel fault injections

    Winter, S., Schwahn, O., Natella, R., Suri, N., Cotroneo, D., J., K. (ed.) & U., Z. (ed.), 16/05/2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, p. 494-505 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Was it Pod Worthy? A Preparatory Plan for Evaluating Podcasting in Higher Education

    Wingkvist, A. & Alexander, J., 2007, NZCSRSC '07: : New Zealand Computer Science Research Student Conference 2007. 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Conceptual Glossary and Index to the Vulgate Translation of the Gospel according to Mark.

    Wilson, A., Baron, A. & Worth, C., 2007, Hildesheim: Olms-Weidmann. 824 p.

    Research output: Book/Report/ProceedingsBook

  9. Published

    A cloud based tool for knowledge exchange on local scale flood risk

    Wilkinson, M., Mackay, E., Quinn, P. F., Stutter, M., Beven, K., Macleod, C. J. A., Macklin, M. G., Elkhatib, Y., Percy, B. J., Vitolo, C. & Haygarth, P., 15/09/2015, In: Journal of Environmental Management. 161, p. 38-50 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Beta beams for precision measurements of neutrino oscillation parameters

    Wildner, E., Benedetto, E., Hansen, C., De Melo Mendonca, T., Stora, T., Damjanovic, S., Payet, J., Chancé, A., Zorin, V., Izotov, I., Rasin, S., Sidorov, A., Skalyga, V., De Angelis, G., Prete, G., Cinausero, M., Kravchuk, V., Gramegna, F., Marchi, T., Collazuol, G., & 25 othersMezzetto, M., Delbar, T., Loiselet, M., Keutgen, T., Mitrofanov, S., Burt, G., Dexter, A., Lamy, T., Latrasse, L., Marie-Jeanne, M., Sortais, P., Thuillier, T., Debray, F., Trophime, C., Hass, M., Hirsh, T., Berkovits, D., Stahl, A., Vardaci, E., De Nitto, A., Brondi, A., Rana, G. L., Moro, R., De Rosa, G. D. & Palladino, V., 1/12/2012, IPAC 2012 - International Particle Accelerator Conference 2012. p. 3939-3941 3 p. (IPAC 2012 - International Particle Accelerator Conference 2012).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    From responsibility to accountability: working creatively with distributed agency in office energy metering and management

    Whittle, R. K., Ellis, R. J., Marshall, I., Alcock, P., Hutchison, D. & Mauthe, A. U., 11/2015, In: Energy Research and Social Science. 10, p. 240-249 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Parallel computing of QC-LDPC codes on GPUs

    Wells, A. & Honary, B., 07/2009, IEEE 10th International Symposium on Communication Theory and Applications. Ambleside, UK

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Adaptive BCH Encoder/Decoder for DVB-S2 Applications Design and Implementation

    Wells, A. & Honary, B., 07/2007, 9th International Symposium on Communication Theory and Applications. Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Crisis negotiation: from suicide to terrorism intervention

    Wells, S., Taylor, P. & Giebels, E., 2013, Handbook of research in negotiation. Olekalns, M. & Adair, W. (eds.). London: Edward Elgar, p. 473-498 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  16. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    How to Improve the Security Skills of Mobile App Developers: An Analysis of Expert Knowledge

    Weir, C., 2017, Lancaster University. 135 p.

    Research output: ThesisMaster's Thesis

  20. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  22. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  23. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (ed.) & Mazurek, M. (ed.), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  24. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...3 4 5 6 7 8 9 10 ...102 Next

Back to top