Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Towards a context aware multipath-TCP

    Withnell, R. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on. IEEE, p. 225-228 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Safe space: Examining the effect of interview location on self-disclosure

    Winters, C., Taylor, P. J. & Luther, K., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    The impact of fault models on software robustness evaluations

    Winter, S., Sârbu, C., Suri, N. & Murphy, B., 21/05/2011, Proceedings of the 33rd International Conference on Software Engineering . ACM, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    SimFI: From single to simultaneous software fault injections

    Winter, S., Tretter, M., Sattler, B. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    GRINDER: On Reusability of Fault Injection Tools

    Winter, S., Piper, T., Schwahn, O., Natella, R., Suri, N. & Cotroneo, D., 23/05/2015, 2015 IEEE/ACM 10th International Workshop on Automation of Software Test. IEEE, p. 75-79 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    No PAIN, No Gain? The utility of parallel fault injections

    Winter, S., Schwahn, O., Natella, R., Suri, N., Cotroneo, D., J., K. (ed.) & U., Z. (ed.), 16/05/2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering. IEEE, p. 494-505 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Was it Pod Worthy? A Preparatory Plan for Evaluating Podcasting in Higher Education

    Wingkvist, A. & Alexander, J., 2007, NZCSRSC '07: : New Zealand Computer Science Research Student Conference 2007. 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Conceptual Glossary and Index to the Vulgate Translation of the Gospel according to Mark.

    Wilson, A., Baron, A. & Worth, C., 2007, Hildesheim: Olms-Weidmann. 824 p.

    Research output: Book/Report/ProceedingsBook

  9. Published

    A cloud based tool for knowledge exchange on local scale flood risk

    Wilkinson, M., Mackay, E., Quinn, P. F., Stutter, M., Beven, K., Macleod, C. J. A., Macklin, M. G., Elkhatib, Y., Percy, B. J., Vitolo, C. & Haygarth, P., 15/09/2015, In: Journal of Environmental Management. 161, p. 38-50 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Beta beams for precision measurements of neutrino oscillation parameters

    Wildner, E., Benedetto, E., Hansen, C., De Melo Mendonca, T., Stora, T., Damjanovic, S., Payet, J., Chancé, A., Zorin, V., Izotov, I., Rasin, S., Sidorov, A., Skalyga, V., De Angelis, G., Prete, G., Cinausero, M., Kravchuk, V., Gramegna, F., Marchi, T., Collazuol, G., & 25 othersMezzetto, M., Delbar, T., Loiselet, M., Keutgen, T., Mitrofanov, S., Burt, G., Dexter, A., Lamy, T., Latrasse, L., Marie-Jeanne, M., Sortais, P., Thuillier, T., Debray, F., Trophime, C., Hass, M., Hirsh, T., Berkovits, D., Stahl, A., Vardaci, E., De Nitto, A., Brondi, A., Rana, G. L., Moro, R., De Rosa, G. D. & Palladino, V., 1/12/2012, IPAC 2012 - International Particle Accelerator Conference 2012. p. 3939-3941 3 p. (IPAC 2012 - International Particle Accelerator Conference 2012).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    From responsibility to accountability: working creatively with distributed agency in office energy metering and management

    Whittle, R. K., Ellis, R. J., Marshall, I., Alcock, P., Hutchison, D. & Mauthe, A. U., 11/2015, In: Energy Research and Social Science. 10, p. 240-249 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A programmable SDN+NFV-based architecture for UAV telemetry monitoring

    White, K., Denney, E., Knudson, M. D., Marnerides, A. & Pezaros, D., 20/07/2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, p. 522-527 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Parallel computing of QC-LDPC codes on GPUs

    Wells, A. & Honary, B., 07/2009, IEEE 10th International Symposium on Communication Theory and Applications. Ambleside, UK

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Adaptive BCH Encoder/Decoder for DVB-S2 Applications Design and Implementation

    Wells, A. & Honary, B., 07/2007, 9th International Symposium on Communication Theory and Applications. Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Crisis negotiation: from suicide to terrorism intervention

    Wells, S., Taylor, P. & Giebels, E., 2013, Handbook of research in negotiation. Olekalns, M. & Adair, W. (eds.). London: Edward Elgar, p. 473-498 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  16. Published

    Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    How to Improve the Security Skills of Mobile App Developers: Comparing and Contrasting Expert Views

    Weir, C., Rashid, A. & Noble, J., 22/06/2016, Proceedings of the 2016 ACM Workshop on Security Information Workers. Biddle, R., Chu, B., Lipford, H. & Murphy-Hill, E. (eds.). New York: USENIX Association, 7 p. 1

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Reaching the Masses: A New Subdiscipline of App Programmer Education

    Weir, C., Rashid, A. & Noble, J., 13/11/2016, FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, p. 936-939 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    How to Improve the Security Skills of Mobile App Developers: An Analysis of Expert Knowledge

    Weir, C., 2017, Lancaster University. 135 p.

    Research output: ThesisMaster's Thesis

  20. Published

    I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security

    Weir, C., Rashid, A. & Noble, J., 29/04/2017, EuroUSEC 2017: the 2nd European Workshop on Usable Security. Reston, VA: Internet Society, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Developer Essentials: Top Five Interventions to Support Secure Software Development

    Weir, C., Rashid, A. & Noble, J., 30/03/2017, Lancaster: Lancaster University. 9 p.

    Research output: Book/Report/ProceedingsCommissioned report

  22. Published

    Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C., Blair, L., Noble, J., Becker, I. & Sasse, A., 25/05/2018, Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsCommissioned report

  23. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (ed.) & Mazurek, M. (ed.), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  24. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Using Workshops to Improve Security in Software Development Teams

    Weir, C., 23/11/2020, Lancaster University. 206 p.

    Research output: ThesisDoctoral Thesis

  29. Published

    Do You Speak Cyber? Talking Security with Developers of Health Systems and Devices

    Weir, C., Dyson, A. & Prince, D., 31/01/2023, In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  31. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Connected tools in digital design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 1/04/2015, In: IEEE Pervasive Computing. 14, 2, p. 18-21 4 p.

    Research output: Contribution to Journal/MagazineJournal article

  33. Published

    Shape Display Shader Language (SDSL): a new programming model for shape changing displays

    Weichel, C., Alexander, J. & Hardy, J., 04/2015, CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 1121-1126 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    ReForm: integrating physical and digital design through bidirectional fabrication

    Weichel, C., Hardy, J., Alexander, J. & Gellersen, H., 11/2015, UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. New York: ACM, p. 93-102 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. E-pub ahead of print

    i2Key: A Cross-sensor Symmetric Key Generation System using Inertial Measurements and Inaudible Sound

    Wei, B., Xu, W., Li, K., Luo, C. & Zhang, J., 4/05/2022, (E-pub ahead of print) IPSN’22: 2022 21st ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). ACM, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Towards smarter SDN switches: revisiting the balance of intelligence in SDN networks

    Weekes, J., 30/09/2019, Lancaster University. 216 p.

    Research output: ThesisDoctoral Thesis

  37. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Utilising motion capture technology to identify nonverbal indicators of trust judgements

    Watson, S., Conchie, S., Taylor, P. J. & Poppe, R., 23/08/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  39. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Utilising motion capture technology to identify trusted testimony in military encounters

    Watson, S. J., Conchie, S. M., Taylor, P. J. & Poppe, R., 2/11/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  41. Published
  42. Published

    The Manipulative Presentation Techniques of Controlling and Coercive Offenders

    Watson, S. J., Luther, K., Jackson, J., Taylor, P. J. & Alison, L., 25/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  43. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  44. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    A Fast Model of a 1-D Nonlinear Beam-Wave Interaction for a 225GHz TWT

    Waring, R., Hu, Y. & Paoloni, C., 23/06/2015, 8th UK-Europe-China Workshop on mm-waves and THz Technologies . IEEE, 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    A fast model of a 1-D nonlinear beam-wave interaction for a 225 GHz TWT

    Waring, R., Hu, Y. & Paoloni, C., 14/09/2015, 2015 8th UK, Europe, China Millimeter Waves and THz Technology Workshop (UCMMT). IEEE, p. 1-3 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Lagrangian simulator for Millimetre Wave TWT Based on Non-rotationally Symmetric Slow-Wave Structure

    Waring, R. & Paoloni, C., 09/2017, In: Journal of Electromagnetic Waves and Applications. 31, 17, p. 1902-1913 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Lagrangian Large Signal Model for Double Corrugated Waveguides

    Waring, R. & Paoloni, C., 25/09/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  49. Published

    Lagrangian Large Signal Model for Double Corrugated Waveguide

    Waring, R. & Paoloni, C., 04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  50. Published

    Comparison of couplers for 0.346 THz DCW-BWO

    Waring, R., Paoloni, C., Gamzina, D., Popovic, B., Himes, L., Letizia, R., Tang, Y., Li, H., Pan, P., Feng, J. & Luhmann, N. C., 7/03/2017, Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016. Yu, J. & Chen, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 208-209 2 p. 7874013. (Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...51 Next

Back to top