Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Real-time fault detection using recursive density estimation

    Costa, B. S. J., Angelov, P. & Guedes, L. A., 08/2014, In: Journal of Control, Automation and Electrical Systems. 25, 4, p. 428-437 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    A practical implementation of self-evolving cloud-based control of a pilot plant

    Costa, B., Skrjanc, I., Blazic, S. & Angelov, P., 2013, 2013 IEEE International Conference on Cybernetics, CYBCONF-2013, Lausanne, Switzerland13-15 June, 2013. Piscataway, N.J.: IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A new unsupervised approach to fault detection and identification

    Costa, B., Angelov, P. & Guedes, L. A., 07/2014, Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, p. 1557-1564 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Fully unsupervised fault detection and identification based on recursive density estimation and self-evolving cloud-based classifier

    Costa, B. S. J., Angelov, P. & Guedes, L. A., 20/02/2015, In: Neurocomputing. 150, A, p. 289-303 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Online fault detection based on typicality and eccentricity data analytics

    Costa, B. S. J., Bezerra, C. G., Guedes, L. A. & Angelov, P. P., 12/07/2015, Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Unsupervised classification of data streams based on typicality and eccentricity data analytics

    Costa, B. S. J., Bezerra, C. G., Guedes, L. A. & Angelov, P. P., 24/07/2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ). Vancouver Canada: IEEE, p. 58-63 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Evaluation of the socio-economic implications of contractual mobility in roaming architectures

    Corliano, G., Edwards, C. & Race, N., 2012, 2012 IEEE Global Communications Conference (GLOBECOM). New York: IEEE, p. 2840-2845 6 p. (IEEE Global Telecommunications Conference (Globecom)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Computer assisted learning and the dissemination of organisational research

    Cordell, D., Gilbert, M., Lemon, M. & Busby, J. S., 2001, In: BT Technology Journal. 19, 4, p. 109-117 9 p.

    Research output: Contribution to Journal/MagazineJournal article

  9. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (ed.), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Creating a stereoscopic magic-lens to improve depth perception in handheld augmented reality

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 27/08/2013, Proceedings of Mobile HCI 2013. ACM, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Evaluating dual-view perceptual issues in handheld augmented reality: device vs. user perspective rendering

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 9/12/2013, ICMI '13 Proceedings of the 15th ACM on International conference on multimodal interaction. New York: ACM, p. 381-388 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    The use of surrounding visual context in handheld AR: device vs. user perspective rendering

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 28/04/2014, CHI '14 Proceedings of the 32nd annual ACM conference on Human factors in computing systems. New York: ACM, p. 197-206 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Numerical design of high efficiency klystrons using core oscillation bunching

    Constable, D., Lingwood, C. J. & Burt, G. C., 18/11/2015. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    2-D particle-in-cell simulations of high efficiency klystrons

    Constable, D., Lingwood, C. J., Burt, G. C., Syratchev, I., Baikov, A. Y., Marchesin, R. & Kowalczyk, R., 19/04/2016, Proceedings of the 17th IEEE International Vacuum Electronics Conference (IVEC 2016). IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    MAGIC-2D simulations of high efficiency hollow beam klystrons

    Constable, DA., Burt, G. C. & Lingwood, C. J., 18/07/2016. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Published

    Numerical simulation of high efficiency cylindrical beam klystrons

    Constable, D. A., Burt, G. C. & Lingwood, C. J., 18/07/2016. 1 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    High Efficiency Klystron Development for Particle Accelerators

    Constable, D. A., Baikov, A. Y., Burt, G. C., Hill, V., Lingwood, C. J., Guzilov, I. A., Jensen, A., Kowalczyk, R. D., Marchesin, R., Marrelli, C. & Syratchev, I., 1/07/2017, eeFACT2016 Proccedings. Geneva, Switzerland: JACoW, p. 185-187 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    High Efficiency Klystrons Using the COM Bunching Technique

    Constable, D. A., Baikov, A. Y., Burt, G., Kowalczyk, R. D. & Syratchev, I., 1/05/2017, IPAC 2017 Proceedings of the 8th International Particle Accelerator Conference. Arduini, G., Lindroos, M., Pranke, J., Schaa, V. R. W. & Seidel, M. (eds.). Geneva, Switzerland: JACoW, p. 37-39 3 p. (International Particle Accelerator Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Analytical and Numerical Simulation of Multipactor within a Helical Resonant Filter

    Constable, DA., McElhinney, P., Lingwood, C. J., Burt, G. C., Salza, G. & Goussetis, G., 24/04/2017, Vacuum Electronics Conference (IVEC), 2017 Eighteenth International. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    MAGIC2-D simulations of high efficiency klystrons using the core oscillation method

    Constable, D., Lingwood, C. J., Burt, G. C., Syratchev, I., Baikov, A. Y. & Kowalczyk, R., 24/04/2017, Vacuum Electronics Conference (IVEC), 2017 Eighteenth International. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Trust: Missing Piece(s) in the Safety Puzzle.

    Conchie, S., Donald, I. & Taylor, P. J., 10/2006, In: Risk Analysis. 26, 5, p. 1097-1104 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Promoting safety voice with safety-specific transformational leadership: the mediating role of two dimensions of trust

    Conchie, S., Taylor, P. & Donald, I. J., 01/2012, In: Journal of Occupational Health Psychology. 17, 1, p. 105-115 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Trust and distrust in safety leadership: mirror reflections?

    Conchie, S., Taylor, P. J. & Charlton, A., 10/2011, In: Safety Science. 49, 8-9, p. 1208-1214 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Trust-based approaches to safety and production

    Conchie, S. M., Woodcock, H. E. & Taylor, P. J., 6/11/2015, The Wiley Blackwell handbook of the psychology of occupational safety and workplace health. Clarke, S., Probst, T., Guldenmund, F. & Passmore, J. (eds.). Chichester: Wiley-Blackwell, p. 111-132 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  26. Published

    External control versus internalised responsibility in the design of hazardous installations

    Coeckelbergh, M. & Busby, J. S., 2002, Conference of the European Association for the Study of Science and Technology EASST2002 (York) - 2002. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    The responsibility for taking precautions against the risks of engineering design

    Coeckelbergh, M. & Busby, J. S., 2002, International Conference on Research in Ethics and Engineering (Delft) - 2002. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Faster Document Navigation with Space-Filling Thumbnails

    Cockburn, A., Gutwin, C. & Alexander, J., 2006, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, p. 1-10 10 p. (CHI '06).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Hard Lessons: Effort-Inducing Interfaces Benefit Spatial Learning

    Cockburn, A., Kristensson, P. O., Alexander, J. & Zhai, S., 2007, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, p. 1571-1580 10 p. (CHI '07).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In: IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Adaptive Coded Modulation for Time Varying Channels

    Clarke, P., Honary, B. & Shavgulidze, S., 07/2003, Proceedings of the Seventh International Symposium on Communications Theory and Applications held on 13-18 July 2003 at St. Martin's College, Ambleside, UK.. Lancaster: HW Communications Limited

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Multilevel adaptive coded modulation waveforms for HF channels

    Clarke, P. & Honary, B., 06/2003, HF Radio Systems and Techniques, 2003. Ninth International Conference on (Conf. Publ. No. 493). Bath, UK: IEEE, p. 240-243 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    SARIVA: Smartphone App for Real-time Intelligent Video Analytics

    Clarke, C., Angelov, P., Sadeghi Tehran, P. & Yusuf, M., 2014, In: Journal of Automation, Mobile Robotics and Intelligent Systems. 8, 4, p. 15-19 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Building a long term strategy for international collaboration in trustworthy ICT: Security, privacy and trust in global networks and services

    Clarke, J., Suri, N., Riguidel, M. & Pasic, A., 6/07/2011, 2011 First SysSec Workshop. IEEE, p. 90-93 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Trust & security RTD in the internet of things: Opportunities for international cooperation

    Clarke, J., Sharma, A., Suri, N., Castro, R. R. & Lopez, J., 17/08/2012, Proceedings of the First International Conference on Security of Internet of Things. ACM, p. 172-178 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    An efficient TDMA start-up and restart synchronization approach for distributed embedded systems

    Claesson, V., Lönn, H. & Suri, N., 13/09/2004, In: IEEE Transactions on Parallel and Distributed Systems. 15, 8, p. 725-739 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Efficient TDMA synchronization for distributed embedded systems

    Claesson, V., Lönn, H. & Suri, N., 31/10/2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, p. 198-201 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    The event-triggered and time-triggered medium-access methods

    Claesson, V., Ekelin, C. & Suri, N., 16/05/2003, Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003. IEEE, p. 131-134 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    TTET: Event-triggered channels on a time-triggered base

    Claesson, V. & Suri, N., 14/04/2004, ICECCS '04 Proceedings of the Ninth IEEE International Conference on Engineering Complex Computer Systems Navigating Complexity in the e-Engineering Age. ACM, p. 39-46 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  41. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  42. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    DHB-KEY - A Diffie-Hellman Key Distribution Protocol for Wireless Sensor Networks

    Chung, A. & Roedig, U., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  44. Published

    Efficient Key Establishment for Wireless Sensor Networks Using Elliptic Curve Diffie-Hellman

    Chung, A. & Roedig, U., 10/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  45. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  46. Published

    DHB-KEY: An Efficient Key Distribution Scheme for Wireless Sensor Networks

    Chung, A. & Roedig, U., 29/09/2008, MASS 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008. . IEEE, p. 840-846 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging

    Chung, A. & Roedig, U., 06/2009, International Conference on Network and Service Security, 2009. N2S '09. . IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Implementation and Evaluation of Distance-Based Message Authentication

    Chung, A. & Roedig, U., 11/2010, IEEE 7th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2010 . IEEE, p. 519-524 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Challenges in Identifying Network Attacks Using Netflow Data

    Chuah, E., Suri, N., Jhumka, A. & Alt, S., 31/01/2022, 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Opportunistic spectrum sharing for D2D-based URLLC

    Chu, Z., Yu, W., Xiao, P., Zhou, F., Al-Dhahir, N., Ul Quddus, A. & Tafazolli, R., 30/09/2019, In: IEEE Transactions on Vehicular Technology. 68, 9, p. 8995-9006 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top