Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  2. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  3. Published

    Resolving multi-party privacy conflicts in social media

    Such, J. M. & Criado Pacheco, N., 2/06/2016, In: IEEE Transactions on Knowledge and Data Engineering. 28, 7, p. 1851-1863 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Information assurance techniques: perceived cost effectiveness

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 07/2016, In: Computers and Security. 60, p. 117-133 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Intelligent Cybersecurity Agents [Guest editors' introduction]

    Such, J. M., Criado Pacheco, N., Vercouter, L. & Rehak, M., 29/09/2016, In: IEEE Intelligent Systems. 31, 5, p. 3-7 5 p.

    Research output: Contribution to Journal/MagazineEditorial

  6. Published

    An active learning technique enhanced with electronic polls

    Such, J. M., Criado Pacheco, N. & Garcia-Fornes, A., 2015, In: International Journal of Engineering Education. 31, 4, p. 1048-1057 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Collaborative IT Outsourcing in the Public Sector: A Case Analysis of Standard Business Reporting in Australia

    Sun, R., Gregor, S. & Keating, B., 10/12/2014, Proceedings of the 25th Australasian Conference on Information Systems. p. 1-11 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Information Technology Platforms: Conceptualisation and a Review of Emerging Research in IS Research

    Sun, R., Gregor, S. & Keating, B., 2015, Proceedings of the 26th Australasian Conference on Information Systems. p. 1-17 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Demystifying the Paradox of Stability and Flexibility in Information Systems Design: An Affordance Perspective

    Sun, R. & Zhang, M., 12/12/2018, Proceedings of the 38th International Conference on Information Systems. p. 1-15 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Generativity and the Paradox of Stability and Flexibility in a Platform Architecture: A Case of the Oracle Cloud Platform

    Sun, R., Gregor, S. & Fielt, E., 31/12/2021, In: Information and Management. 58, 8, 21 p., 103548.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Impact of content ideology on social media opinion polarization: The moderating role of functional affordances and symbolic expressions

    Sun, R., Zhu, H. & Guo, F., 31/01/2023, In: Decision Support Systems. 164, 13 p., 113845.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Design of an optimal Bayesian incentive compatible broadcast protocol for ad hoc networks with rational nodes

    Suri, N. & Narahari, Y., 2008, In: IEEE Journal on Selected Areas in Communications. 26, 7, p. 1138-1148 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    On dependability driven software and hardware integration

    Suri, N., 12/05/2004, Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.. IEEE, p. 45-49 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Panel statement: Why progress in (composite) fault tolerant real-time systems has been slow (-er than expected... & what can we do about it?)

    Suri, N., 18/10/2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004.. IEEE, p. 112-113 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    The need for a generalized compositional framework

    Suri, N., 3/03/2004, 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.. IEEE, p. 340 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Message from the program chair

    Suri, N., 2005, Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05). IEEE, 1 p. (Proc. IEEE Int. Symp. High Assur. Syst. Eng.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    An auction algorithm for procuring wireless channel in a heterogenous wireless network

    Suri, N. & Narahari, Y., 11/04/2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    An efficient pricing based protocol for broadcasting in wireless ad hoc networks

    Suri, N., Narahari, Y. & Manjunath, D., 8/01/2006, 2006 1st International Conference on Communication Systems Software & Middleware. IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Broadcast in ad hoc wireless networks with selfish nodes: A Bayesian incentive compatibility approach

    Suri, N. & Narahari, Y., 7/01/2007, 2007 2nd International Conference on Communication Systems Software and Middleware. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Message from the DCCS program chair

    Suri, N., 24/06/2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, p. ii 1 p. (Proc. Int. Conf. Dependable Syst. Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  24. Published

    Design of a parallel interconnect based on communication pattern considerations.

    Suri, N. & Mendelson, A., 2001, In: Parallel Algorithms Appl.. 16, 4, p. 243-271 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Dependable Embedded Systems Special Day Panel: Issues and Challenges in Dependable Embedded Systems.

    Suri, N., Fetzer, C., Abraham, J. A., Poledna, S., Mendelson, A. & Mitra, S., 2008, 2008 Design, Automation and Test in Europe. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published
  27. Published

    Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

    Suri, N., 30/03/2020, 2019 38th Symposium on Reliable Distributed Systems (SRDS). Lyon, France, Vol. 2019. p. 71-82 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Distributed Systems Security

    Suri, N., 1/10/2019, CyBOK Knowledge Base. Lupu, E. (ed.). Bristol: University of Bristol, p. 38

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  29. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  30. Published

    Implementation of a Deterministic Wireless Sensor Network

    Suriyachai, P., Roedig, U. & Scott, A., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  31. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Implementation of a MAC protocol for QoS support in wireless sensor networks

    Suriyachai, P., Roedig, U. & Scott, A., 9/03/2009, IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009.. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Time-Critical Data Delivery in Wireless Sensor Networks

    Suriyachai, P., Brown, J. & Roedig, U., 06/2010, Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2010). Rajaraman, R., Moscibroda, T., Dunkels, A. & Scaglione, A. (eds.). Berlin: Springer, p. 216-229 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Dimensioning of Time-Critical WSNs -- Theory, Implementation and Evaluation

    Suriyachai, P., Roedig, U., Scott, A., Gollan, N. & Schmitt, J., 08/2011, In: International Journal of Mobile Communications. 6, 5, p. 360-369 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    OSA: one-class recursive SVM algorithm with negative samples for fault detection

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 2013, Artificial neural networks and machine learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 194-207 14 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Incremental anomaly identification by adapted SVM method

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 08/2013, International Joint Conference on Neural Networks, IJCNN-2013, Dallas, TX, USA, 3-9 August, 2013. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  38. Published

    MAP-based modeling and design of wireless sensor networks with OMNeT++

    Szczytowski, P., Khelil, A. & Suri, N., 13/07/2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems. IEEE, p. 162-169 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    LEHP: Localized energy hole profiling in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 22/06/2010, The IEEE symposium on Computers and Communications. IEEE, p. 100-106 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    MAP++: support for map-based WSN modeling and design with OMNeT++.

    Szczytowski, P., Khelil, A. & Suri, N., 2009, 2nd International ICST Workshop on OMNeT++. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    "I didn't spel that wrong did i. Oops": Analysis and standardisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 27/05/2010. 23 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  45. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2012, In: Lingvisticæ Investigationes. 35, 2, p. 367-388 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  47. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top