Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    UV-LIGA microfabrication process for sub-terahertz waveguides utilizing multiple layered SU-8 photoresist

    Malek Abadi, S. A. & Paoloni, C., 8/07/2016, In: Journal of Micromechanics and Microengineering. 26, 9, 8 p., 095010.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    UV-LIGA Microfabrication of 0.3 THz Double Corrugated Waveguide

    Sabaawi, A., Doychinov, V., Mathisen, S., David Paul, S., Letizia, R. & Paoloni, C., 9/02/2018, IVEC 2017 - 18th International Vacuum Electronics Conference. IEEE, 2 p. (IVEC 2017 - 18th International Vacuum Electronics Conference; vol. 2018-January).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Utilising motion capture technology to identify trusted testimony in military encounters

    Watson, S. J., Conchie, S. M., Taylor, P. J. & Poppe, R., 2/11/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  4. Published

    Utilising motion capture technology to identify nonverbal indicators of trust judgements

    Watson, S., Conchie, S., Taylor, P. J. & Poppe, R., 23/08/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  5. Published

    Using Workshops to Improve Security in Software Development Teams

    Weir, C., 23/11/2020, Lancaster University. 206 p.

    Research output: ThesisDoctoral Thesis

  6. Published

    Using verifiable author data: Gender and spelling differences in Twitter and SMS

    Baron, A., Tagg, C., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 06/2011. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Using software defined networking to enhance the delivery of video-on-demand

    Georgopoulos, P., Broadbent, M., Farshad, A., Plattner, B. & Race, N., 15/09/2015, In: Computer Communications. 69, p. 79-87 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Using quantum effects in nanomaterials for unique identification

    Young, R. J., Roberts, J. & Speed, P., 5/01/2016, In: SPIE Newsroom. 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Using NEMO to support the global reachability of MANET nodes.

    McCarthy, B., Edwards, C. & Dunmore, M., 04/2009, IEEE INFOCOM 2009. IEEE, p. 2097-2115 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Using NEMO to Extend the Functionality of MANETs.

    McCarthy, B., Edwards, C. & Dunmore, M., 05/2008, IEEE International Conference on Communications Workshops, 2008. ICC Workshops '08.. IEEE, p. 455-460 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Using Evolving Fuzzy Models to predict Crude Oil Distillation Side Streams

    Macias-Hernandez, J. J., Angelov, P. & Zhou, X., 2011, Computer-Aided Design, Manufacturing, Modeling and Simulation . He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Zurich: Trans-Tech Publications, p. 432-437 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Using DSML for Handling Multi-tenant Evolution in Cloud Applications

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 272-279 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In: The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. E-pub ahead of print

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., 14/04/2017, (E-pub ahead of print) Design for Next, 12th EAD Conference Proceedings. European Academy of Design, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Using context switches for VM scaling

    Hadley, J., Roedig, U. & Elkhatib, Y., 9/12/2016. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  18. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    User-level fairness delivered: network resource allocation for adaptive video streaming

    Mu, M., Farshad, A., Simpson, S., Ni, Q. & Race, N. J. P., 15/06/2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS). IEEE, p. 85-94 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Forthcoming

    User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

    Wang, W., Yu, W., Foh, C. H., Gao, D. & Ni, Q., 19/09/2022, (Accepted/In press) Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective

    Pervaiz, H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1609-1616 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    User perception and requirements for future IPTV services: case studies from Finland and UK

    Oksman, V., Tammela, A., Mitchell, K., Ishmael, J., Rouncefield, M. & Race, N., 2010, Proceedings of the 8th international interactive conference on Interactive TV & Video. New York, NY, USA: ACM, p. 1-4 4 p. (EuroITV '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...102 Next

Back to top