Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A Selective Delayed Channel Access (SDCA) for the high-throughput IEEE 802.11n

    Skordoulis, D., Ni, Q. & C. Zarakovitis, C., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. New York: IEEE, p. 1173-1178 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A Self-Learning Fuzzy Classifier with Feature Selection for Intelligent interrogation of mid-IR spectroscopy data from exfoliative cervical cytology using selflearning classifier eClass.

    Kelly, J. G., Angelov, P. P., Walsh, M. J., Pollock, H. M., Pitt, M. A., Martin-Hirsch, P. L. & Martin, F. L., 2008, In: International Journal of Computational Intelligence Research. 4, 4, p. 392-401 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A Semi-autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    D'Antonio, S., Romano, S., Simpson, S., Smith, P. & Hutchison, D., 10/2008, Self-Organizing Systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer, p. 230-241 12 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A semiconductor source of triggered entangled photon pairs

    Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 12/01/2006, In: Nature. 439, 7073, p. 179-182 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A Sensor Fusion Method for Smart phone Orientation Estimation

    Ayub, S., Bahraminasab, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A simple fuzzy rule-based system through vector membership and kernel-based granulation.

    Angelov, P. & Yager, R., 9/07/2010, 5th IEEE International Conference Intelligent Systems (IS), 2010 . IEEE, p. 349-354 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

    Hirst, S. A. & Honary, B., 2001, Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 38-43 6 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A site-controlled quantum dot system offering both high uniformity and spectral purity

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 1/06/2009, In: Applied Physics Letters. 94, 22, p. - 3 p., 223121.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A situational analysis of how barriers to systemic failure are undermined during accident sequences

    Busby, J. S., Chung, P. W. H. & Wen, Q., 2004, In: Journal of Risk Research. 7, 7/8, p. 811-826 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published
  12. Published

    A Smart approach for GPT cryptosystem based on rank codes

    Rashwan, H., Gabidulin, E. M. & Honary, B., 2010, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on. IEEE, p. 2463-2467 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published
  16. Published

    A Stochastic Programming Model for Slot Allocation at Congested Airports

    Fairbrother, J., Shone, R., Glazebrook, K. & Zografos, K. G., 17/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  17. Published

    A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed.

    Mohr, M., Edwards, C. & McCarthy, B., 18/04/2008, In: Computer Communications. 31, 6, p. 1148 - 1159

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    A study on helix pitch tolerance impact on TWT small-signal gain

    D'Agostino, S. & Paoloni, C., 12/2002, In: IEEE Electron Device Letters. 23, 12, p. 746-748 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    A survey of key management for secure group communications.

    Rafaeli, S. & Hutchison, D., 1/09/2003, In: ACM Computing Surveys. 35, 3, p. 309-329 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    A survey of mobility in information-centric networks

    Tyson, G., Sastry, N., Cuevas, R., Rimac, I. & Mauthe, A., 1/12/2013, In: Communications of the ACM. 56, 12, p. 90-98 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    A survey of mobility in information-centric networks: challenges and research directions

    Tyson, G., Sastry, N., Rimac, I., Cuevas, R. & Mauthe, A., 2012, NoM '12: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications. New York: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In: IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In: Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...4 5 6 7 8 9 10 11 ...102 Next

Back to top