Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas

    Serafini, M., Bokor, P., Dobre, D., Majuntke, M. & Suri, N., 28/06/2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, p. 353-362 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    SDQ: Enabling rapid QoE experimentation using Software Defined Networking

    Fawcett, L., Mu, M., Broadbent, M. H., Hart, N. P. & Race, N. J. P., 24/07/2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon, Portugal: IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Search+: A resource efficient Peer-to-Peer service discovery mechanism

    Skjegstad, M., Roedig, U. & Johnsen, F. T., 10/2009, IEEE Military Communications Conference, 2009. MILCOM 2009. . IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In: IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Secure and privacy-aware cloud-assisted video reporting service in 5G enabled vehicular networks

    Hashem Eiza, M., Ni, Q. & Shi, Q., 10/2016, In: IEEE Transactions on Vehicular Technology. 65, 10, p. 7868-7881 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Secure and robust multi-constrained QoS aware routing algorithm for VANETs

    Hashem Eiza, M., Owens, T. & Ni, Q., 01/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 1, p. 32-45 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Secure messaging and real time media streaming using enterprise PKI and ECC based certificates

    Ashraf, S., Shirazi, S. N., Nadeem, M. A. & Ikram, N., 2010, Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), 2010 IEEE Region 8 International Conference on. IEEE, p. 159-161 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping

    Su, B., Yu, W., Liu, H., Chorti, A. & Poor, H. V., 31/05/2022, In: IEEE Wireless Communications Letters. 11, 5, p. 878-882 5 p.

    Research output: Contribution to Journal/MagazineLetterpeer-review

  14. Published

    Securing Communication in 6LoWPAN with Compressed IPsec

    Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T. & Roedig, U., 1/06/2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Securing GSM voice through scrambling

    Naeem, I. A., Rauf, U., Ahmad, S. F. & Shirazi, S. N., 2010, Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, p. 156-158 3 p. 5555330

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Security engineering with patterns

    Schumacher, M. & Roedig, U., 1/09/2001, Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  22. Published

    Security of the GPT cryptosystem and its applications to cryptography

    Rashwan, H., Gabidulin, E. M. & Honary, B., 08/2011, In: Security and Communication Networks. 4, 8, p. 937-946 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In: International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Self-adaptive framelet-based communication for wireless sensor networks

    O'Donovan, T., Roedig, U., Benson, J. & Sreenan, C. J., 4/08/2011, In: Computer Networks. 55, 11, p. 2558-2575

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Self-Adaptive Power Control Mechanism in D2D Enabled Hybrid Cellular Network with mmWave Small Cells: An Optimization Approach

    Raza, S. A., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 4/12/2016, Globecom Workshops (GC Wkshps), 2016 IEEE. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Self-disclosure decision making based on intimacy and privacy

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C., 30/11/2012, In: Information Sciences. 211, p. 93-111 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Self-evolving parameter-free Rule-based Controller: SPARC

    Sadeghi-Tehran, P., Cara, A., Angelov, P., Pomares, H., Rojas, I. & Prieto, A., 2012, Fuzzy Systems (FUZZ-IEEE), 2012 IEEE International Conference on. IEEE, p. 754-761 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Self-organised direction aware data partitioning algorithm

    Gu, X., Angelov, P. P., Kangin, D. & Principe, J., 01/2018, In: Information Sciences. 423, p. 80-95 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Self-Organising Fuzzy Logic Classifier

    Gu, X. & Angelov, P. P., 06/2018, In: Information Sciences. 447, p. 36-51 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues

    Dobson, S., Hutchison, D., Mauthe, A. U., Schaeffer-Filho, A. E., Smith, P. & Sterbenz, J. PG., 1/04/2019, In: Proceedings of the IEEE . 107, 4, p. 819-834 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Self-organized Relay Selection for Cooperative Transmission in Vehicular Ad-hoc Networks

    Tian, D., Zhou, J., Sheng, Z., Chen, M., Ni, Q. & Leung, V. C. M., 10/2017, In: IEEE Transactions on Vehicular Technology. 66, 10, p. 9534-9549 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Self-Protection in P2P Networks: Choosing the Right Neighbourhood

    Mauthe, A., Martinovic, I., Leng, A., Zdarsky, F., Steinmetz, R. & Schmitt, J., 09/2006, IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Semantic categorization of web-based documents

    Evans, T. & Angelov, P., 16/12/2004, p. 500-505. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  36. Published

    Semantic image retrieval using region-based relevance feedback

    Torres, J. M., Hutchison, D. & Reis, L. P., 2007, Adaptive Multimedia Retrieval: User, Context, and Feedback 4th International Workshop, AMR 2006, Geneva, Switzerland, July 27-28, 2006, Revised Selected Papers. Marchand-Maillet, S., Bruno, E., Nürnberger, A. & Detyniecki, M. (eds.). Berlin: Springer, p. 192-206 15 p. (Lecture Notes in Computer Science; vol. 4398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Semantic tagging and early modern collocates

    Alexander, M., Baron, A., Dallachy, F., Piao, S., Rayson, P. & Wattam, S., 22/07/2015, p. 8-10. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  38. Published

    Semiconductor devices for quantum technologies

    Young, R., 22/09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  39. Published

    Semiconductor quantum dots for quantum light sources

    Young, M., Roberts, J. & Young, R., 4/10/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  40. Published

    Semi-supervised deep rule-based approach for image classification

    Gu, X. & Angelov, P. P., 07/2018, In: Applied Soft Computing. 68, p. 53-68 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Sender-adaptive and receiver-driven layered multicast for scalable video over the Internet

    Zhang, Q., Guo, Q., Ni, Q., Zhu, W. & Zhang, Y-Q., 04/2005, In: IEEE Transactions on Circuits and Systems for Video Technology. 15, 4, p. 482-495 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Sense and Avoid in UAS: Research and Applications

    Angelov, P., 1/04/2012, Hoboken, NJ: John Wiley and Sons. 384 p.

    Research output: Book/Report/ProceedingsBook

  43. Published

    Sensor Network Calculus - A Framework for Worst Case Analysis.

    Roedig, U. & Schmitt, J., 30/06/2005, Distributed Computing in Sensor Systems: First IEEE International Conference, DCOSS 2005, Marina del Rey, CA, USA, June 30 – July 1, 2005. Proceedings. Prasanna, V. K., Iyengar, S. S., Spirakis, P. G. & Welsh, M. (eds.). Berlin: Springer Verlag, p. 141-154 14 p. (Lecture Notes in Computer Science; vol. 3560).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Sensor Network Calculus with Multiple Sinks

    Schmitt, J., Zdarsky, F. & Roedig, U., 05/2006, Proceedings of the Performance Control in Wireless Sensor Networks Workshop at the 2006 IFIP Networking Conference. p. 6-13 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Sensor Placement Modes for Smartphone based Pedestrian Dead Reckoning

    Ayub, S., Zhou, X., Honary, S., Bahraminasab, A. & Honary, B., 09/2011, Computer, Informatics, Cybernetics and Applications: Proceedings of the CICA 2011. He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Berlin: Springer Verlag, p. 123-132 10 p. (Lecture Notes in Electrical Engineering; vol. 107).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Sequence Detection Based on a Variable State Trellis for Multidimensional ISI Channels

    Moinian, A., Fagoonee, L., Coene, W. M. J. & Honary, B., 02/2007, In: IEEE Transactions on Magnetics. 43, 2, p. 580-587 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    SeReCP: A secure and reliable communication platform for the smart grid

    Demir, K., Suri, N., M., K. (ed.), D.S., K. (ed.) & V., V. (ed.), 22/01/2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 175-184 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Service Availability: Second International Service Availability Symposium, ISAS 2005, Berlin, Germany, April 25-26, 2005, Revised Selected Papers

    Malek, M. (ed.), Nett, E. (ed.) & Suri, N. (ed.), 2005, Springer.

    Research output: Book/Report/ProceedingsProceedings

  50. Published

    Service Design, New Media and Community Development

    Bury, S., Cheverst, K., Ishmael, J., Mitchell, K., Race, N., Rouncefield, M., Smith, P. & Taylor, N., 2011, Design for services. Meroni, A. & Sangiorgi, D. (eds.). Farnham: Gower, p. 125-130 6 p. (Design for social responsibility).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Back to top