Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2002
  2. Published

    An Approach for Rule-base Adaptation using On-line Clustering

    Angelov, P., 09/2002, Proceedings of EUNITE, Albufeira, Portugal, 19-22 September 2002. EUNITE, p. 47-52 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Cipher Appartus

    Komninos, N. (Inventor) & Honary, B. (Inventor), 09/2002, Patent No. 0222201.6

    Research output: Patent

  4. Published

    Crossover codeword algorithm for iteration control

    Tanriover, C. C. & Honary, B., 09/2002, Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th. Vancouver, Canada: IEEE, Vol. 3. p. 1662-1665 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Intelligent adaptive systems

    Hadjiski, M., Angelov, P., Hadjiski, M. (Editor) & Angelov, P. (Editor), 09/2002, Varna, Bulgaria: IEEE Press. 66 p.

    Research output: Book/Report/ProceedingsBook

  6. Published

    Concatenated wavelet-based ring-TCM

    Castineira Moreira, J., Honary, B. & Farrell, P., 08/2002, In: IEE Proceedings - Communications. 149, 4, p. 189-194 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    PROPANE: An environment for examining the propagation of errors in software

    Hiller, M., Jhumka, A., Suri, N. & P.G., F. (Editor), 22/07/2002, Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis: ISSTA '02. ACM, p. 81-85 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Signal Set for Ring-BCM

    Moreira, J. C., Honary, B. & Farrell, P. G., 4/07/2002, In: Electronics Letters. 38, 14, p. 721-722 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A new family of rank codes and applications to cryptography

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 268 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Construction of low density parity check codes: a combinatoric design approach

    Ammar, B., Honary, B., Kou, Y. & Lin, S., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 311 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    On the placement of software mechanisms for detection of data errors

    Hiller, M., Jhumka, A. & Suri, N., 23/06/2002, Proceedings International Conference on Dependable Systems and Networks. p. 135-144 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top