Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2010
  2. Published
    No renderer
  3. Published

    Evading virus detection using code obfuscation

    Murad, K., Shirazi, S. N., Bin Zikria, Y. & Ikram, N., 2010, Future Generation Information Technology. Kim, T. H., Lee, Y. H., Kang, B. H. & Slezak, D. (eds.). Springer, p. 394-401 8 p. (Lecture Notes in Computer Science; vol. 6485).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Evaluation of QoS Parameters for Real-time Rich Media Applications Using a Test-bed Implementation

    Panchadcharam, S., Ni, Q. & Taylor, G. A., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 343-348 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Forecasting Time-Series for NN GC1 using Evolving Takagi-Sugeno (eTS) Fuzzy Systems with On-line Inputs Selection

    Andreu, J. & Angelov, P., 2010, 2010 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2010). New York: IEEE, p. 1479-1483 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    FORTEL: Forecasting routing technique using location information for Mobile Ad hoc networks

    Noureddine, H., Hamed, A. & Ni, Q., 2010, Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), 2010 IEEE 21st International Symposium on. IEEE, p. 473-478 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    GesText: Accelerometer-Based Gestural Text-Entry Systems

    Jones, E., Alexander, J., Andreou, A., Irani, P. & Subramanian, S., 2010, Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI'10). New York, NY, USA: ACM, p. 2173-2182 10 p. (CHI '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    High-speed, in-band performance measurement instrumentation for next generation IP networks

    Pezaros, D. P., Georgopoulos, K. & Hutchison, D., 2010, In: Computer Networks. 54, 18, p. 3246-3263 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Human Activity Recognition in Intelligent Home Environments: An Evolving Approach

    Antonio Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 2010, ECAI 2010 - 19th European Conference on Artificial Intelligence. Coelho, H., Studer, R. & Wooldridge, M. (eds.). Amsterdam: IOS Press, p. 1047-1048 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Improving the precision of corpus methods: The standardized version of Early Modern English Medical Texts

    Lehto, A., Baron, A., Ratia, M. & Rayson, P., 2010, Early Modern English Medical Texts: Corpus description and studies. Taavitsainen, I. & Pahta, P. (eds.). Amsterdam: John Benjamins, p. 279-289 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    Incorporating mobile sensor networks into the internet: an all IP approach

    McCarthy, B., Edwards, C., Varakliotis, S. & Kirstein, P., 2010, MobiArch '10: Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture. New York, NY, USA: ACM, p. 15-20 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    INDEXYS, a logical step beyond GENESYS

    Eckel, A., Milbredt, P., Al-Ars, Z., Schneele, S., Vermeulen, B., Csertán, G., Scheerer, C., Suri, N., Khelil, A., Fohler, G., Obermaisser, R. & Fidi, C., 2010, Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer, Vol. 6351 LNCS. p. 431-451 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    Intelligent Autonomous Handover in iMANETs

    McCarthy, B., Georgopoulos, P. & Edwards, C., 2010, MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking. New York: ACM, p. 86-92 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  16. Published

    Joint Channel Parameter Estimation Using Evolutionary Algorithm

    Li, W. & Ni, Q., 2010, Communications (ICC), 2010 IEEE International Conference on. New York: IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Linkage analysis in cases of serial burglary: comparing the performance of university students, police professionals, and a logistic regression model

    Bennell, C., Bloomfield, S., Snook, B., Taylor, P. & Barnes, C., 2010, In: Psychology, Crime and Law. 16, 6, p. 507-524 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Location Awareness Rescue System : Support for Mountain Rescue Teams

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, 9th IEEE International Symposium on Network Computing and Applications (NCA), 2010 . IEEE, p. 243-246 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Low energy RF accelerator for various applications

    Ambattu, P., Burt, G., Tahir, I., Corlett, P., Moss, A. & McIntosh, P. A., 2010, Proceedings of Linear Accelerator Conference LINAC2010. p. 127-129 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    MeshUp: reliably evolving a living lab

    Ishmael, J., Hugelshofer, F., Smith, P. & Race, N. J. P., 2010, Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization. New York, NY, USA: ACM, p. 23-30 8 p. (WiNTECH '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    MIMO-UWB channel modelling using a 3D ray tracing simulator

    Asif, H., Zeng, Y., Honary, B. & Ahmed, H., 2010, Wireless, Mobile and Multimedia Networks (ICWMNN 2010), IET 3rd International Conference on. IEEE, p. 90-94 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    MPLS unleashed: remedy using IPSEC over MPLS VPN

    Shirazi, S. N., Asim, M., Irfan, M. & Ikram, N., 2010, Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Bandyopadhyay, S. K., Adi, W., Kim, T.-H. & Xiao, Y. (eds.). Berlin: Springer-Verlag, p. 241-248 8 p. (Communications in Computer and Information Science; vol. 76).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    MPM: Map based Predictive Monitoring for Wireless Sensor Networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2010, Autonomic Computing and Communications Systems: Third International ICST Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected Papers. Springer, Vol. 23 LNICST. p. 79-95 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    On efficient models for model checking message-passing distributed protocols

    Bokor, P., Serafini, M. & Suri, N., 2010, Formal Techniques for Distributed Systems: Joint 12th IFIP WG 6.1 International Conference, FMOODS 2010 and 30th IFIP WG 6.1 International Conference, FORTE 2010, Amsterdam, The Netherlands, June 7-9, 2010. Proceedings. Springer, Vol. 6117 LNCS. p. 216-223 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Pervasive technologies, risk and accountability

    Kinder, K. E., Boos, D., Grote, G. & Busby, J. S., 2010, Annual SRA-Europe Meeting, Society for Risk Analysis Europe (London) - 2010. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Quality of information in wireless sensor networks: A survey

    Sachidananda, V., Khelil, A. & Suri, N., 2010.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Back to top