Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A comparison of static and dynamic component models for Wireless Sensor Networks

    Porter, B., Roedig, U., Taiani, F. & Coulson, G., 04/2010, Proceedings of the The First International Workshop on Networks of Cooperating Objects (CONET2010). 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2008, In: Journal of Networks. 3, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    A comprehensive review on handcrafted and learning-based action representation approaches for human activity recognition

    Bux, A., Angelov, P. P. & Habib, Z., 23/01/2017, In: Applied Sciences. 7, 1, 37 p., 110.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A compressive sensing assisted massive SM-VBLAST system: error probability performance and capacity analysis

    Xiao, L., Xiao, P., Liu, Z., Yu, W., Haas, H. & Hanzo, L., 31/03/2020, In: IEEE Transactions on Wireless Communications. 19, 3, p. 1990-2005 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A Computational Model for Reputation and Ensemble-Based Learning Model for Prediction of Trustworthiness in Vehicular Ad Hoc Network

    Alharthi, A., Ni, Q., Jiang, R. & Khan, M. A., 15/10/2023, In: IEEE Internet of Things Journal. 10, 20, p. 18248-18258 11 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A computational protocol and software implementation (as a MATLAB application) for biomaker identification in infrared spectroscopy datasets

    Trevisan, J., Angelov, P. & Martin, F., 2010, In: Nature Protocols.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A connection-level call admission control using genetic algorithm for multi-class multimedia services in wireless networks

    Hong, X., Xiao, Y., Ni, Q. & Li, T., 2006, In: International Journal of Mobile Communications. 4, 5, p. 568-580 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A conservative index heuristic for routing problems with multiple heterogeneous service facilities

    Shone, R., Knight, V. A. & Harper, P. R., 1/12/2020, In: Mathematical Methods of Operational Research. 92, 3, p. 511-543 33 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A control theory approach for analyzing the effects of data errors in safety-critical control systems

    Askerdal, O., Gäfvert, M., Hiller, M. & Suri, N., 16/12/2002, Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings. IEEE, p. 105-114 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...255 Next

Back to top