Home > Research > Security Lancaster (Security Futures) > Publications & Outputs
View graph of relations

Security Lancaster (Security Futures)

  1. Chapter
  2. Published

    Hegemony in Chinese? Ba in Chinese international relations

    Nordin, A., 15/02/2016, Politics of the ‘other’ in India and China: western concepts in non-western contexts. König, L. & Chaudhuri, B. (eds.). London: Routledge, (Routledge Contemporary Asia).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Ethnography up the stream: the UK ‘let them drown’ policy and the politics of bordering Europe

    Follis, K., 11/02/2016, Externalizing migration management: Europe, North America and the spread of 'remote control' practices. Zaiotti, R. (ed.). London: Routledge, (Routledge Research in Place, Space and Politics).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Bordering on the unacceptable in China and Europe: “Cao ni ma” and “nique ta mère”

    Nordin, A., 2014, European-East Asian borders in translation. Liu, J. C. H. & Vaughan-Williams, N. (eds.). London: Routledge, p. 166-181 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Conference contribution/Paper
  6. Published

    The shadow warriors: in the no man’s land between industrial control systems and enterprise IT systems

    Zanutto, A., Shreeve, B. O., Follis, K., Busby, J. S. & Rashid, A., 12/07/2017, 3rd Workshop on Security Information Workers (WSIW 2017): In conjunction with 13th Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    On the role of latent design conditions in cyber-physical systems security

    Frey, S., Rashid, A., Zanutto, A., Busby, J. S. & Szmagalska-Follis, K., 14/05/2016, SEsCPS '16 Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systemss, SEsCPS 2015, Austin, Texas. New York: ACM, p. 43-46 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A model for characterizing cyberpower

    Venables, A., Shaikh, S. & Shuttleworth, J., 2015, Critical Infrastructure Protection. USA: Springer, Vol. 9. p. 3-16 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Other chapter contribution
  11. Published

    The Maritime Geopolitics of the Black Sea: Keeping the Russians ashore, the Ukrainians afloat and the Turks onboard!

    Germond, B., 4/04/2024, From Synergy to Strategy in the Black Sea Region. Assessing Opportunities and Challenges. Bucharest: European Institute of Romania, p. 76-78 (European Institute of Romania Working Paper Series; vol. 51).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  12. Conference paper
  13. Published

    Should we securitise the oceans? Maritime security and the environmental agenda at sea

    Edmunds, T. & Germond, B., 6/04/2024.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  14. Published

    The Projection of Cyberpower from the Maritime Environment

    Venables, A., 30/06/2016. 12 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

Previous 1 2 3 4 5 6 7 8 ...12 Next

Back to top