Home > Research > Security Lancaster (Software Security) > Publications & Outputs
View graph of relations

Security Lancaster (Software Security)

  1. 2020
  2. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  3. Published

    Performance-aware Speculative Resource Oversubscription for Large-scale Clusters

    Yang, R., Sun, X., Hu, C., Garraghan, P., Wo, T., Wen, Z., Peng, H., Xu, J. & Li, C., 28/01/2020, In: IEEE Transactions on Parallel and Distributed Systems. 31, 7, p. 1499-1517 19 p.

    Research output: Contribution to journalJournal articlepeer-review

  4. Published

    Fog Orchestration and Simulation for IoT Services

    Yang, R., Wen, Z., McKee, D., Lin, T., Xu, J. & Garraghan, P., 1/03/2020, Fog and Fogonomics: Challenges and Practices of Fog Computing, Networking, Strategy, and Economics. Yang, Y., Huang, J., Zhang, T. & Weinman, J. (eds.). Wiley, p. 179-212 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to journalJournal articlepeer-review

  6. Published

    Software-Defined Fog Orchestration for IoT Services

    Yang, R., Wen, Z., McKee, D., Lin, T., Xu, J. & Garraghan, P., 4/03/2020, Fog and Fogonomics: Challenges and Practices of Fog Computing, Communication, Networking, Strategy, and Economics. Yang, Y., Huang, J., Zhang, T. & Weinman, J. (eds.). John Wiley, p. 179-212 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. E-pub ahead of print

    General Access Control Guidance for Cloud Systems: SP 800-210(Draft)

    Hu, V. C., Iorga, M., Bao, W., Li, A., Li, Q. & Gouglidis, A., 1/04/2020, Computer Security Resource Center.

    Research output: Other contribution

  8. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to journalJournal articlepeer-review

  9. Forthcoming

    A cloud gaming framework for dynamic graphical rendering towards achieving distributed game engines

    Bulman, J. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Forthcoming

    Towards GPU Utilization Prediction for Cloud Deep Learning

    Yeung, G-F., Borowiec, D., Friday, A., Harper, R. H. R. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20). USENIX Association

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 Next

Back to top