Home > Research > Security Lancaster (Software Security) > Publications & Outputs
View graph of relations

Security Lancaster (Software Security)

  1. 2020
  2. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  3. Published

    Performance-aware Speculative Resource Oversubscription for Large-scale Clusters

    Yang, R., Sun, X., Hu, C., Garraghan, P., Wo, T., Wen, Z., Peng, H., Xu, J. & Li, C., 28/01/2020, In: IEEE Transactions on Parallel and Distributed Systems. 31, 7, p. 1499-1517 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Fog Orchestration and Simulation for IoT Services

    Yang, R., Wen, Z., McKee, D., Lin, T., Xu, J. & Garraghan, P., 1/03/2020, Fog and Fogonomics: Challenges and Practices of Fog Computing, Networking, Strategy, and Economics. Yang, Y., Huang, J., Zhang, T. & Weinman, J. (eds.). Wiley, p. 179-212 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Software-Defined Fog Orchestration for IoT Services

    Yang, R., Wen, Z., McKee, D., Lin, T., Xu, J. & Garraghan, P., 4/03/2020, Fog and Fogonomics: Challenges and Practices of Fog Computing, Communication, Networking, Strategy, and Economics. Yang, Y., Huang, J., Zhang, T. & Weinman, J. (eds.). John Wiley, p. 179-212 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. E-pub ahead of print

    General Access Control Guidance for Cloud Systems: SP 800-210(Draft)

    Hu, V. C., Iorga, M., Bao, W., Li, A., Li, Q. & Gouglidis, A., 1/04/2020, (E-pub ahead of print) Computer Security Resource Center.

    Research output: Other contribution

  8. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Forthcoming

    A cloud gaming framework for dynamic graphical rendering towards achieving distributed game engines

    Bulman, J. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Forthcoming

    Towards GPU Utilization Prediction for Cloud Deep Learning

    Yeung, G-F., Borowiec, D., Friday, A., Harper, R. H. R. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20). USENIX Association

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A Framework to Support ICS Cyber Incident Response and Recovery

    Staves, A., Balderstone, H., Green, B., Gouglidis, A. & Hutchison, D., 24/05/2020. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  13. Published

    Dichotomies in Ontology-Mediated Querying with the Guarded Fragment

    Hernich, A., Lutz, C., Papacchini, F. & Wolter, F., 31/05/2020, In: ACM Transactions on Computational Logic (TOCL). 21, 3, 47 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Agility in Transdisciplinary Research: Lessons Learnt from a Research Sprint on Digital Technologies and Flood Risk Management

    Winter, E., Ferrario, M. A. & Blair, G., 21/06/2020, ICT4S2020: Proceedings of the 7th International Conference on ICT for Sustainability. ACM, p. 147–157 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Trace Sanitizer: Eliminating the Effects of Non-Determinism of Error Propagation Analysis

    Saissi, H., Winter, S., Schwahn, O., Pattabiraman, K. & Suri, N., 23/06/2020, 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Understanding the ecological validity of relying practice as a basis for risk identification

    Anderson, T., Busby, J. & Rouncefield, M., 1/07/2020, In: Risk Analysis. 40, 7, p. 1383-1398 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Human Factors in the Study of Automatic Software Repair: Future Directions for Research with Industry

    Winter, E., Bowes, D., Counsell, S., Hall, T., Haraldsson, S., Nowack, V. & Woodward, J., 6/07/2020, Proceedings - 2020 IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW 2020. New York: Association for Computing Machinery, Inc, p. 285-286 2 p. (Proceedings - 2020 IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW 2020).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Exploiting fault localisation for efficient program repair: 2020 Genetic and Evolutionary Computation Conference, GECCO 2020

    Nowack, V., Bowes, D., Counsell, S., Hall, T., Haraldsson, S., Winter, E., Woodward, J. & SIGEVO, ACM., 8/07/2020, p. 311-312. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  19. Published

    Analysing spatial properties on neighbourhood spaces

    Linker, S., Papacchini, F. & Sevegnani, M., 1/08/2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 66:1-66:14 14 p. MFCS-2020-66. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    ThermoSim: Deep learning based framework for modeling and simulation of thermal-aware resource management for cloud computing environments

    Gill, S. S., Tuli, S., Toosi, A. N., Cuadrado, F., Garraghan, P., Bahsoon, R., Lutfiyya, H., Sakellariou, R., Rana, O., Dustdar, S. & Buyya, R., 1/08/2020, In: Journal of Systems and Software. 166, 20 p., 110596.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    LFC: Combining Autonomous Agents and Automated Planning in the Multi-Agent Programming Contest

    Cardoso, R. C., Ferrando, A. & Papacchini, F., 23/09/2020, The Multi-Agent Programming Contest 2019: Agents Assemble – Block by Block to Victory. Ahlbrecht, T., Dix, J., Fiekas, N. & Krausburg, T. (eds.). Cham: Springer, p. 31-58 28 p. (Lecture Notes in Computer Science ; vol. 12381).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Genetic Improvement @ ICSE 2020

    Langdon, W. B., Petke, J., Fredericks, E., Lee, S., Winter, E., Basios, M., Cohen, M. B., Blot, A., Wagner, M., Bruce, B. R., Yoo, S., Gerasimou, S., Krauss, O., Huang, Y. & Gerten, M. C., 19/10/2020, In: ACM SIGSOFT Software Engineering Notes. 45, 4, p. 24-30 7 p.

    Research output: Contribution to Journal/MagazineJournal article

  24. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 31/10/2020, In: International Journal on Software Tools for Technology Transfer. 22, p. 565-581 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Using Workshops to Improve Security in Software Development Teams

    Weir, C., 23/11/2020, Lancaster University. 206 p.

    Research output: ThesisDoctoral Thesis

  26. Published

    Tails in the cloud: a survey and taxonomy of straggler management within large‑scale cloud data centres

    Singh Gill, S., Ouyang, X. & Garraghan, P., 1/12/2020, In: Journal of Supercomputing. 76, p. 10050–10089 40 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 Next

Back to top