Home > Research > Security Lancaster (Software Security) > Publications & Outputs
View graph of relations

Security Lancaster (Software Security)

  1. Forthcoming

    A cloud gaming framework for dynamic graphical rendering towards achieving distributed game engines

    Bulman, J. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A Framework to Support ICS Cyber Incident Response and Recovery

    Staves, A., Balderstone, H., Green, B., Gouglidis, A. & Hutchison, D., 24/05/2020. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    A Passion for Security: Intervening to Help Software Developers

    Weir, C., Becker, I. & Blair, L., 25/05/2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, p. 21-30 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Forthcoming

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 10/12/2020, (Accepted/In press) 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to journalJournal articlepeer-review

  6. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Forthcoming

    Design and Engineering of Resilience for Networked Computer Systems

    Hutchison, D., Rouncefield, M., Gouglidis, A. & Anderson, T., 16/04/2021, (Accepted/In press) Multisystemic Resilience: Adaptation and Transformation in Changing Contexts. Ungar, M. (ed.). Oxford University Press

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 31/10/2020, In: International Journal on Software Tools for Technology Transfer. 22, p. 565-581 17 p.

    Research output: Contribution to journalJournal articlepeer-review

  9. Published

    Fog Orchestration and Simulation for IoT Services

    Yang, R., Wen, Z., McKee, D., Lin, T., Xu, J. & Garraghan, P., 1/03/2020, Fog and Fogonomics: Challenges and Practices of Fog Computing, Networking, Strategy, and Economics. Yang, Y., Huang, J., Zhang, T. & Weinman, J. (eds.). Wiley, p. 179-212 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 Next

Back to top