Home > Research > Security Lancaster (Software Security) > Publications & Outputs
View graph of relations

Security Lancaster (Software Security)

  1. Forthcoming

    A cloud gaming framework for dynamic graphical rendering towards achieving distributed game engines

    Bulman, J. & Garraghan, P., 1/05/2020, (Accepted/In press) The 12th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '20).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A Framework to Support ICS Cyber Incident Response and Recovery

    Staves, A., Balderstone, H., Green, B., Gouglidis, A. & Hutchison, D., 24/05/2020. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    A Passion for Security: Intervening to Help Software Developers

    Weir, C., Becker, I. & Blair, L., 25/05/2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, p. 21-30 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Agility in Transdisciplinary Research: Lessons Learnt from a Research Sprint on Digital Technologies and Flood Risk Management

    Winter, E., Ferrario, M. A. & Blair, G., 21/06/2020, ICT4S2020: Proceedings of the 7th International Conference on ICT for Sustainability. ACM, p. 147–157 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    An Overview of Verification and Validation Challenges for Inspection Robots

    Fisher, M., Cardoso, R. C., Collins, E. C., Dadswell, C., Dennis, L. A., Dixon, C., Farrell, M., Ferrando, A., Huang, X., Jump, M., Kourtis, G., Lisitsa, A., Luckcuck, M., Luo, S., Page, V., Papacchini, F. & Webster, M. T., 29/04/2021, In: Robotics. 10, 2, 29 p., 67.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 30/06/2021, 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, p. 908-913 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Analysing spatial properties on neighbourhood spaces

    Linker, S., Papacchini, F. & Sevegnani, M., 1/08/2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 66:1-66:14 14 p. MFCS-2020-66. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Applying Human Values Theory to Software Engineering Practice: Lessons and Implications

    Ferrario, M. A. & Winter, E., 1/03/2023, In: IEEE Transactions on Software Engineering. 49, 3, p. 973-990 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Automated Planning and BDI Agents: A Case Study

    Cardoso, R. C., Ferrando, A. & Papacchini, F., 25/09/2021, Advances in Practical Applications of Agents, Multi-Agent Systems, and Social Good. The PAAMS Collection: 19th International Conference, PAAMS 2021, Salamanca, Spain, October 6–8, 2021, Proceedings. Dignum, F., Corchado, J. M. & Prieta, F. D. L. (eds.). Cham: Springer, p. 52-63 12 p. (Lecture Notes in Computer Science ; vol. 12946).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Bridging the gap between single- and multi-model predictive runtime verification

    Ferrando, A., Cardoso, R. C., Farrell, M., Luckcuck, M., Papacchini, F., Fisher, M. & Mascardi, V., 18/08/2022, In: Formal Methods in System Design. 59, 1-3, p. 44-76 33 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Characterizing positively invariant sets: Inductive and topological methods

    Ghorbal, K. & Sogokon, A., 30/11/2022, In: Journal of Symbolic Computation. 113, p. 1-28 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Design and Engineering of Resilience for Networked Computer Systems

    Hutchison, D., Rouncefield, M., Gouglidis, A. & Anderson, T., 26/08/2021, Multisystemic Resilience: Adaptation and Transformation in Changing Contexts. Ungar, M. (ed.). Oxford University Press, p. 663-681 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    Dichotomies in Ontology-Mediated Querying with the Guarded Fragment

    Hernich, A., Lutz, C., Papacchini, F. & Wolter, F., 31/05/2020, In: ACM Transactions on Computational Logic (TOCL). 21, 3, 47 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Do You Speak Cyber? Talking Security with Developers of Health Systems and Devices

    Weir, C., Dyson, A. & Prince, D., 31/01/2023, In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Efficient Local Reductions to Basic Modal Logic

    Papacchini, F., Nalon, C., Hustadt, U. & Dixon, C., 7/07/2021, Automated Deduction – CADE 28: 28th International Conference on Automated Deduction, Virtual Event, July 12–15, 2021, Proceedings. Platzer, A. & Sutcliffe, G. (eds.). Cham: Springer, p. 76-92 17 p. (Lecture Notes in Computer Science ; vol. 12699).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Ethnography, CSCW and Ethnomethodology

    Randall, D., Rouncefield, M. & Tolmie, P., 30/04/2021, In: Computer Supported Cooperative Work. 30, 2, p. 189-214 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Expanding Fix Patterns to Enable Automatic Program Repair

    Nowack, V., Bowes, D., Counsell, S., Hall, T., Haraldsson, S., Winter, E. & Woodward, J., 11/02/2022, 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). Jin, Z., Li, X., Xiang, J., Mariani, L., Liu, T., Yu, X. & Ivaki, N. (eds.). IEEE Computer Society Press, p. 12-23 12 p. (2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Exploiting fault localisation for efficient program repair: 2020 Genetic and Evolutionary Computation Conference, GECCO 2020

    Nowack, V., Bowes, D., Counsell, S., Hall, T., Haraldsson, S., Winter, E., Woodward, J. & SIGEVO, ACM., 8/07/2020, p. 311-312. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  21. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 31/10/2020, In: International Journal on Software Tools for Technology Transfer. 22, p. 565-581 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Finite Models for a Spatial Logic with Discrete and Topological Path Operators

    Linker, S., Papacchini, F. & Sevegnani, M., 18/08/2021, 46th International Symposium on Mathematical Foundations of Computer Science. Bonchi, F. & Puglisi, S. J. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 202. p. 72:1-72:16 16 p. 72. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 202).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Fog Orchestration and Simulation for IoT Services

    Yang, R., Wen, Z., McKee, D., Lin, T., Xu, J. & Garraghan, P., 1/03/2020, Fog and Fogonomics: Challenges and Practices of Fog Computing, Networking, Strategy, and Economics. Yang, Y., Huang, J., Zhang, T. & Weinman, J. (eds.). Wiley, p. 179-212 34 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. E-pub ahead of print

    General Access Control Guidance for Cloud Systems: SP 800-210(Draft)

    Hu, V. C., Iorga, M., Bao, W., Li, A., Li, Q. & Gouglidis, A., 1/04/2020, (E-pub ahead of print) Computer Security Resource Center.

    Research output: Other contribution

Previous 1 2 3 Next

Back to top