Home > Research > Security Lancaster (Software Security) > Publications & Outputs
View graph of relations

Security Lancaster (Software Security)

  1. Published

    Bridging the gap between single- and multi-model predictive runtime verification

    Ferrando, A., Cardoso, R. C., Farrell, M., Luckcuck, M., Papacchini, F., Fisher, M. & Mascardi, V., 18/08/2022, In: Formal Methods in System Design. 59, 1-3, p. 44-76 33 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Characterizing positively invariant sets: Inductive and topological methods

    Ghorbal, K. & Sogokon, A., 30/11/2022, In: Journal of Symbolic Computation. 113, p. 1-28 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Design and Engineering of Resilience for Networked Computer Systems

    Hutchison, D., Rouncefield, M., Gouglidis, A. & Anderson, T., 26/08/2021, Multisystemic Resilience: Adaptation and Transformation in Changing Contexts. Ungar, M. (ed.). Oxford University Press, p. 663-681 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Dichotomies in Ontology-Mediated Querying with the Guarded Fragment

    Hernich, A., Lutz, C., Papacchini, F. & Wolter, F., 31/05/2020, In: ACM Transactions on Computational Logic (TOCL). 21, 3, 47 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Do You Speak Cyber? Talking Security with Developers of Health Systems and Devices

    Weir, C., Dyson, A. & Prince, D., 31/01/2023, In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Efficient Local Reductions to Basic Modal Logic

    Papacchini, F., Nalon, C., Hustadt, U. & Dixon, C., 7/07/2021, Automated Deduction – CADE 28: 28th International Conference on Automated Deduction, Virtual Event, July 12–15, 2021, Proceedings. Platzer, A. & Sutcliffe, G. (eds.). Cham: Springer, p. 76-92 17 p. (Lecture Notes in Computer Science ; vol. 12699).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Ethnography, CSCW and Ethnomethodology

    Randall, D., Rouncefield, M. & Tolmie, P., 30/04/2021, In: Computer Supported Cooperative Work. 30, 2, p. 189-214 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Expanding Fix Patterns to Enable Automatic Program Repair

    Nowack, V., Bowes, D., Counsell, S., Hall, T., Haraldsson, S., Winter, E. & Woodward, J., 11/02/2022, 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE). Jin, Z., Li, X., Xiang, J., Mariani, L., Liu, T., Yu, X. & Ivaki, N. (eds.). IEEE Computer Society Press, p. 12-23 12 p. (2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top