Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2021
  2. Published

    "Talking a different Language": Anticipating adversary attack cost for cyber risk assessment

    Derbyshire, R., Green, B. & Hutchison, D., 1/04/2021, In: Computers and Security. 103, 24 p., 102163.

    Research output: Contribution to journalJournal articlepeer-review

  3. Published

    A Low-Latency Interference Coordinated Routing for Wireless Multi-hop Networks

    Cheng, J., Yang, P., Navaie, K., Ni, Q. & Yang, H., 15/03/2021, In: IEEE Sensors Journal. 21, 6, p. 8679 - 8690 12 p.

    Research output: Contribution to journalJournal articlepeer-review

  4. Published

    Task scheduling with precedence and placement constraints for resource utilization improvement in multi-user MEC environment

    Liu, B., Xu, X., Qi, L., Ni, Q. & Dou, W., 1/03/2021, In: Journal of Systems Architecture. 114, 11 p., 101970.

    Research output: Contribution to journalJournal articlepeer-review

  5. E-pub ahead of print

    Optimizing Computation Efficiency for NOMA-Assisted Mobile Edge Computing with User Cooperation

    Su, B., Ni, Q., Yu, W. & Pervaiz, H., 3/02/2021, In: IEEE Transactions on Green Communications and Networking.

    Research output: Contribution to journalJournal articlepeer-review

  6. E-pub ahead of print

    The evolution of distributed computing systems: from fundamental to new frontiers

    Lindsay, D., Singh Gill, S., Smirnova, D. & Garraghan, P., 30/01/2021, In: Computing. 20 p.

    Research output: Contribution to journalJournal articlepeer-review

  7. Published

    AoI-Minimal Trajectory Planning and Data Collection in UAV-Assisted Wireless Powered IoT Networks

    Hu, H., Xiong, K., Qu, G., Ni, Q., Fan, P. & Letaief, K. B., 15/01/2021, In: IEEE Internet of Things Journal. 8, 2, p. 1211-1223 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  8. 2020
  9. Forthcoming

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 10/12/2020, (Accepted/In press) 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Using Workshops to Improve Security in Software Development Teams

    Weir, C., 23/11/2020, Lancaster University. 206 p.

    Research output: ThesisDoctoral Thesis

  11. Published

    Sum-Rate Maximization Based Relay Selection for Cooperative NOMA over Nakagami-m Fading

    Li, Y., Li, T., Li, Y., Ni, Q. & Zarakovitis, C., 1/11/2020, In: IEEE Transactions on Vehicular Technology. 69, 11, p. 13985-13989 5 p.

    Research output: Contribution to journalJournal articlepeer-review

  12. Published

    Resource Cube: Multi-Virtual Resource Management for Integrated Satellite-Terrestrial Industrial IoT Networks

    Chen, D., Yang, C., Gong, P., Chang, L., Shao, J., Ni, Q., Anpalagan, A. & Guizani, M., 22/10/2020, In: IEEE Transactions on Vehicular Technology. 69, 10, p. 11963-11974 12 p.

    Research output: Contribution to journalJournal articlepeer-review

  13. Published

    Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity

    Al-Salami, N. & Zhang, B., 6/10/2020, 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS). IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Transformers: Intrusion Detection Data In Disguise

    Boorman, J., Prince, D. & Green, B., 18/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Energy Efficient Uplink Transmissions in LoRa Networks

    Su, B., Qin, Z. & Ni, Q., 1/08/2020, In: IEEE Transactions on Communications. 68, 8, p. 4960-4972 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  17. Published

    Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode

    Ciholas, P., Such, J., Marnerides, A., Green, B., Zhang, J. & Roedig, U., 7/07/2020, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2020. . Springer, p. 67-88 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    A Framework to Support ICS Cyber Incident Response and Recovery

    Staves, A., Balderstone, H., Green, B., Gouglidis, A. & Hutchison, D., 24/05/2020. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  19. Published

    Honeypots for Automatic Network-Level Industrial Control System Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 27/04/2020. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  20. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to journalJournal articlepeer-review

  21. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to journalJournal articlepeer-review

  22. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to journalJournal articlepeer-review

  23. Published

    HoneyPlant: A Distributed Hybrid Honeypot System for ICS Security

    Maesschalck, S., Giotsas, V., Green, B. & Race, N., 17/03/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  24. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to journalJournal articlepeer-review

  25. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to journalJournal articlepeer-review

  26. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In: IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to journalJournal articlepeer-review

  27. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In: International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to journalJournal articlepeer-review

  28. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  30. Published

    Cognitive computing and wireless communications on the edge for healthcare service robots

    Wan, S., Gu, Z. & Ni, Q., 1/01/2020, In: Computer Communications. 149, p. 99-106 8 p.

    Research output: Contribution to journalJournal articlepeer-review

  31. Published

    Acoustic-channel attack and defence methods for personal voice assistants

    Cheng, P., 2020, Lancaster University. 232 p.

    Research output: ThesisDoctoral Thesis

  32. Published

    Human and Organizational Issues for Resilient Communications

    Anderson, T., Busby, J., Gouglidis, A., Hough, K., Hutchison, D. & Rouncefield, M., 2020, Guide to Disaster-Resilient Communication Networks. Rak, J. & Hutchison, D. (eds.). Cham: Springer, p. 791-807 17 p. (Computer Communications and Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  33. Published

    Kleptography and steganography in blockchains

    Al-Salami, N., 2020, Lancaster University. 168 p.

    Research output: ThesisDoctoral Thesis

  34. 2019
  35. Published

    Effective Secrecy Rate for a Downlink NOMA Network

    Yu, W., Chorti, A., Musavian, L., Poor, H. V. & Ni, Q., 31/12/2019, In: IEEE Transactions on Wireless Communications. 18, 12, p. 5673-5690 18 p.

    Research output: Contribution to journalJournal articlepeer-review

  36. Published

    PRISM: An Experiment Framework for Straggler Analytics within Containerized Clusters

    Lindsay, D., Gill, S. & Garraghan, P., 1/12/2019, WoC 2019 Fifth International Workshop on Container Technologies and Container Clouds. ACM, p. 13-18 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Stochastic Asymmetric Blotto Game Approach for Wireless Resource Allocation Strategies

    Chien, S. F., Zarakovitis, C. C., Ni, Q. & Xiao, P., 1/12/2019, In: IEEE Transactions on Wireless Communications. 18, 12, p. 5511 - 5528 18 p.

    Research output: Contribution to journalJournal articlepeer-review

  38. Published

    Transformative Effects of IoT, Blockchain and Artificial Intelligence on Cloud Computing: Evolution, Vision, Trends and Open Challenges

    Gill, S., Tuli, S., Xu, M., Singh, I., Singh, K., Lindsay, D., Tuli, S., Smirnova, D., Singh, M., Jain, U., Pervaiz, H., Sehgal, B., Kaila, S. S., Misra, S., Aslanpour, M. S., Mehta, H., Stankovski, V. & Garraghan, P., 1/12/2019, In: Internet of Things. 8, 26 p., 100118.

    Research output: Contribution to journalJournal articlepeer-review

  39. Published

    Local Optimality of Self-Organising Neuro-Fuzzy Inference Systems

    Gu, X., Angelov, P. P. & Rong, H., 30/11/2019, In: Information Sciences. 503, p. 351-380 30 p.

    Research output: Contribution to journalJournal articlepeer-review

  40. Published

    Weighted Tradeoff between Spectral Efficiency and Energy Efficiency in Energy Harvesting Systems

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 21/11/2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  42. Published

    Distributed Systems Security

    Suri, N., 1/10/2019, CyBOK Knowledge Base. Lupu, E. (ed.). Bristol: University of Bristol, p. 38

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  43. Published

    Towards smarter SDN switches: revisiting the balance of intelligence in SDN networks

    Weekes, J., 30/09/2019, Lancaster University. 216 p.

    Research output: ThesisDoctoral Thesis

  44. Published

    3-D Hybrid VLC-RF Indoor IoT Systems with Light Energy Harvesting

    Pan, G., Lei, H., Ding, Z. & Ni, Q., 1/09/2019, In: IEEE Transactions on Green Communications and Networking. 3, 3, p. 853 - 865 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  45. Published

    Proceedings of the 4th European Workshop on Usable Security

    Ur, B. (ed.) & Weir, C. (ed.), 1/09/2019, IEEE.

    Research output: Book/Report/ProceedingsProceedings

  46. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In: Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to journalJournal articlepeer-review

  47. Published

    Power Interchange Analysis for Reliable Vehicle-to-Grid Connectivity

    Al-Rubaye, S., Al-Dulaimi, A. & Ni, Q., 21/08/2019, In: IEEE Communications Magazine. 57, 8, p. 105-111 7 p., 8808171.

    Research output: Contribution to journalJournal articlepeer-review

  48. Published

    Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search

    Zhang, J., Zhang, B. & Lin, J., 19/08/2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 211-219 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics

    Stephanakis, I. M., Chochliouros, I. P., Sfakianakis, E., Shirazi, S. N. & Hutchison, D., 1/08/2019, In: Information Sciences. 494, p. 247-277 31 p.

    Research output: Contribution to journalJournal articlepeer-review

  50. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  51. Published

    Fool's Gold: Understanding the Linguistic Features of Deception and Humour Through April Fools’ Hoaxes

    Dearden, E. & Baron, A., 22/07/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  52. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Energy-Efficient Multi-User Mobile-Edge Computation Offloading in Massive MIMO Enabled HetNets

    Hao, Y., Ni, Q., Li, H. & Hou, S., 15/07/2019, IEEE International Conference on Communications (ICC 2019). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to journalJournal articlepeer-review

  55. Published

    Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems

    Zhang, J., Zhang, B. & Zhang, B., 2/07/2019, SCC '19 Proceedings of the Seventh International Workshop on Security in Cloud Computing. New York: ACM, p. 23-31 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Low-Power Wide-Area Networks for Sustainable IoT

    Qin, Z., Li, F. Y., Li, G. Y., A. Mccann, J. & Ni, Q., 1/06/2019, In: IEEE Wireless Communications. 26, 3, p. 140-145 6 p.

    Research output: Contribution to journalJournal articlepeer-review

  58. Published

    MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

    Demir, K., Nayyer, F. & Suri, N., 1/06/2019, In: International Journal of Critical Infrastructure Protection. 25, p. 84-101 18 p.

    Research output: Contribution to journalJournal articlepeer-review

  59. Published

    Proofs of Writing for Robust Storage

    Dobre, D., Karame, G., Li, W., Majuntke, M., Suri, N. & Vukolic, M., 27/05/2019, In: IEEE Transactions on Parallel and Distributed Systems. 30, 11, p. 2547-2566 20 p.

    Research output: Contribution to journalJournal articlepeer-review

  60. Published

    Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Blair, L., Becker, I., Noble, J., Sasse, A. & Rashid, A., 25/05/2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice Track. Sharpe, H. & Whalen, M. (eds.). IEEE, p. 41-50 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I., Yan, J. & Roedig, U., 20/05/2019. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  64. Published

    Energy Efficient Resource Allocation in Hybrid Non-Orthogonal Multiple Access Systems

    Shi, J., Yu, W., Ni, Q., Liang, W., Li, Z. & Xiao, P., 1/05/2019, In: IEEE Transactions on Communications. 67, 5, p. 3496-3511 16 p.

    Research output: Contribution to journalJournal articlepeer-review

  65. Published

    A Framework for Measuring the Costs of Security at Runtime

    Ivkic, I., Pichler, H., Zsilak, M., Mauthe, A. & Tauber, M., 05/2019, CLOSER 2019 : International Conference on Cloud Computing and Services Science.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Maximum Achievable Sum Rate in Highly Dynamic Licensed Shared Access

    Onidare, S., Navaie, K. & Ni, Q., 28/04/2019, 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring). IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to journalJournal articlepeer-review

  69. Published

    To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

    Van der Zee, S., Poppe, R., Taylor, P. J. & Anderson, R., 12/04/2019, In: PLoS ONE. 14, 4, 18 p., e0215000.

    Research output: Contribution to journalJournal articlepeer-review

  70. Published

    Fool’s Errand: Looking at April Fools Hoaxes as Disinformation through the Lens of Deception and Humour

    Dearden, E. & Baron, A., 7/04/2019. 17 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  71. Published

    Relay Selections for Cooperative Underlay CR Systems with Energy Harvesting

    Ye, J., Liu, Z., Zhao, H., Pan, G., Ni, Q. & Alouini, M., 2/04/2019, In: IEEE Transactions on Cognitive Communications and Networking. 5, 2, p. 358-369 12 p.

    Research output: Contribution to journalJournal articlepeer-review

  72. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In: IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to journalJournal articlepeer-review

  73. Published

    Energy efficiency using cloud management of LTE networks employing fronthaul and virtualized baseband processing pool

    Al-dulaimi, A., Al-rubaye, S. & Ni, Q., 1/04/2019, In: IEEE Transactions on Cloud Computing. 7, 2, p. 1-12 12 p.

    Research output: Contribution to journalJournal articlepeer-review

  74. Published

    Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues

    Dobson, S., Hutchison, D., Mauthe, A. U., Schaeffer-Filho, A. E., Smith, P. & Sterbenz, J. PG., 1/04/2019, In: Proceedings of the IEEE . 107, 4, p. 819-834 16 p.

    Research output: Contribution to journalJournal articlepeer-review

  75. E-pub ahead of print

    Intelligent Multisensor Cooperative Localization Under Cooperative Redundancy Validation

    Yin, L., Ni, Q. & Deng, Z., 30/04/2021, In: IEEE Transactions on Cybernetics. 51, 4, p. 2188-2200 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  76. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K. A., Qadir, J. & Ni, Q., 1/03/2019, In: IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to journalJournal articlepeer-review

  77. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to journalJournal articlepeer-review

  78. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to journalJournal articlepeer-review

  79. Published

    A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

    Zhang, B., Oliynykov, R. & Balogun, H., 25/02/2019. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  80. Published

    Location Assisted Subcarrier and Power Allocation in Underlay Mobile Cognitive Radio Networks

    Farooq-I-Azam, M., Yu, W., Ni, Q., Dong, M. & Ul Quddus, A., 19/02/2019, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p. 8644427

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    InfoLeak: Scheduling-based information leakage

    Vateva-Gurova, T., Manzoor, S., Huang, Y. & Suri, N., 11/02/2019, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 44-53 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Industrial Internet of Things Driven by SDN Platform for Smart Grid Resiliency

    Al-rubaye, S., Kadhum, E., Ni, Q. & Anpalagan, A., 1/02/2019, In: IEEE Internet of Things Journal. 6, 1, p. 267-277 11 p.

    Research output: Contribution to journalJournal articlepeer-review

  83. Published

    Cooperative Non-Orthogonal Layered Multicast Multiple Access for Heterogeneous Networks

    Yang, L., Ni, Q., Lv, L., Chen, J., Xue, X., Zhang, H. & Jiang, H., 02/2019, In: IEEE Transactions on Communications. 67, 2, p. 1148 - 1165 18 p.

    Research output: Contribution to journalJournal articlepeer-review

  84. Published

    Coverage and Handoff Analysis of 5G Fractal Small Cell Networks

    Chen, J., Ge, X. & Ni, Q., 02/2019, In: IEEE Transactions on Wireless Communications. 18, 2, p. 1263 - 1276 14 p.

    Research output: Contribution to journalJournal articlepeer-review

  85. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  86. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to journalJournal article

  88. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In: PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to journalJournal articlepeer-review

  89. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to journalJournal articlepeer-review

  90. E-pub ahead of print

    Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 14/01/2019, In: IEEE Transactions on Emerging Topics in Computing. 6 p.

    Research output: Contribution to journalJournal articlepeer-review

  91. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to journalJournal articlepeer-review

  93. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  94. Published

    Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  95. 2018
  96. Published

    Active Spoofing Attack Detection: An Eigenvalue Distribution and Forecasting Approach

    Gao, N., Jing, X., Ni, Q. & Su, B., 20/12/2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Low Latency Driven Effective Capacity Analysis for Non-Orthogonal and Orthogonal Spectrum Access

    Yu, W., Musavian, L., Quddus, A. U., Ni, Q. & Xiao, P., 13/12/2018, 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Interference-Aware Radio Resource Allocation for 5G Ultra-Reliable Low-Latency Communication

    Malik, H., Alam, M. M., Le Moullec, Y. & Ni, Q., 9/12/2018, 2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings. IEEE, 6 p. 8644301

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Joint Antenna and User Selection for Untrusted Relay Networks

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 9/12/2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. IEEE, 6 p. 8647350

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  101. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B-C., Li, S-C., Huang, Y., Suri, N. & Wang, P-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  102. Published

    FastFI: Accelerating software fault injections

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 193-202 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  103. Published

    On the detection of side-channel attacks

    Vateva-Gurova, T. & Suri, N., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 185-186 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  104. Published

    Foreign Currency Exchange Rate Prediction using Neuro-Fuzzy Systems

    Yong, Y. L., Lee, Y., Gu, X., Angelov, P. P., Ling Ngo, D. C. & Shafipour Yourdshahi, E., 1/12/2018, Procedia Computer Science. Elsevier, Vol. 144. p. 232-238 7 p. (Procedia Computer Science; vol. 144).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...20 Next

Back to top