Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2017
  2. Published

    MICE: Multi-layer multi-model images classifier ensemble

    Angelov, P. P. & Gu, X., 22/06/2017, The 3rd IEEE International Conference on Cybernetics. IEEE, p. 436-443 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    DeQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

    Zhang, H., Trapero, R., Luna, J., Suri, N., X., L. & U., B., 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 27-34 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (ed.) & M., L. (ed.), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    REF: Enabling Rapid Experimentation of Contextual Network Traffic Management using Software Defined Networking

    Fawcett, L., Mu, M., Hareng, B. & Race, N. J. P., 07/2017, In: IEEE Communications Magazine. 55, 7, p. 144-150 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Statistical CSIT Aided User Scheduling for Broadcast MU-MISO System

    Cao, Q., Sun, Y., Ni, Q., Li, S. & Tan, Z., 07/2017, In: IEEE Transactions on Vehicular Technology. 66, 7, p. 6102-6114 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    High Efficiency Klystron Development for Particle Accelerators

    Constable, D. A., Baikov, A. Y., Burt, G. C., Hill, V., Lingwood, C. J., Guzilov, I. A., Jensen, A., Kowalczyk, R. D., Marchesin, R., Marrelli, C. & Syratchev, I., 1/07/2017, eeFACT2016 Proccedings. Geneva, Switzerland: JACoW, p. 185-187 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top