Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A multi-level resilience framework for unified networked environments

    Marnerides, A., Bhandari, A., Murthy, H. & Mauthe, A. U., 05/2015, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, p. 1369-1372 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A nested hierarchy of dynamically evolving clouds for big data structuring and searching

    Angelov, P. & Sadeghi Tehran, P., 8/08/2015, In: Procedia Computer Science. 53, p. 1-8 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    A new family of rank codes and applications to cryptography

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 268 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A new link lifetime estimation method for greedy and contention-based routing in mobile ad hoc networks

    Noureddine, H., Ni, Q., Min, G. & Al-raweshidy, H., 03/2014, In: Telecommunication Systems. 55, 3, p. 421-433 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks

    Noureddine, H., Ni, Q., Min, G. & Al-Raweshidy, H., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2662-2667 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A New Method for Ultra Wideband Channel Modelling Based on Ray Tracing

    Memari, B. & Honary, B., 11/2006, The IET International Conference on Wireless, Mobile & Multimedia Networks . Hangzhou, China: IET Press, p. 139-142 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A new online clustering approach for data in arbitrary shaped clusters

    Hyde, R. & Angelov, P., 24/06/2015, Cybernetics (CYBCONF), 2015 IEEE 2nd International Conference on . IEEE, p. 228-233 6 p. 78

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A new partial transmit sequence scheme using genetic algorithm for peak-to-average power ratio reduction in a multi-carrier code division multiple access wireless system

    Zhang, Y., Ni, Q. & Chen, H. H., 2009, In: International Journal of Autonomous and Adaptive Communications Systems. 2, 1, p. 40-57 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A new signal set for ring-BCM

    Castineira Moreira, J., Honary, B. & Farrell, P., 07/2001, Proceedings of the 6th International Symposium on Communication Theory and Applications (ISCTA 2001). Lancaster: HW Communications Limited, p. 353–357 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...8 9 10 11 12 13 14 15 ...255 Next

Back to top