Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    An adaptive medium access control scheme for mobile ad hoc networks under self-similar traffic

    Abu-Tair, M., Min, G., Ni, Q. & Liu, H., 2010, In: Journal of Supercomputing. 53, 1, p. 212-230 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2012, Advanced Agent Technology. Dechesne, F., Hattori, H., ter Mors, A., Such, J. M., Weyns, D. & Dignum, F. (eds.). Berlin: Springer Verlag, p. 411-425 15 p. (Lecture Notes in Computer Science; vol. 7068).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments

    Staves, A., Gouglidis, A. & Hutchison, D., 31/03/2023, In: Digital Threats: Research and Practice. 4, 1, p. 1-29 29 p., 14.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    An approach for analysing the propagation of data errors in software

    Hiller, M., Jhumka, A., Suri, N. & D.C., Y. (ed.), 1/07/2001, 2001 International Conference on Dependable Systems and Networks. IEEE, p. 161-170 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    An approach for designing and assessing detectors for dependable component-based systems

    Jhumka, A., Hiller, M. & Suri, N., 25/03/2004, Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings. IEEE, Vol. 8. p. 69-78 10 p. (Proc. IEEE Int. Symp. High Assur. Syst. Eng.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    An Approach for Fuzzy Rule-base Adaptation using On-line Clustering.

    Angelov, P., 03/2004, In: International Journal of Approximate Reasoning. 35, 3, p. 275-289 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    An Approach for Rule-base Adaptation using On-line Clustering

    Angelov, P., 09/2002, Proceedings of EUNITE, Albufeira, Portugal, 19-22 September 2002. EUNITE, p. 47-52 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi–Sugeno fuzzy systems

    Angelov, P., Sadeghi-Tehran, P. & Ramezani, R., 03/2011, In: International Journal of Intelligent Systems. 26, 3, p. 189-205 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    An Approach to Autonomous Self-localization of a Mobile Robot in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier

    Zhou, X. & Angelov, P., 2/04/2007, Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on. IEEE, p. 131-138 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    An Approach to Model-based Fault Detection in Industrial Measurement Systems with Application to Engine Test Benches.

    Angelov, P., Giglio, V., Guardiola, C., Lughofer, E. & Lujan, J. M., 07/2006, In: Measurement Science and Technology. 17, 7, p. 1809-1818 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    An approach to on-line design of fuzzy controllers with evolving structure

    Angelov, P., 10/2004, Applications and Science in Soft Computing. Ahmad, L. & Garibaldi, J. M. (eds.). Berlin/Heidelberg: Springer, p. 63-68 6 p. (Advances in Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    An Approach to On-line Design of Fuzzy Controllers with Evolving Structure

    Angelov, P., 2002, Proceedings 4th International Conference on Recent Advances in Soft Computing, Nottingham, 12-13 December 2002. Lofti, A. & Garibaldi, J. M. (eds.). Nottingham: Nottingham Trent University, p. 55-56 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    An approach to online identification of Takagi-Sugeno fuzzy models

    Angelov, P. & Filev, D., 02/2004, In: IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics. 34, 1, p. 484-498 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    An Approach to Real-Time Color-based Object Tracking

    Memon, M. A., Angelov, P. & Ahmed, H., 8/09/2006, Evolving Fuzzy Systems, 2006 International Symposium on. IEEE, p. 81-87 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Unpublished

    An Approach to Reliability Enhancement of Overlay Multicast Trees

    Xie, L., Mathy, L. & Hutchison, D., 06/2003, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  18. Published

    An approach to specify and test component-based dependable software

    Jhumka, A., Hiller, M. & Suri, N., 23/10/2002, 7th IEEE International Symposium on High Assurance Systems Engineering, 2002. Proceedings.. IEEE, p. 211-220 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    An approach to synthesise safe systems

    Jhumka, A., Freiling, F., Fetzer, C. & Suri, N., 2006, In: International Journal of Security and Networks. 1, 1-2, p. 62-74 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    An Architecture for an Anonymity Network.

    Mathy, L., Hutchison, D., Rennhard, M. & Plattner, B., 06/2001, WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE Computer Society, p. 165 - 170 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Unpublished

    An Architecture for Pseudonymous e-Commerce.

    Mathy, L., Hutchison, D., Rennhard, M. & Plattner, B., 03/2001, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  22. Published

    An auction algorithm for procuring wireless channel in a heterogenous wireless network

    Suri, N. & Narahari, Y., 11/04/2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    An effective ant-colony based routing algorithm for mobile ad-hoc network

    Liu, Y., Zhang, H., Ni, Q., Zhou, Z. & Zhu, G., 05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 100-103 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    An efficient pricing based protocol for broadcasting in wireless ad hoc networks

    Suri, N., Narahari, Y. & Manjunath, D., 8/01/2006, 2006 1st International Conference on Communication Systems Software & Middleware. IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...8 9 10 11 12 13 14 15 ...102 Next

Back to top