Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Unpublished

    Token-based Accounting for P2P-Systems

    Mauthe, A., Liebau, N., Darlagiannis, V. & Steinmetz, R., 02/2005, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  2. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Tool support for the evaluation of anomaly traffic classification for network resilience

    da Silva, A., Wickboldt, J., Schaeffer-Filho, A., Marnerides, A. & Mauthe, A. U., 6/07/2015, Proceedings of 20th IEEE Symposium on Computers and Communications, ISCC2015. IEEE, p. 514-519 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Toolkit support for interactive projected displays

    Hardy, J. & Alexander, J., 4/12/2012, MUM '12 Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Toward 100 Gbps wireless networks enabled by millimeter wave traveling wave tubes

    Paoloni, C., Letizia, R., Krozer, V., Marilier, M., Boppel, S., Ramirez, A. & Vidal, B., 24/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Unpublished

    Toward a Practice of User-Centred Design for Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 14/05/2016, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  7. Published

    Toward an efficient solution for dynamic ad hoc network interoperability

    Prince, D., Scott, A. & Shepherd, D., 17/06/2002. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Toward the first D-band Point to multipoint wireless system field test

    Paoloni, C., Basu, R., Burhenn, M., Hossain, M., Huebsch, D., Krozer, V., Quang, T. L., Letizia, R., Limiti, E., Magne, F., Marilier, M., Ramirez, A., Mahadev Rao, J., Ulisse, G., Vidal, B. & Yacob, H., 28/07/2021, 2021 Joint EuCNC & 6G Summit. IEEE, p. 55-59 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Towards a context aware multipath-TCP

    Withnell, R. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on. IEEE, p. 225-228 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Towards a Decision Engine for Self-Remediating Resilient Networks

    Schäfer, T., Smith, P., Schöller, M., Mohammad, A. J., Rohrer, J. P., Hutchison, D. & Sterbenz, J., 11/09/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  11. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    Towards a multihomed GSM gateway

    Withnell, R. & Edwards, C., 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    Towards a Secure and Seamless Host Mobility for the real world

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on. IEEE, p. 134-141 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Towards a THz Backward Wave Amplifier in European OPTHER project

    Dispenza, M., Brunetti, F., Cojocaru, C. -S., de Rossi, A., Di Carlo, A., Dolfi, D., Durand, A., Fiorello, A. M., Gohier, A., Guiset, P., Kotiranta, M., Krozer, V., Legagneux, P., Marchesin, R., Megtert, S., Bouamrane, F., Mineo, M., Paoloni, C., Pham, K., Schnell, J. P., & 5 othersSecchi, A., Tamburri, E., Terranova, M. L., Ulisse, G. & Zhurbenko, V., 2010, MILLIMETRE WAVE AND TERAHERTZ SENSORS AND TECHNOLOGY III. Krapels, KA. & Salmon, NA. (eds.). BELLINGHAM: SPIE-INT SOC OPTICAL ENGINEERING, p. - 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Towards adaptive, self learning resilience strategies

    Ali, A., Angelov, P. & Hutchinson, D., 15/03/2012, 6th International Workshop on Self Organizing Systems IWSOS-2012. Delft, The Netherlands

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNAbstract

  19. Published

    Towards an adaptive resilience strategy for future computer networks

    Ali, A., Angelov, P. & Hutchison, D., 9/09/2011, Proceedings of the UKCI 2011, 7-9 Spetember, 2011, Manchester, UK. Manchester: University of Manchester, p. 201-206 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Towards an architecture to support complex multihomed mobility scenarios

    Alsukayti, I. & Edwards, C., 7/09/2015, MobiArch '15 Proceedings of the 10th International Workshop on Mobility in the Evolving Internet Architecture . New York: ACM, p. 51-56 6 p. 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Towards an autonomous resilience strategy the implementation of a self evolving rate limiter

    Ali, A., Hutchinson, D., Angelov, P. & Smith, P., 09/2013, 13th UK Workshop on Computational Intelligence (UKCI), 2013 . Guildford, UK: UKCI 2013, p. 299-304 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Towards an Understanding of Security Concerns within Communities

    Bury, S., Ishmael, J., Race, N. J. P., Smith, P. & Rouncefield, M., 2008, Proceedings of the 2008 IEEE International Conference on Wireless Mobile Computing, Networking Communication. Washington, DC, USA: IEEE Computer Society, p. 478-483 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    Towards continuous cloud service assurance for critical infrastructure IT

    Hudic, A., Hecht, T., Mauthe, A. & Tauber, M., 08/2014, Proceedings of 2nd International Conference on Future Internet of Things and Cloud (FiCloud-2014. IEEE, p. 175-182 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Towards DDoS attack resilient wide area monitoring systems

    Demir, K. & Suri, N., 29/08/2017, ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 7 p. 99

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top