Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Journal article
  2. Published

    AURORA: autonomous real-time on-board video analytics

    Angelov, P., Sadeghi Tehran, P. & Clarke, C., 05/2017, In: Neural Computing and Applications. 28, 5, p. 855-865 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Resource Optimization in Multi-Tier HetNets Exploiting Multi-Slope Path Loss Model

    Munir, H., Hassan, S. A., Pervaiz, H., Ni, Q. & Musavian, L., 28/04/2017, In: IEEE Access. 5, p. 8714-8726 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Cybernetics of the mind: learning individual's perceptions autonomously

    Angelov, P. P., Gu, X., Iglesias, J., Ledezma, A., Sanchis, A., Sipele, O. & Ramezani, R., 04/2017, In: IEEE Systems, Man, and Cybernetics Magazine. 3, 2, p. 6-17 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Reordering Webpage Objects for Optimizing Quality-of-Experience

    Li, W., Zhao, Z., Min, G., Duan, H., Ni, Q. & Zhao, Z., 29/03/2017, In: IEEE Access. 5, p. 6626-6635 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    An improved equivalent circuit model of a four rod deflecting cavity

    Apsimon, R. J. & Burt, G. C., 1/03/2017, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 847, p. 52-60 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    P2P routing table poisoning: A quorum-based sanitizing approach

    Ismail, H., Germanus, D. & Suri, N., 1/03/2017, In: Computers and Security. 65, p. 283-299 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    On using micro-clouds to deliver the fog

    Elkhatib, Y., Porter, B. F., B. Ribeiro, H., Zhani, M. F., Qadir, J. & Rivière, E., 03/2017, In: IEEE Internet Computing. 21, 2, p. 8-15 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Fully online clustering of evolving data streams into arbitrarily shaped clusters

    Hyde, R., Angelov, P. & MacKenzie, A. R., 03/2017, In: Information Sciences. 382-383, p. 96-114 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Distributed Resource Allocation Assisted by Intercell Interference Mitigation in Downlink Multicell MC DS-CDMA Systems

    Shi, J., Song, Z. & Ni, Q., 9/02/2017, In: IEEE Transactions on Wireless Communications. 16, 2, p. 1250-1266 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top