Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Entropy-based Reinforcement Learning for computation offloading service in software-defined multi-access edge computing

    Li, K., Wang, X., Ni, Q. & Huang, M., 30/11/2022, In: Future Generation Computer Systems. 136, p. 241-251 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Outage Performance Enhancement for NOMA Based Cooperative Relay Sharing Networks

    Li, Y., Li, T., Li, Y., Pervaiz, H. & Ni, Q., 31/12/2022, In: IEEE Wireless Communications Letters. 11, 12, p. 2665-2669 5 p., 12.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Computation Offloading for Tasks with Bound Constraints in Multi-access Edge Computing

    Li, K., Wang, X., He, Q., Ni, Q., Yang, M., Huang, M. & Dustdar, S., 30/09/2023, In: IEEE Internet of Things Journal. 10, 17, p. 15526-15536 11 p., 17.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Road Side Unit-Assisted Learning-Based Partial Task Offloading for Vehicular Edge Computing System

    Li, S., Sun, W., Ni, Q. & Sun, Y., 1/04/2024, In: IEEE Transactions on Vehicular Technology. 73, 4, p. 5546 - 5555 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    SketchingDIS: Hand-drawn Sketching in HCI

    Lewis, M., Sturdee, M. A., Alexander, J. M., Van Dijk, J., Kirkegård Rasmussen, M. & Hoang, T., 14/06/2017, DIS '17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. New York: ACM, p. 356-359 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Sketchi: Hands-on special interest group on sketching in HCI

    Lewis, M., Sturdee, M., Marquardt, N. & Hoang, T., 20/04/2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery (ACM), SIG09. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Applied sketching in HCI: Hands-on course of sketching techniques

    Lewis, M., Sturdee, M. & Marquardt, N., 20/04/2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery (ACM), C0. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Sketching in HCI: Hands-on course of sketching techniques

    Lewis, M., Sturdee, M. & Marquardt, N., 2/05/2019, CHI EA '19 Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    SketCHI 2.0: Hands-On Special Interest Group on Sketching in HCI

    Lewis, M., Sturdee, M., Marquardt, N., Walny, J., Foster, J., Hoang, T. & Carpendale, S., 4/05/2019, CHI EA '19 Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), 5 p. SIG12

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    So you think you can't draw? a hands-on introductory course on sketching in HCI techniques

    Lewis, M. & Sturdee, M., 25/04/2020, Proceedings of the 2020 CHI Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 1-4 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Let’s Sketch! A Hands-on Introductory Course on Sketching in HCI

    Lewis, M. & Sturdee, M., 9/05/2021, CHI EA '21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Kitamura, Y., Quigley, A., Isbister, K. & Igarashi, T. (eds.). New York: ACM, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Curricula Design & Pedagogy for Sketching Within HCI & UX Education

    Lewis, M. & Sturdee, M., 1/04/2022, In: Frontiers in Computer Science. 4, 20 p., 826445.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Exploring AltNarrative in HCI Imagery and Comics.

    Lewis, M., Sturdee, M., Miers, J., Davis, J. U. & Hoang, T. N., 27/04/2022, CHI EA '22: Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems. New York: ACM, p. 7:1-7:13 13 p. 7. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Take a line for a walk! A Hands-on Introductory Course on Sketching in HCI.

    Lewis, M. & Sturdee, M., 27/04/2022, CHI 2022 - Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems. New York: ACM, p. 129:1-129:4 4 p. 129. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Third-parties, violence and conflict resolution: the role of group size and collective action in the micro-regulation of violence

    Levine, M., Taylor, P. & Best, R., 03/2011, In: Psychological Science. 22, 3, p. 406-412

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Photonic crystals assisted slow wave structure for THz vacuum devices

    Letizia, R., Paoloni, C., Mineo, M. & Pinto, D., 2013, 14th IEEE International Vacuum Electronic Conference. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Tapered metallic photonic crystal slow wave structure for THz vacuum electron devices

    Letizia, R., Mineo, M. & Paoloni, C., 2013, Millimeter Waves and THz Technology Workshop (UCMMT), 2013 6th UK, Europe, China. Piscataway, N.J.: IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    THz backward wave oscillator based on PhC-wall corrugated waveguide

    Letizia, R., Mineo, M. & Paoloni, C., 04/2014, 15th IEEE International Vacuum Electronic Conference. Monterey, Calif.: IEEE, p. 65-66 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Photonic crystal-structures for THz vacuum electron devices

    Letizia, R., Mineo, M. & Paoloni, C., 01/2015, In: IEEE Transactions on Electron Devices. 62, 1, p. 178-183 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    THz BWO based on photonic crystal corrugated waveguide

    Letizia, R., Mineo, M. & Paoloni, C., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  22. Published

    Photonic bandgap coupler for 346 GHz sheet-beam BWO

    Letizia, R., Mineo, M. & Paoloni, C., 14/09/2015, 2015 8th UK, Europe, China Millimeter Waves and THz Technology Workshop (UCMMT). IEEE, 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Photonic band gap corrugated slow wave structure for THz sheet-beam vacuum electron devices

    Letizia, R., Mineo, M. & Paoloni, C., 19/04/2016, Proceedings of the 17th IEEE International Vacuum Electronics Conference (IVEC 2016). IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Photonic crystal-coupler for sheet beam THz vacuum electron tubes

    Letizia, R., Mineo, M. & Paoloni, C., 09/2016, In: IEEE Electron Device Letters. 37, 9, p. 1227-1230 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Understanding the barriers to accidents - organisations and the management of technological hazards

    Lemon, M. & Busby, J. S., 2003, Technology and HRM Conference II (CERMAhia Antipolis) - 2003. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Unpublished

    Domestic Abuse support for staff working in Higher and Further Education in Scotland

    Lemac-Vincere, S., 1/08/2021, (Unpublished) Advance HE. 23 p.

    Research output: Book/Report/ProceedingsCommissioned report

  28. Published

    Improving the precision of corpus methods: The standardized version of Early Modern English Medical Texts

    Lehto, A., Baron, A., Ratia, M. & Rayson, P., 2010, Early Modern English Medical Texts: Corpus description and studies. Taavitsainen, I. & Pahta, P. (eds.). Amsterdam: John Benjamins, p. 279-289 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  29. Published

    Providing producer mobility support in NDN through proactive data replication

    Lehmann, M., Barcellos, M. & Mauthe, A. U., 25/04/2016, 2016 IEEE/IFIP Network Operations and Management Symposium 2016 (NOMS 2016). NOMS 2016 will be held 25-29 April 2016 in Istanbul, Turkey. Oktug, S., Ulema, M., Cavdar, C., Zambenedetti Granville, L. & dos Santos, C. R. P. (eds.). IEEE, p. 383-391 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems

    Le, A. T., Roedig, U. & Rashid, A., 4/07/2017, Engineering Secure Software and Systems: 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings. Bodden, E., Payer, M. & Athanasopoulos, E. (eds.). Cham: Springer, p. 36-52 17 p. (Lecture Notes in Computer Science; vol. 10379).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Reflecting operational complexity in design processes and improving design risk identification

    Lauche, K. & Busby, J. S., 2004, Design (Dubrovnik) - 2004. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    New constructions of quasi-cyclic LDPC codes based on special classes of BIBD's for the AWGN and binary erasure channels

    Lan, L., Tai, Y. Y., Lin, S., Memari, B. & Honary, B., 1/01/2008, In: IEEE Transactions on Communications. 56, 1, p. 39-48 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    SPM characterisation of nanomechanical proprieties of C60 monolayer formed by LB

    Lamantia, A., Robson, A. J., Pinter, G., Underwood, K. L., Roberts, J., Cao, Y., Young, R. J. & Robinson, B. J., 4/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  37. Published

    Multidimensional Trust Evidence Fusion and Path-Backtracking Mechanism for Trust Management in VANETs

    Lam, C. C., Song, Y., Cao, Y., Zhang, Y., Cai, B. & Ni, Q., 15/05/2024, In: IEEE Internet of Things Journal. 11, 10, p. 18619-18634 16 p., 10.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Terahertz driven bunch compression and longitudinal diagnostics of 100 keV electron beams

    Lake, D. S., Finlay, O. J., Georgiadis, V., Hibberd, M. T., Walsh, D. A., Burt, G., Graham, D. M. & Jamison, S. P., 8/11/2020, 2020 45th International Conference on Infrared, Millimeter, and Terahertz Waves, IRMMW-THz 2020. IEEE Computer Society Press, p. 35 1 p. 9370963. (International Conference on Infrared, Millimeter, and Terahertz Waves, IRMMW-THz; vol. 2020-November).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Futuristic 6G Pervasive On-Demand Services: Integrating Space Edge Computing With Terrestrial Networks

    Lai, Z., Li, H., Wu, Q., Ni, Q., Lv, M., Li, J., Wu, J., Liu, J. & Li, Y., 31/03/2023, In: IEEE Vehicular Technology Magazine. 18, 1, p. 2-11 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    The future of digital disrupters: rethinking the digital divide

    Lacy, M. & Prince, D., 12/06/2013, Lancaster: Lancaster University. 46 p. (Future of...)

    Research output: Book/Report/ProceedingsOther report

  41. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

    Kumar, A., Yadav, A. S., Gill, S. S., Pervaiz, H., Ni, Q. & Buyya, R., 30/11/2022, In: Simulation Modelling Practice and Theory. 120, 27 p., 102621.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Antimonide quantum dot nanostructures for novel photonic device applications

    Krier, A., Carrington, P., Zhuang, Q., Young, R., Hayne, M., Lu, Q., James Asirvatham, J., Wagener, M., Botha, J. R., Koenraad, P. M. & Smakman, E. P., 5/11/2013, The wonder of nanotechnology: quantum optoelectronic devices and applications . SPIE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  44. Published

    Guest Editorial: Body Sensor Networks

    Koutsakis, P., Spachos, P. & Marnerides, A., 29/01/2018, In: IET Wireless Sensor Systems. 8, 1, p. 1-2 2 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  45. Published

    Drawing on Experiences of Self: Dialogical Sketching

    Koulidou, K., Wallace, J., Sturdee, M. & Durrant, A., 6/07/2020, DIS '20: Proceedings of the 2020 ACM Designing Interactive Systems Conference. New York: ACM, p. 255-267 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Proceedings of Sensornet: North West UK Sensor Network Day

    Kortuem, G. (Editor), Sundramoorthy, V. (Editor) & Roedig, U. (Editor), 2007, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsBook

  47. Published

    Compositional design of RT systems: A conceptual basis for specification of linking interfaces

    Kopetz, H. & Suri, N., 16/05/2003, Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003.. IEEE, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    On the limits of the precise specification of component interfaces

    Kopetz, H. & Suri, N., 1/10/2003, 2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE, p. 26-27 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

    Kontogianni, F., Hope, L., Vrij, A., Taylor, P. J. & Gabbert, F., 09/2018, In: Journal of Applied Research in Memory and Cognition. 7, 3, p. 454-461 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Experimental studies of 7-cell dual axis asymmetric cavity for energy recovery linac

    Konoplev, I. V., Metodiev, K., Lancaster, A. J., Burt, G. C., Ainsworth, R. & Seryi, A., 10/10/2017, In: Physical Review Accelerators and Beams. 20, 10, 12 p., 103501.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Random Damage in Interconnected Networks

    König, S. & Gouglidis, A., 31/05/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  52. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  53. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In: Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices

    Komninos, N., Honary, B. & Darnell, M., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 294-300 7 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    Novel methods for enabling public key schemes in future mobile systems

    Komninos, N. & Honary, B., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 455–458 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Modified WAP for secure voice and video communication

    Komninos, N. & Honary, B., 03/2001, 3G Mobile Communication Technologies, 2001. Second International Conference on (Conf. Publ. No. 477). London, UK: IEEE, p. 33-37 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Cipher Appartus

    Komninos, N. (Inventor) & Honary, B. (Inventor), 09/2002, Patent No. 0222201.6

    Research output: Patent

  59. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Where art meets technology: Integrating tangible and intelligent tools in creative processes

    Koch, J., Pearson, J., Lucero, A., Sturdee, M., Mackay, W. E., Lewis, M. & Robinson, S., 25/04/2020, 2020 ACM CHI Conference on Human Factors in Computing Systems, CHI EA 2020. New York: ACM, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management

    Knowles, W., Prince, D. & Hutchison, D., 2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2012). Liverpool: Liverpool John Moores University

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Introducing NextShareMobile, An Interactive Second Screen Application

    Knowles, W., Mu, M., Bamford, W., Race, N. & Needham, C., 2012, MobiSys '12 Proceedings of the 10th international conference on Mobile systems, applications, and services. New York: ACM, p. 489-490 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  66. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  67. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    The simulated security assessment ecosystem: Does penetration testing need standardisation?

    Knowles, W., Baron, A. & McGarr, T., 09/2016, In: Computers and Security. 62, p. 296-316 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Evolving extended naive Bayes classifiers

    Klawonn, F. & Angelov, P., 12/2006, Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. IEEE, p. 643-647 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Playful Research Fiction: A Fictional Conference

    Kirman, B., Lindley, J. G., Blythe, M., Coulton, P., Lawson, S., Linehan, C., Maxwell, D., O'Hara, D., Sturdee, M. & Thomas, V., 07/2018, Funology 2: From Usability to Enjoyment. Blythe, M. & Monk, A. (eds.). Springer, p. 157-173 17 p. (Human-Computer Interaction Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  73. Published

    Estimating node lifetime in interference environments

    King, A., Brown, J., Vidler, J. & Roedig, U., 26/10/2015, Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. IEEE, p. 796-803 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Poster: RI-MAC enhancements for interference resilience

    King, A. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 283-284 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Competition: ContikiMAC with differentiating clear channel assessment

    King, A., Hadley, J. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 301-302 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Ubiquitous technologies, cultural logics and paternalism in industrial workplaces

    Kinder, K. E., Ball, L. J. & Busby, J. S., 2008, In: Poiesis and Praxis. 5, 3-4, p. 265-290 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Pervasive technologies, risk and accountability

    Kinder, K. E., Boos, D., Grote, G. & Busby, J. S., 2010, Annual SRA-Europe Meeting, Society for Risk Analysis Europe (London) - 2010. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Why Have Progresses in Real-Time Fault Tolerant Computing Been Slow?

    Kim, K. H., Ezhilchelvan, P. D., Kaiser, J., Moser, L. E., Nett, E. & Suri, N., 2004, IEEE Symposium on Reliable Distributed Systems . IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  80. Published

    Commissioning of the electron injector for the AWAKE experiment

    Kim, S.-Y., Doebert, S., Apsimon, O., Apsimon, R., Burt, G., Dayyani, M., Gessner, S., Gorgisyan, I., Granados, E., Mazzoni, S., Moody, J. T., Turner, M., Williamson, B. & Chung, M., 11/02/2020, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 953, 7 p., 163194.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  84. Published

    DEMOS-2: scalable E2E verifiable elections without random oracles

    Kiayias, A., Zacharias, T. & Zhang, B., 12/10/2015, CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 352-363 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    End-to-end verifiable elections in the standard model

    Kiayias, A., Zacharias, T. & Zhang, B., 17/03/2015, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Oswald, E. & Fischlin, M. (eds.). Springer, Vol. II. p. 468-498 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  90. Published

    Wireless Sensor Cooperation for a Sustainable Quality of Information

    Khelil, A., Reinl, C., Ayari, B., Shaikh, F. K., Szczytowski, P., Ali, A. & Suri, N., 2011, Pervasive Computing and Networking. John Wiley and Sons, p. 71-100 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  91. Published

    Map-based design for autonomic wireless sensor networks

    Khelil, A., Shaikh, F. K., Szczytowski, P., Ayari, B. & Suri, N., 2009, Autonomic Communication. Tsinghua University Press & Springer-Verlag, p. 309-326 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  92. Published

    Gossiping: Adaptive and reliable broadcasting in MANETs

    Khelil, A. & Suri, N., 2007, Dependable Computing: Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings. Springer, Vol. 4746 LNCS. p. 123-141 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  93. Published

    gMAP: Efficient construction of global maps for mobility-assisted wireless sensor networks

    Khelil, A., Shaikh, F. K., Ali, A. & Suri, N., 2/02/2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services. IEEE, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  95. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    MWM: A map-based world model for wireless sensor networks

    Khelil, A., Shaikh, F. K., Ayari, B. & Suri, N., 23/09/2011, Autonomics: 2nd International ICST Conference on Autonomic Computing and Communication Systems. EUDL, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  98. Published

    Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 1/06/2012, In: IET Wireless Sensor Systems. 2, 2, p. 108-114 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Modified Niederreiter type of GPT cryptosystem based on reducible rank codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 01/2014, In: Designs Codes and Cryptography. 70, 1-2, p. 231-239 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Improving Security of Niederreiter Type GPT Cryptosystem Based on Reducible Rank Codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 09/2011, 3rd International Castle Meeting on Coding Theory and Applications (ICMCTA). Borges, J. & Villanueva, M. (eds.). Barcelona: Servei de Publicacions de la Universitat Autònoma de Barcelona, p. 161-168 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top