Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Interventions for Long Term Software Security: Creating a Lightweight Program of Assurance Techniques for Developers

    Weir, C., Becker, I., Noble, J., Blair, L., Sasse, M. A. & Rashid, A., 1/03/2020, In: Software: Practice and Experience. 50, 3, p. 275-298 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

    Weir, C., Hermann, B. & Fahl, S., 12/08/2020, USENIX Security '20 Proceedings. USENIX Association, p. 289-305 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. E-pub ahead of print

    Challenging Software Developers: Dialectic as a Foundation for Security Assurance Techniques

    Weir, C., Noble, J. & Rashid, A., 21/04/2020, (E-pub ahead of print) In: Journal of Cybersecurity. 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Using Workshops to Improve Security in Software Development Teams

    Weir, C., 23/11/2020, Lancaster University. 206 p.

    Research output: ThesisDoctoral Thesis

  5. Published

    Do You Speak Cyber? Talking Security with Developers of Health Systems and Devices

    Weir, C., Dyson, A. & Prince, D., 31/01/2023, In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  7. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Connected tools in digital design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 1/04/2015, In: IEEE Pervasive Computing. 14, 2, p. 18-21 4 p.

    Research output: Contribution to Journal/MagazineJournal article

  9. Published

    Shape Display Shader Language (SDSL): a new programming model for shape changing displays

    Weichel, C., Alexander, J. & Hardy, J., 04/2015, CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 1121-1126 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    ReForm: integrating physical and digital design through bidirectional fabrication

    Weichel, C., Hardy, J., Alexander, J. & Gellersen, H., 11/2015, UIST '15 Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. New York: ACM, p. 93-102 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. E-pub ahead of print

    i2Key: A Cross-sensor Symmetric Key Generation System using Inertial Measurements and Inaudible Sound

    Wei, B., Xu, W., Li, K., Luo, C. & Zhang, J., 4/05/2022, (E-pub ahead of print) IPSN’22: 2022 21st ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). ACM, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Towards smarter SDN switches: revisiting the balance of intelligence in SDN networks

    Weekes, J., 30/09/2019, Lancaster University. 216 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Utilising motion capture technology to identify nonverbal indicators of trust judgements

    Watson, S., Conchie, S., Taylor, P. J. & Poppe, R., 23/08/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  15. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Utilising motion capture technology to identify trusted testimony in military encounters

    Watson, S. J., Conchie, S. M., Taylor, P. J. & Poppe, R., 2/11/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  17. Published
  18. Published

    The Manipulative Presentation Techniques of Controlling and Coercive Offenders

    Watson, S. J., Luther, K., Jackson, J., Taylor, P. J. & Alison, L., 25/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  19. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  20. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A Fast Model of a 1-D Nonlinear Beam-Wave Interaction for a 225GHz TWT

    Waring, R., Hu, Y. & Paoloni, C., 23/06/2015, 8th UK-Europe-China Workshop on mm-waves and THz Technologies . IEEE, 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    A fast model of a 1-D nonlinear beam-wave interaction for a 225 GHz TWT

    Waring, R., Hu, Y. & Paoloni, C., 14/09/2015, 2015 8th UK, Europe, China Millimeter Waves and THz Technology Workshop (UCMMT). IEEE, p. 1-3 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Lagrangian simulator for Millimetre Wave TWT Based on Non-rotationally Symmetric Slow-Wave Structure

    Waring, R. & Paoloni, C., 09/2017, In: Journal of Electromagnetic Waves and Applications. 31, 17, p. 1902-1913 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Lagrangian Large Signal Model for Double Corrugated Waveguides

    Waring, R. & Paoloni, C., 25/09/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  25. Published

    Lagrangian Large Signal Model for Double Corrugated Waveguide

    Waring, R. & Paoloni, C., 04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

Previous 1...4 5 6 7 8 9 10 11 ...102 Next

Back to top