Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Crossover codeword algorithm for iteration control

    Tanriover, C. C. & Honary, B., 09/2002, Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th. Vancouver, Canada: IEEE, Vol. 3. p. 1662-1665 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Cross-layer Framework for Energy Harvesting-LPWAN Resource Management based on Fuzzy Cognitive Maps and Adaptive Glowworm Swarm Optimization for Smart Forest

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/05/2024, In: IEEE Sensors Journal. 24, 10, p. 17067 - 17079

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Cross-layer design for single-cell OFDMA systems with heterogeneous QoS and partial CSIT

    Zarakovitis, C., Ni, Q. & Skordoulis, D., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Cross-layer Design for Multiuser OFDMA Systems with Cooperative Game and MMPP Queuing Considerations

    Nikolaros, I. G., Zarakovitis, C. C., Skordoulis, D., Hadjinicolaou, M. G. & Ni, Q., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2649-2654 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Crossing boundaries: using GIS in literary studies, history and beyond

    Gregory, I. N., Baron, A., Cooper, D., Hardie, A., Murrieta-Flores, P. & Rayson, P. E., 2014, Keys for architectural history research in the digital era. Hueber, J. & Mendes da Silva, A. (eds.). Institut national d'histoire de l'art, (Actes de colloques).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Cross-Domain Activity Recognition Using Shared Representation in Sensor Data

    Hamad, R. A., Yang, L., Woo, W. L. & Wei, B., 1/07/2022, In: IEEE Sensors Journal. 22, 13, p. 13273-13284 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Cross-device gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 26/03/2014, ETRA '14 Proceedings of the Symposium on Eye Tracking Research and Applications. New York: ACM, p. 19-26 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  10. Published

    Crisis negotiation: from suicide to terrorism intervention

    Wells, S., Taylor, P. & Giebels, E., 2013, Handbook of research in negotiation. Olekalns, M. & Adair, W. (eds.). London: Edward Elgar, p. 473-498 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

Back to top