Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Towards adaptive, self learning resilience strategies

    Ali, A., Angelov, P. & Hutchinson, D., 15/03/2012, 6th International Workshop on Self Organizing Systems IWSOS-2012. Delft, The Netherlands

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNAbstract

  2. Published
    No renderer
  3. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Towards a Secure and Seamless Host Mobility for the real world

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on. IEEE, p. 134-141 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Towards a multihomed GSM gateway

    Withnell, R. & Edwards, C., 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Towards a framework for assessing the feasibility of side-channel attacks in virtualized environments

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 28/08/2014, 2014 11th International Conference on Security and Cryptography (SECRYPT). IEEE, p. 113-124 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Towards a distributed, self-organising approach to malware detection in cloud computing

    Watson, M. R., Shirazi, S. N. U. H., Marnerides, A. K., Mauthe, A. & Hutchison, D., 2014, Self-organizing systems : 7th IFIP TC 6 International Workshop, IWSOS 2013, Palma de Mallorca, Spain, May 9-10, 2013, Revised Selected Papers. Elmenreich, W., Dressler, F. & Loreto, V. (eds.). Berlin: Springer Verlag, p. 182-185 4 p. (Lecture Notes in Computer Science; vol. 8221).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Towards a Decision Engine for Self-Remediating Resilient Networks

    Schäfer, T., Smith, P., Schöller, M., Mohammad, A. J., Rohrer, J. P., Hutchison, D. & Sterbenz, J., 11/09/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  10. Published

    Towards a context aware multipath-TCP

    Withnell, R. & Edwards, C. J., 26/10/2015, Local Computer Networks (LCN), 2015 IEEE 40th Conference on. IEEE, p. 225-228 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Toward the first D-band Point to multipoint wireless system field test

    Paoloni, C., Basu, R., Burhenn, M., Hossain, M., Huebsch, D., Krozer, V., Quang, T. L., Letizia, R., Limiti, E., Magne, F., Marilier, M., Ramirez, A., Mahadev Rao, J., Ulisse, G., Vidal, B. & Yacob, H., 28/07/2021, 2021 Joint EuCNC & 6G Summit. IEEE, p. 55-59 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Toward an efficient solution for dynamic ad hoc network interoperability

    Prince, D., Scott, A. & Shepherd, D., 17/06/2002. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  13. Unpublished

    Toward a Practice of User-Centred Design for Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 14/05/2016, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  14. Published

    Toward 100 Gbps wireless networks enabled by millimeter wave traveling wave tubes

    Paoloni, C., Letizia, R., Krozer, V., Marilier, M., Boppel, S., Ramirez, A. & Vidal, B., 24/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    Toolkit support for interactive projected displays

    Hardy, J. & Alexander, J., 4/12/2012, MUM '12 Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Tool support for the evaluation of anomaly traffic classification for network resilience

    da Silva, A., Wickboldt, J., Schaeffer-Filho, A., Marnerides, A. & Mauthe, A. U., 6/07/2015, Proceedings of 20th IEEE Symposium on Computers and Communications, ISCC2015. IEEE, p. 514-519 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Unpublished

    Token-based Accounting for P2P-Systems

    Mauthe, A., Liebau, N., Darlagiannis, V. & Steinmetz, R., 02/2005, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  19. Published

    Token-Based Accounting and Distributed Pricing to Introduce Market Mechanisms in a Peer-to-Peer File Sharing Scenario

    Hausheer, D., Liebau, N. C., Mauthe, A., Steinmetz, R. & Stiller, B., 2003, P2P '03: Proceedings of the 3rd International Conference on Peer-to-Peer Computing. Washington, DC, USA: IEEE Computer Society, p. 200-201 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    To me, to you: Towards Secure PLC Programming through a Community-Driven Open-Source Initiative

    Derbyshire, R., Maesschalck, S., Staves, A., Green, B. & Hutchison, D., 31/07/2023, IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, p. 358-362 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

    Van der Zee, S., Poppe, R., Taylor, P. J. & Anderson, R., 12/04/2019, In: PLoS ONE. 14, 4, 18 p., e0215000.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Time-resolved studies of single quantum dots in magnetic fields

    Stevenson, R. M., Young, R. J., See, P., Faffer, I., Ritchie, D. A. & Shields, A. J., 1/03/2004, In: Physica E: Low-dimensional Systems and Nanostructures. 21, 2-4, p. 381-384 4 p.

    Research output: Contribution to Journal/MagazineConference articlepeer-review

  23. Published

    Time-Critical Data Delivery in Wireless Sensor Networks

    Suriyachai, P., Brown, J. & Roedig, U., 06/2010, Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2010). Rajaraman , R., Moscibroda , T., Dunkels, A. & Scaglione, A. (eds.). Berlin: Springer, p. 216-229 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Time-Constrained Ensemble Sensing With Heterogeneous IoT Devices in Intelligent Transportation Systems

    Feng, X., Luo, C., Wei, B., Zhang, J., Li, J., Wang, H., Xu, W., Chan, M. C. & Leung, V. C. M., 30/11/2023, In: IEEE Transactions on Intelligent Transportation Systems. 24, 11, p. 1-12 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Time for a Change: Examining Temporality in Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 2015, 11 p.

    Research output: Book/Report/ProceedingsOther report

  26. Published

    Tilt displays: designing display surfaces with multi-axis tilting and actuation

    Alexander, J., Lucero, A. & Subramanian, S., 2012, p. 161-170. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  27. Published

    THz Vacuum Amplifier: a European Project

    Paoloni, C., Di Carlo, A., Brunetti, F., Mineo, M. & Ulisse, G., 03/2009, Sif 2009 -Congresso Nazionale Societa’ Italiana Di Fisica. Italy

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    THz links using tube amplifiers and steerable beams for indoor applications

    Belem-Goncalves, C., Sarker, A., Giddens, H., Biurrun, C., Boccio, C.-R., Luxey, C., Hao, Y., Basu, R., Paoloni, C. & Ducournau, G., 21/10/2019, IRMMW-THz 2019 - 44th International Conference on Infrared, Millimeter, and Terahertz Waves. IEEE, 2 p. 8874114

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    THz BWO based on photonic crystal corrugated waveguide

    Letizia, R., Mineo, M. & Paoloni, C., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  30. Published

    THz Backward-wave oscillators for plasma diagnostic in nuclear fusion

    Paoloni, C., Yue, L., Tang, X., Zhang, F., Popovic, B., Himes, L., Barchfeld, R., Gamzina, D., Mineo, M., Letizia, R. & Luhmann Jr., N. C., 24/05/2015, Plasma Sciences (ICOPS), 2015 IEEE International Conference on. IEEE, 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    THz backward-wave oscillators for plasma diagnostic in nuclear fusion

    Paoloni, C., Gamzina, D., Himes, L., Popovic, B., Barchfeld, R., Yue, L., zheng, Y., Tang, X., Tang, Y., Pan, P., Li, H., Letizia, R., Mineo, M., Feng, J. & Luhmann Jr., N. C., 04/2016, In: IEEE Transactions on Plasma Science. 44, 4, p. 369-376 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    THz backward wave oscillator based on PhC-wall corrugated waveguide

    Letizia, R., Mineo, M. & Paoloni, C., 04/2014, 15th IEEE International Vacuum Electronic Conference. Monterey, Calif.: IEEE, p. 65-66 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    THz amplifier based on miniaturized vacuum tube FP7 OPTHER

    Paoloni, C. & Di Carlo, A., 05/2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  34. Published

    ThumbReels: query sensitive web video previews based on temporal, crowdsourced, semantic tagging

    Craggs, B., Kilgallon Scott, M. & Alexander, J., 26/04/2014, CHI '14 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, p. 1217-1220 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Throughput and backhaul energy efficiency analysis in two-tier HetNets: a multiobjective approach

    Pervaiz, H. B., Song, Z., Musavian, L. & Ni, Q., 09/2015, 20th IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks. IEEE, p. 69-74 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Throughput analysis and user barring design for uplink NOMA-enabled random access

    Yu, W., Foh, C. H., Ul Quddus, A., Liu, Y. & Tafazolli, R., 31/10/2021, In: IEEE Transactions on Wireless Communications. 20, 10, p. 6298-6314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Three-point interaction: combining bi-manual direct touch with gaze

    Simeone, A. L., Bulling, A., Alexander, J. & Gellersen, H., 7/06/2016, AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces. New York: ACM, p. 168-175 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Three-dimensional Access Point Assignment in Hybrid VLC, mmWave and WiFi Wireless Access Networks: 2020 IEEE International Conference on Communications, ICC 2020

    Zarakovitis, C. C., Chien, S. F., Pervaiz, H., Ni, Q., Cosmas, J., Jawad, N., Kourtis, M.-A., Koumaras, H. & Anagnostopoulos, T., 2020.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  39. Published

    Threats to next generation mobile application software

    Katsaros, I., Martin, I. & Honary, B., 23/09/2004, Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN, 2004. The 2nd IEE (Ref. No. 2004/10660). London, UK: IEEE, p. 10/1 – 10/3 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Threat Modelling Guided Trust-based Task Offloading for Resource-constrained Internet of Things

    Bradbury, M., Jhumka, A., Watson, T., Flores, D., Burton, J. & Butler, M., 1/05/2022, In: ACM Transactions on Sensor Networks. 18, 2, 41 p., 29.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Threat modeling and analysis for the cloud ecosystem

    Manzoor, S., Zhang, H., Suri, N., J., L., A., C., T., G. & Y., C., 17/04/2018, 2018 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 278-281 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Threat awareness for critical infrastructures resilience

    Gouglidis, A., Green, B., Busby, J. S., Rouncefield, M. F., Hutchison, D. & Schauer, S., 13/09/2016, Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on. 9781467390248: IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    This is not a paper: Applying a Design Research lens to video conferencing, publication formats, eggs… and other things

    Lindley, J., Green, D., Sturdee, M. & Alter, H., 13/05/2021, Proceedings of the 2021 CHI Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, 6 p. 16

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Third-parties, violence and conflict resolution: the role of group size and collective action in the micro-regulation of violence

    Levine, M., Taylor, P. & Best, R., 03/2011, In: Psychological Science. 22, 3, p. 406-412

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    'Things that went well - no serious deaths or injuries': ethical reasoning in normal engineering design processes

    Lloyd, P. A. & Busby, J. S., 2003, In: Science and Engineering Ethics. 9, p. 503-516 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    These aren’t the PLCs you’re looking for: Obfuscating PLCs to mimic Honeypots

    Maesschalck, S., Fantom, W., Giotsas, V. & Race, N., 30/06/2024, In: IEEE Transactions on Network and Service Management. 21, 3, p. 3623-3635 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Thermal analysis of THz double corrugated waveguide

    Mohan, S. & Paoloni, C., 2013, 2013 6th UK, Europe, China Millimeter Waves and THz Technology Workshop (UCMMT). Piscataway, N.J.: IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Theoretical and Practical Survey of Backhaul Connectivity Options

    Georgopoulos, P., Rocha Sa e Moura, J. A., Md Noor, R., McCarthy, B. & Edwards, C., 2010, JANET.

    Research output: Working paper

  50. Published

    The violent crime linkage analysis system: a test of interrater reliability

    Snook, B., Luther, K., House, J., Bennell, C. & Taylor, P., 05/2012, In: Criminal Justice and Behavior. 39, 5, p. 607-619 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    The utility of MPEG-7 systems in audio-visual applications with multiple streams.

    Lopes, R. J., Lindsay, A. T. & Hutchison, D., 01/2003, In: IEEE Transactions on Circuits and Systems for Video Technology. 13, 1, p. 16-25 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    The use of surrounding visual context in handheld AR: device vs. user perspective rendering

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 28/04/2014, CHI '14 Proceedings of the 32nd annual ACM conference on Human factors in computing systems. New York: ACM, p. 197-206 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    The unintended consequences of risk regulation

    MacGillivray, B. H., Alcock, R. E. & Busby, J. S., 2008, Proc 17th Annual Conference of SRA-Europe (Valencia) - 2008. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    The UK Programmable Fixed and Mobile Internet Infrastructure: Overview, capabilities and use cases deployment

    Alshaer, H., Uniyal, N., Katsaros, K., Antonakoglou, K., Simpson, S., Abumarshoud, H., Falaki, H., McCherry, P., Rotsos, C., Mahmoodi, T., Kaleshi, D., Hutchison, D., Haas, H. & Simeonidou, D., 1/09/2020, In: IEEE Access. 8, p. 175398 - 175411 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Unpublished

    The Two-Step P2P Simulation Approach

    Mauthe, A., Birck, H. & Heckmann, O., 09/2005, (Unpublished)

    Research output: Other contribution

  56. Published

    The Survival of the Fittest: An Evolutionary Approach to Deploying Adaptive Functionality in Peer-to-Peer Systems

    Tyson, G., Grace, P., Mauthe, A. & Kaune, S., 1/12/2008, ARM '08 Proceedings of the 7th workshop on Reflective and Adaptive Middleware. New York: ACM, p. 23-28 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    The structure of communication behavior in simulated and actual crisis negotiations

    Taylor, P. J. & Donald, I., 10/2004, In: Human Communication Research. 30, 4, p. 443-478 36 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    The structural, electronic and optical properties of GaSb/GaAs nanostructures for charge-based memory

    Hayne, M., Young, R. J., Smakman, E. P., Nowozin, T., Hodgson, P., Garleff, J. K., Rambabu, P., Koenraad, P. M., Marent, A., Bonato, L., Schliwa, A. & Bimberg, D., 3/07/2013, In: Journal of Physics D: Applied Physics. 46, 26, 10 p., 264001.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    The State of the (CHI)Art

    Sturdee, M., Lewis, M., Gamboa, M., Hoang, T. N., Miers, J., Smorgun, I., Jain, P., Strohmayer, A., Alaoui, S. F. & Wodtke, C. R., 27/04/2022, CHI 2022 - Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems. New York: ACM, p. 104:1-104:6 6 p. 104. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    The social ascription of obligations to engineers

    Busby, J. S. & Coeckelbergh, M., 2003, In: Science and Engineering Ethics. 9, 3, p. 363-376 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    The simulated security assessment ecosystem: Does penetration testing need standardisation?

    Knowles, W., Baron, A. & McGarr, T., 09/2016, In: Computers and Security. 62, p. 296-316 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    The shadow warriors: in the no man’s land between industrial control systems and enterprise IT systems

    Zanutto, A., Shreeve, B. O., Follis, K., Busby, J. S. & Rashid, A., 12/07/2017, 3rd Workshop on Security Information Workers (WSIW 2017): In conjunction with 13th Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    The seven year glitch: Unpacking beauty and despair in malfunction

    Sturdee, M., Lindley, J., Kluth, T. & Harrison, R., 21/04/2020, CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. New York: ACM, 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    The Seeder Promotion Problem: Measurements, Analysis and Solution Space

    Kaune, S., Tyson, G., Pussep, K., Mauthe, A. & Steinmetz, R., 2009, Proceedings of 19th International Conference on Computer Communications and Networks (ICCCN), 2010 . IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  66. Published

    The role of system‐use practices for sustaining motivation in crowdsourcing: A technology‐in‐practice perspective

    Alam, S. L. & Sun, R., 31/07/2023, In: Information Systems Journal . 33, 4, p. 758-789 32 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  68. Published

    The role of distributed cognition in the causation of accidents

    Busby, J. S. & Hughes, E. J., 2003, In: International Journal of Risk Assessment and Management. 4, p. 36-51 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    The responsibility for taking precautions against the risks of engineering design

    Coeckelbergh, M. & Busby, J. S., 2002, International Conference on Research in Ethics and Engineering (Delft) - 2002. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    The relationship between risk control imperative and perceived causation: the case of product counterfeiting in China

    Ding, B., Stevenson, M. & Busby, J. S., 2017, In: Journal of Risk Research. 20, 6, p. 800-826 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    The relational focus of small and medium sized actors’ understandings of supply chain finance (SCF)

    Phraknoi, N., Busby, J. & Stevenson, M., 12/08/2022, In: International Journal of Operations and Production Management. 42, 9, p. 1435-1466 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    The relational aspect to high reliability organization

    Busby, J. & Iszatt-White, M., 06/2014, In: Journal of Contingencies and Crisis Management. 22, 2, p. 69-80 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    The prenatal concept of number: further evidence of visual processing of stimuli before birth

    Dunn, K. J., Reissland, N., Young, R. J., Amu, J. & Reid, V. M., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  74. Published

    The precision, accuracy and efficiency of geographic profiling predictions: a simple heuristic versus mathematical algorithms

    Bennell, C., Emeno, K., Snook, B., Taylor, P. & Goodwill, A., 2009, In: Crime Mapping: A Journal of Research and Practice. 1, 2, p. 65-84 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    The precautionary principle as a heuristic patch

    Kaivanto, K. & Kwon, W., 09/2015, Lancaster: Lancaster University, Department of Economics, 35 p. (Economics Working Paper Series).

    Research output: Working paper

  76. Published

    The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators

    Gainer, P., Linker, S., Dixon, C., Hustadt, U. & Fisher, M., 11/10/2018, Formal Methods and Software Engineering: 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Sun, J. & Sun, M. (eds.). Cham: Springer, p. 160-176 17 p. (Lecture Notes in Computer Science; vol. 11232).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    The pathogen construct in risk analysis

    Busby, J. S. & Zhang, H., 2008, In: International Journal of Project Management. 39, 3, p. 86-96 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    The OPTHER project: Progress toward the THz amplifier

    Paoloni, C., Brunetti, F., Di Carlo, A., Mineo, M., Tamburri, E., Terranova, M. L., Ulisse, G., Durand, A., Marchesin, R., Pham, K., Krozer, V., Kotiranta, M., de Rossi, A., Dolfi, D., Guiset, P., Legagneux, P., Schnell, J. P., Fiorello, A., Dispenza, M. & Secchi, A. & 5 others, Zhurbenko, V., Megtert, S., Bouamrane, F., Cojocaru, C.-S. & Gohier, A., 1/02/2011, Vacuum Electronics Conference (IVEC), 2011 IEEE International. IEEE, p. 55-56 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

  80. Published

    The need for a generalized compositional framework

    Suri, N., 3/03/2004, 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.. IEEE, p. 340 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    The morphology of GaSb/GaAs nanostructures grown by MBE

    Young, R., 5/01/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  82. Published

    The measurement and modeling of a P2P streaming video service

    Gao, P., Liu, T., Chen, Y., Wu, X., El-khatib, Y. & Edwards, C., 10/2008, Networks for Grid Applications : Second International Conference, GridNets 2008, Beijing, China, October 8-10, 2008, Revised Selected Papers. Vicat-Blanc Primet, P., Kudoh, T. & Mambretti, J. (eds.). Berlin: Springer, p. 24-34 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 2).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    The Manipulative Presentation Techniques of Controlling and Coercive Offenders

    Watson, S. J., Luther, K., Jackson, J., Taylor, P. J. & Alison, L., 25/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  84. Published

    The Lorien dynamic component based OS

    Porter, B., Roedig, U., Taiani, F. & Coulson, G., 11/2010, SenSys '10 Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. ACM, p. 355-356 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    The language of Islamic extremism: towards an automated identification of beliefs, motivations and justifications

    Prentice, S., Rayson, P. & Taylor, P., 2012, In: International Journal of Corpus Linguistics. 17, 2, p. 259-286 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    The Integration of Ad-hoc (MANET) and Mobile Networking (NEMO): Principles to Support Rescue Team Communication

    McCarthy, B., Edwards, C. & Dunmore, M., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  87. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  88. Published

    The influence of geopolitics on polar research – Options for HM Government

    Germond, B. & Suri, N., 8/06/2023

    Research output: Exhibits, objects and web-based outputsBlog

  89. Published

    The impact of wireless device access on content delivery networks

    Denney, J. & Race, N., 2003, Interactive multimedia on next generation networks: first international workshop on multimedia interactive protocols and systems, MIPS 2003, Naples, Italy, November 18-21, 2003. Proceedings. Ventre, G. & Canonico, R. (eds.). Berlin: Springer Verlag, p. 1-15 15 p. (Lecture Notes in Computer Science; vol. 2899).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    The impact of temperature on outdoor industrial sensornet applications

    Boano, C. A., Tsiftes, N., Voigt, T., Brown, J. & Roedig, U., 08/2010, In: IEEE Transactions on Industrial Informatics. 6, 3, p. 451-459 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (Editor), Jin, X. (Editor), Jarvis, S. (Editor), Liu, L. (Editor), Calvo, R. A. (Editor), Hu, J. (Editor), Min, G. (Editor), Georgalas, N. (Editor) & Wu, Y. (Editor), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    The impact of fault models on software robustness evaluations

    Winter, S., Sârbu, C., Suri, N. & Murphy, B., 21/05/2011, Proceedings of the 33rd International Conference on Software Engineering . ACM, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    The human fetus preferentially engages with face-like visual stimuli

    Reid, V. M., Dunn, K. J., Young, R. J., Amu, J., Donovan, T. & Reissland, N., 19/06/2017, In: Current Biology. 27, 12, p. 1825-1828 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    The great plains environment for network innovation (GpENI): a programmable testbed for future internet architecture research

    Sterbenz, J. P. G., Medhi, D., Ramamurthy, B., Scoglio, C. M., Hutchison, D., Plattner, B., Anjali, T., Scott, A., Buffington, C. & Monaco, G. E., 2010, Testbeds and Research Infrastructures. Development of Networks and Communities: 6th International ICST Conference, TridentCom 2010, Berlin, Germany, May 18-20, 2010, Revised Selected Papers. Magendanz, T., Gavras, A., Thanh, N. H. & Chase, J. S. (eds.). Berlin: Springer, p. 428-441 14 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 46).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    The GPT Cryptosystems for Secure Broadband Communication

    Rashwan, H. & Honary, B., 07/2010, 4th International Symposium on Broadband Communications (ISBC 2010) . Melaka, Malaysia

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    The GINSENG system for wireless monitoring and Control: design and deployment experiences

    O'Donovan, T., Brown, J., Buesching, F., Cardoso, A., Cecilio, J., Ó, J. M. D., Futado, P., Gil, P., Jugel, A., Pöttner, W.-B., Roedig, U., Silva, J. S., Silva, R., Sreenan, C., Vassiliou, V., Voigt, T., Wolf, L. & Zinonos, Z., 11/2013, In: ACM Transactions on Sensor Networks. 10, 1, 40 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  99. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  100. Published

    The future of digital disrupters: rethinking the digital divide

    Lacy, M. & Prince, D., 12/06/2013, Lancaster: Lancaster University. 46 p. (Future of...)

    Research output: Book/Report/ProceedingsOther report

Previous 1 2 3 4 5 6 7 8 ...26 Next

Back to top