Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict

    Prentice, S., Taylor, P. J., Rayson, P., Hoskins, A. & O'Loughlin, B., 03/2011, In: Information Systems Frontiers . 13, 1, p. 61-73 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Analyzing the Impact of Data Errors in Safety-Critical Control Systems

    Askerdal, Ö., Gäfvert, M., Hiller, M. & Suri, N., 2003, In: IEICE Transactions on Information and Systems. E86-D, 12, p. 2623-2633 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Analyzing and improving customer-side cloud security certifiability

    Zhao, S., Chen, Y., Winter, S. & Suri, N., 1/10/2019, Proceedings - 2019 IEEE 30th International Symposium on Software Reliability Engineering Workshops, ISSREW 2019. p. 300-307 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Analytical Design Method for Corrugated Rectangular Waveguide SWS THz Vacuum Tubes

    Mineo, M., Di Carlo, A. & Paoloni, C., 2010, In: Journal of Electromagnetic Waves and Applications. 24, 17-18, p. 2479-2494 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Analytical computations, measurements and 3-D EM simulations for the calculation of cold parameters in helical SWSs

    Aloisio, M., Carter, R. & Paoloni, C., 2007, EIGHTH IEEE INTERNATIONAL VACUUM ELECTRONICS CONFERENCE. NEW YORK: IEEE, ELECTRON DEVICES SOC & RELIABILITY GROUP, p. 413-414 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Analytical and Numerical Simulation of Multipactor within a Helical Resonant Filter

    Constable, D., McElhinney, P., Lingwood, C. J., Burt, G. C., Salza, G. & Goussetis, G., 24/04/2017, Vacuum Electronics Conference (IVEC), 2017 Eighteenth International. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Analysis of Wakefields in the ILC crab cavity.

    Burt, G., Dexter, A., Bellantoni, C., Beard, P. & Goudket, P., 2006, Proceedings of the EPAC 2006 conference..

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Analysis of the four rod crab cavity for HL-LHC

    Hall, B., Ambattu, P. K., Burt, G., Dexter, A. C., Doherty, D., Lingwood, C., Calaga, R., Jensen, E., Rimmer, R., Wang, H., Gorelov, D., Grimm, T., Schnabel, E., Goudket, P., Hill, C. & McIntosh, P. A., 1/12/2012, IPAC 2012 - International Particle Accelerator Conference 2012. p. 2275-2277 3 p. (IPAC 2012 - International Particle Accelerator Conference 2012).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Analysis of methanogen diversity in a hypereutrophic lake using PCR-RFLP analysis of mcr sequences

    Earl, J., Hall, G., Pickup, R. W., Ritchie, D. A. & Edwards, C., 31/08/2003, In: Microbial Ecology. 46, 2, p. 270-278 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Analysis of evolving social network: methods and results from cell phone data set case study

    Dutta Baruah, R. & Angelov, P., 2013, In: International Journal of Social Network Mining. 1, 3-4, p. 254-279 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Analysis of dielectric rods with arbitrary shape for low-dispersion slow-wave structures in helix TWTs

    Paoloni, C., 06/2006, In: IEEE Transactions on Electron Devices. 53, 6, p. 1490-1493 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Analysis of Damping Requirements for Dipole Wake-Fields in RF Crab.

    Burt, G., Jones, R. M. & Dexter, A. C., 2007, In: IEEE Transactions on Nuclear Science. 54, 5

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Analysis of an Anonymity Network for Web Browsing.

    Mathy, L., Hutchison, D., Rennhard, M. & Plattner, B., 06/2002, WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises. p. 49 - 54 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Analysis of adaptation law of the robust evolving cloud-based controller

    Andonovski, G., Blazic, S., Angelov, P. P. & Skrjanc, I., 3/12/2015, Proceedings 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  18. Published

    Analysis and control of wakefields in X-band crab cavities for Compact Linear Collider

    Ambattu, P. K., Burt, G., Khan, V., Jones, R. M., Dexter, A. C. & Dolgashev, V., 21/11/2011, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 657, 1, p. 27-37 11 p.

    Research output: Contribution to Journal/MagazineJournal article

  19. Published

    Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

    Sturdee, M. & Alexander, J., 3/01/2018, In: ACM Computing Surveys. 51, 1, p. 2:1-2:32 32 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Analysing the risks of individual and collective intentionality

    Busby, J. S. & Bennett, S. A., 2008, In: Journal of Risk Research. 11, 6, p. 797-819 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Analysing spatial properties on neighbourhood spaces

    Linker, S., Papacchini, F. & Sevegnani, M., 1/08/2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 66:1-66:14 14 p. MFCS-2020-66. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Analysing radiative and non-radiative recombination in InAs quantum dots grown on Si substrates for integrated laser applications

    Orchard, J., Woodhead, C., Shutts, S., Wu, J., Sobiesierski, A., Young, R. J., Beanland, R., Liu, H., Smowton, P. & Mowbray, D., 15/03/2016, Proceedings Volume 9758, Quantum Dots and Nanostructures: Growth, Characterization, and Modeling XIII. Huffaker, D. L., Eisele, H. & Dick, K. A. (eds.). SPIE, Vol. 9758. 7 p. 975809. (Proceedings of SPIE).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Analysing forensic processes: taking time into account

    Taylor, P., Jacques, K., Giebels, E., Levine, M. & Gendreau, P., 2008, In: Issues in Forensic Psychology. 8, p. 45-57 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 30/06/2021, 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, p. 908-913 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Analysing complicity in risk

    Busby, J. S., 2008, In: Risk Analysis. 28, 6, p. 1571-1582 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    An unsaturated model for request mechanisms in WiMAX

    Ni, Q. & Hu, L., 01/2010, In: IEEE Communications Letters. 14, 1, p. 45-47 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    An uniformly stable backpropagation algorithm to train a feedforward neural network

    Rubio, J. D. J., Angelov, P. & García, E., 03/2011, In: IEEE Transactions on Neural Networks. 22, 3, p. 356-366 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    An overview on fault diagnosis and nature-inspired optimal control of industrial process applications

    Precup, R.-E., Angelov, P., Jales Costa, B. S. & Sayed-Mouchaweh, M., 12/2015, In: Computers in Industry. 74, p. 75-94 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    An overview on Channel Polarization and Polar Codes

    El-Hawat, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunication, Networking and Broadcasting . p. 297–301 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    An Overview of Verification and Validation Challenges for Inspection Robots

    Fisher, M., Cardoso, R. C., Collins, E. C., Dadswell, C., Dennis, L. A., Dixon, C., Farrell, M., Ferrando, A., Huang, X., Jump, M., Kourtis, G., Lisitsa, A., Luckcuck, M., Luo, S., Page, V., Papacchini, F. & Webster, M. T., 29/04/2021, In: Robotics. 10, 2, 29 p., 67.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    An Overlay Tree Building Control Protocol.

    Mathy, L., Canonico, R. & Hutchison, D., 1/01/2001, Networked Group Communication. Heidelberg: Springer Berlin, Vol. 2233/2. p. 76-87 12 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    An optimization based design for integrated dependable real-time embedded systems

    Islam, S., Suri, N., Balogh, A., Csertán, G. & Pataricza, A., 2009, In: Design Automation for Embedded Systems. 13, 4, p. 245-285 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    AN OPTICAL RETRIEVAL SYSTEM, DATA STORAGE SYSTEM, DATA STORAGE MEDIUM AND METHOD OF OPTICAL RETRIEVAL AND DATA STORAGE

    KABUSHIKI, K. (Inventor), Yuan, Z. (Inventor), Young, R. (Inventor), Shields, A. J. (Inventor) & Stevenson, R. M. (Inventor), 31/12/2008, IPC No. PCT/GB2008/002236, Patent No. WO/2009/001105

    Research output: Patent

  35. Published

    An open architecture mechanism for control of dynamic processing resources

    Lund, D., Martin, I. & Honary, B., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 469–473 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    An intelligent genetic algorithm for PAPR reduction in a multi-carrier CDMA wireless system

    Zhang, Y., Ni, Q., Chen, H. H. & Song, Y., 2008, Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08. International. IEEE, p. 1052-1057 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    An improved watermarking technique for the casting of digital signatures

    Katsaros, I. & Honary, B., 10/2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. London: IEEE, p. 490-493 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    An improved equivalent circuit model of a four rod deflecting cavity

    Apsimon, R. J. & Burt, G. C., 1/03/2017, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 847, p. 52-60 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  42. Published

    An ILNP-based solution for future heterogeneous wireless networks

    Isah, M. & Edwards, C. J., 06/2013, PGNET 2013: Proceedings of the 14th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting. Liverpool, United Kingdom: Liverpool John Moores University, School of Computing & Mathematical Sciences, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    An ICT Architecture for Enabling Ancillary Services in Distributed Renewable Energy Sources Based on the SGAM Framework

    Stocker, A., Alshawish, A., Bor, M., Vidler, J., Gouglidis, A., Scott, A., Marnerides, A., de Meer, H. & Hutchison, D., 12/05/2022, In: Energy Informatics. 5, 1, 5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2007, Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on. IEEE, p. 267-271 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    An evolving machine learning method for human activity recognition systems

    Andreu, J. & Angelov, P., 2013, In: Journal of Ambient Intelligence and Humanized Computing. 4, 2, p. 195-206 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    An evolving graph-based reliable routing scheme for VANETs

    Eiza, M. H. & Ni, Q., 05/2013, In: IEEE Transactions on Vehicular Technology. 62, 4, p. 1493-1504 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    An evolving approach to unsupervised and Real-Time fault detection in industrial processes

    Gomes Bezerra, C., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 30/11/2016, In: Expert Systems with Applications. 63, p. 134-144 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    An evolutionary approach to fuzzy rule-based model synthesis using indices for rules

    Angelov, P., 1/08/2003, In: Fuzzy Sets and Systems. 137, 3, p. 325-338 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    'An error is feedback’: the experience of communication error management in crisis negotiations

    Oostinga, M., Giebels, E. & Taylor, P. J., 01/2018, In: Police Practice and Research. 19, 1, p. 17-30 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    An empirical study of injected versus actual interface errors

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 21/07/2014, Proceedings of the 2014 International Symposium on Software Testing and Analysis. ACM, p. 397-408 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    An empirical investigation of gaze selection in mid-air gestural 3D manipulation

    Velloso, E., Turner, J., Alexander, J., Bulling, A. & Gellersen, H., 30/08/2015, Human-Computer Interaction – INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. & Winckler, M. (eds.). Cham: Springer International Publishing, p. 315-330 16 p. (Lecture Notes in Computer Science ; vol. 9297).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    An Empirical Characterisation of Electronic Document Navigation

    Alexander, J. & Cockburn, A., 2008, Proceedings of Graphics Interface 2008. Toronto, Ont., Canada, Canada: Canadian Information Processing Society, p. 123-130 8 p. (GI '08).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    An efficient TDMA start-up and restart synchronization approach for distributed embedded systems

    Claesson, V., Lönn, H. & Suri, N., 13/09/2004, In: IEEE Transactions on Parallel and Distributed Systems. 15, 8, p. 725-739 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices

    Komninos, N., Honary, B. & Darnell, M., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 294-300 7 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    An efficient pricing based protocol for broadcasting in wireless ad hoc networks

    Suri, N., Narahari, Y. & Manjunath, D., 8/01/2006, 2006 1st International Conference on Communication Systems Software & Middleware. IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    An effective ant-colony based routing algorithm for mobile ad-hoc network

    Liu, Y., Zhang, H., Ni, Q., Zhou, Z. & Zhu, G., 05/2008, Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference on. IEEE, p. 100-103 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    An auction algorithm for procuring wireless channel in a heterogenous wireless network

    Suri, N. & Narahari, Y., 11/04/2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Unpublished

    An Architecture for Pseudonymous e-Commerce.

    Mathy, L., Hutchison, D., Rennhard, M. & Plattner, B., 03/2001, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  63. Published

    An Architecture for an Anonymity Network.

    Mathy, L., Hutchison, D., Rennhard, M. & Plattner, B., 06/2001, WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. IEEE Computer Society, p. 165 - 170 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    An approach to synthesise safe systems

    Jhumka, A., Freiling, F., Fetzer, C. & Suri, N., 2006, In: International Journal of Security and Networks. 1, 1-2, p. 62-74 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    An approach to specify and test component-based dependable software

    Jhumka, A., Hiller, M. & Suri, N., 23/10/2002, 7th IEEE International Symposium on High Assurance Systems Engineering, 2002. Proceedings.. IEEE, p. 211-220 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Unpublished

    An Approach to Reliability Enhancement of Overlay Multicast Trees

    Xie, L., Mathy, L. & Hutchison, D., 06/2003, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  67. Published

    An Approach to Real-Time Color-based Object Tracking

    Memon, M. A., Angelov, P. & Ahmed, H., 8/09/2006, Evolving Fuzzy Systems, 2006 International Symposium on. IEEE, p. 81-87 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    An approach to online identification of Takagi-Sugeno fuzzy models

    Angelov, P. & Filev, D., 02/2004, In: IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics. 34, 1, p. 484-498 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    An Approach to On-line Design of Fuzzy Controllers with Evolving Structure

    Angelov, P., 2002, Proceedings 4th International Conference on Recent Advances in Soft Computing, Nottingham, 12-13 December 2002. Lofti, A. & Garibaldi, J. M. (eds.). Nottingham: Nottingham Trent University, p. 55-56 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    An approach to on-line design of fuzzy controllers with evolving structure

    Angelov, P., 10/2004, Applications and Science in Soft Computing. Ahmad, L. & Garibaldi, J. M. (eds.). Berlin/Heidelberg: Springer, p. 63-68 6 p. (Advances in Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  71. Published

    An Approach to Model-based Fault Detection in Industrial Measurement Systems with Application to Engine Test Benches.

    Angelov, P., Giglio, V., Guardiola, C., Lughofer, E. & Lujan, J. M., 07/2006, In: Measurement Science and Technology. 17, 7, p. 1809-1818 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    An Approach to Autonomous Self-localization of a Mobile Robot in Completely Unknown Environment using Evolving Fuzzy Rule-based Classifier

    Zhou, X. & Angelov, P., 2/04/2007, Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposium on. IEEE, p. 131-138 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    An approach to automatic real-time novelty detection, object identification, and tracking in video streams based on recursive density estimation and evolving Takagi–Sugeno fuzzy systems

    Angelov, P., Sadeghi-Tehran, P. & Ramezani, R., 03/2011, In: International Journal of Intelligent Systems. 26, 3, p. 189-205 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    An Approach for Rule-base Adaptation using On-line Clustering

    Angelov, P., 09/2002, Proceedings of EUNITE, Albufeira, Portugal, 19-22 September 2002. EUNITE, p. 47-52 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    An Approach for Fuzzy Rule-base Adaptation using On-line Clustering.

    Angelov, P., 03/2004, In: International Journal of Approximate Reasoning. 35, 3, p. 275-289 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    An approach for designing and assessing detectors for dependable component-based systems

    Jhumka, A., Hiller, M. & Suri, N., 25/03/2004, Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings. IEEE, Vol. 8. p. 69-78 10 p. (Proc. IEEE Int. Symp. High Assur. Syst. Eng.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    An approach for analysing the propagation of data errors in software

    Hiller, M., Jhumka, A., Suri, N. & D.C., Y. (Editor), 1/07/2001, 2001 International Conference on Dependable Systems and Networks. IEEE, p. 161-170 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    An analytical model of trilateration localization error

    Farooq-I-Azam, M., Ni, Q. & Dong, M., 27/02/2020, 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    An Analysis of Cyber Security Attack Taxonomies

    Derbyshire, R., Green, B., Mauthe, A. U., Busby, J. S. & Hutchison, D., 27/04/2018, Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. IEEE, p. 153-161 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments

    Staves, A., Gouglidis, A. & Hutchison, D., 31/03/2023, In: Digital Threats: Research and Practice. 4, 1, p. 1-29 29 p., 14.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2012, Advanced Agent Technology. Dechesne, F., Hattori, H., ter Mors, A., Such, J. M., Weyns, D. & Dignum, F. (eds.). Berlin: Springer Verlag, p. 411-425 15 p. (Lecture Notes in Computer Science; vol. 7068).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    An adaptive medium access control scheme for mobile ad hoc networks under self-similar traffic

    Abu-Tair, M., Min, G., Ni, Q. & Liu, H., 2010, In: Journal of Supercomputing. 53, 1, p. 212-230 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    An adaptive and composite spatio-temporal data compression approach for wireless sensor networks

    Ali, A., Khelil, A., Szczytowski, P. & Suri, N., 31/10/2011, Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. ACM, p. 67-76 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    An active learning technique enhanced with electronic polls

    Such, J. M., Criado Pacheco, N. & Garcia-Fornes, A., 2015, In: International Journal of Engineering Education. 31, 4, p. 1048-1057 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    AMAB: automated measurement and analysis of body motion

    Poppe, R., Van der Zee, S., Heylen, D. & Taylor, P. J., 09/2014, In: Behavior Research Methods. 46, 3, p. 625-633 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Alternation Bias and the Parameterization of Cumulative Prospect Theory

    Kaivanto, K., 2008, Advances in Decision Making Under Risk and Uncertainty, Theory and Decision Library C 42. Berlin: Springer-Verglag, p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Alternation bias and reduction in St. Petersburg gambles: an experimental investigation

    Kaivanto, K. & Kroll, E., 2014, Lancaster: Lancaster University, Department of Economics, 33 p. (Economics Working Paper Series; vol. 2014, no. 14).

    Research output: Working paper

  88. Published

    ALMA for evolving systems

    Angelov, P., 8/06/2012, 12th NCEI, Auckland, New Zealand. Auckland

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNAbstract

  89. Unpublished

    ALM and ProgNets for v4-to-v6 multicast transition

    Smith, P., Mathy, L., Hutchison, D. & Canonico, R., 04/2001, (Unpublished)

    Research output: Other contribution

  90. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    Algorithms for Real-Time Clustering and Generation of Rules from Data

    Filev, D. & Angelov, P., 2007, Advances in Fuzzy Clustering and Its Applications. de Oliveira, J. V. & Pedrycz, W. (eds.). Chichester: John Willey and Sons, p. 353-370 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  92. Published

    AlGaAs/GaAs/AlGaAs quantum wells as a sensitive tool for the MOVPE reactor environment

    Dimastrodonato, V., Mereni, L. O., Young, R. J. & Pelucchi, E., 15/10/2010, In: Journal of Crystal Growth. 312, 21, p. 3057-3062 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    Aiding modular design and verification of safety-critical time-triggered systems by use of executable formal specifications

    Sakurai, K., Bokor, P. & Suri, N., 3/12/2008, 2008 11th IEEE High Assurance Systems Engineering Symposium. IEEE, p. 261-270 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Agile sink selection in wireless sensor networks

    Mahmudimanesh, M. & Suri, N., 30/06/2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, p. 390-398 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Agile collaborative autonomous agents for robust underwater classification scenarios

    Carline, D., Angelov, P. & Clifford, R., 06/2005. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  97. Published

    Agile collaborative agents for classification of underwater targets

    Carline, D., Angelov, P. & Clifford, R., 21/06/2005, Proceedings of the Undersea Defense Technology Conference 2005. Amsterdam, The Netherlands

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Aggregation with fragment retransmission for very high-speed WLANs

    Li, T., Ni, Q., Malone, D., Leith, D., Xiao, Y. & Turletti, T., 04/2009, In: IEEE/ACM Transactions on Networking . 17, 2, p. 591-604 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Agent-based computational modelling of social risk responses

    Busby, J. S., Onggo, B. S. S. & Liu, Y., 16/06/2016, In: European Journal of Operational Research. 251, 3, p. 1029-1042 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Adversarial Machine Learning in Smart Energy Systems

    Bor, M., Marnerides, A., Molineux, A., Wattam, S. & Roedig, U., 25/06/2019, e-Energy '19 Proceedings of the Tenth ACM International Conference on Future Energy Systems. New York: ACM, p. 413-415 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top