Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A Deep Rule-based Approach for Satellite Scene Image Analysis

    Gu, X. & Angelov, P. P., 7/10/2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, p. 2778-2783 6 p. (2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A cylindrical model of communication behaviour in crisis negotiations.

    Taylor, P. J., 1/01/2002, In: Human Communication Research. 28, 1, p. 7-48 42 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems

    Staves, A., Anderson, T., Balderstone, H., Green, B., Gouglidis, A. & Hutchison, D., 31/07/2022, In: International Journal of Critical Infrastructure Protection. 37, 24 p., 100505.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    A control theory approach for analyzing the effects of data errors in safety-critical control systems

    Askerdal, O., Gäfvert, M., Hiller, M. & Suri, N., 16/12/2002, Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings. IEEE, p. 105-114 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A conservative index heuristic for routing problems with multiple heterogeneous service facilities

    Shone, R., Knight, V. A. & Harper, P. R., 1/12/2020, In: Mathematical Methods of Operational Research. 92, 3, p. 511-543 33 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A connection-level call admission control using genetic algorithm for multi-class multimedia services in wireless networks

    Hong, X., Xiao, Y., Ni, Q. & Li, T., 2006, In: International Journal of Mobile Communications. 4, 5, p. 568-580 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A computational protocol and software implementation (as a MATLAB application) for biomaker identification in infrared spectroscopy datasets

    Trevisan, J., Angelov, P. & Martin, F., 2010, In: Nature Protocols.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A Computational Model for Reputation and Ensemble-Based Learning Model for Prediction of Trustworthiness in Vehicular Ad Hoc Network

    Alharthi, A., Ni, Q., Jiang, R. & Khan, M. A., 15/10/2023, In: IEEE Internet of Things Journal. 10, 20, p. 18248-18258 11 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A compressive sensing assisted massive SM-VBLAST system: error probability performance and capacity analysis

    Xiao, L., Xiao, P., Liu, Z., Yu, W., Haas, H. & Hanzo, L., 31/03/2020, In: IEEE Transactions on Wireless Communications. 19, 3, p. 1990-2005 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A comprehensive review on handcrafted and learning-based action representation approaches for human activity recognition

    Bux, A., Angelov, P. P. & Habib, Z., 23/01/2017, In: Applied Sciences. 7, 1, 37 p., 110.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top