Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2008, In: Journal of Networks. 3, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A comparison of static and dynamic component models for Wireless Sensor Networks

    Porter, B., Roedig, U., Taiani, F. & Coulson, G., 04/2010, Proceedings of the The First International Workshop on Networks of Cooperating Objects (CONET2010). 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A comparison of MANET emulation techniques for the production of a realistic testbed with global communication capabilities

    Palmer, W., McCarthy, B. & Edwards, C., 04/2009, Wireless Telecommunications Symposium, 2009. WTS 2009. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A Comparative Study on Iterative Methods Regarding Cross-Layer Optimization for OFDMA Systems

    C. Zarakovitis, C., Nikolaros, I., Skordoulis, D., Hadjinicolaou, M. & Ni, Q., 08/2010, IEEE International Conference on Computer and Information Technology (CIT), 10.1109/CIT.2010.98. IEEE, p. 420-425 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Comparative Study of two Approaches for Data-Driven Design of Evolving Fuzzy Systems: eTS and FLEXFIS

    Angelov, P. & Lughofer, E., 02/2008, In: International Journal of General Systems. 37, 1, p. 45-67 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A comparative study of data transport protocols in wireless sensor networks

    Shaikh, F. K., Khelil, A. & Suri, N., 23/06/2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A comparative study of autonomous learning outlier detection methods applied to fault detection

    Bezerra, C. G., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 08/2015, Proceedings of the 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A comparative performance study of IPv6 transitioning mechanisms - NAT-PT vs. TRT vs. DSTM

    Mackay, M., Edwards, C., Boavida, F. (ed.), Plagemann, T. (ed.), Stiller, B. (ed.), Westphal, C. (ed.) & Monteiro, E. (ed.), 2006, p. 1125-1131. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  10. Published

    A Common Architecture for Cross Layer and Network Context Awareness

    Sifalakis, M., Fry, M. & Hutchison, D., 08/2007, Self-Organizing Systems. 2007 ed. Springer-Verlag, Vol. 4725. p. 103-118 16 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Back to top