Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Conference contribution/Paper
  2. Published

    An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices

    Komninos, N., Honary, B. & Darnell, M., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 294-300 7 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Chapter
  4. Published

    Nanocellulose-based sustainable microwave absorbers to stifle electromagnetic pollution

    Pai, A., Paoloni, C. & Thomas, S., 9/10/2020, Nanocellulose Based Composites for Electronics. Elsevier, p. 237-258 22 p. (Micro and Nano Technologies).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Extracting Safe Thread Schedules from Incomplete Model Checking Results

    Metzler, P., Suri, N. & Weissenbacher, G., 2/10/2019, Model Checking Software: 26th International Symposium, SPIN 2019, Beijing, China, July 15–16, 2019, Proceedings. Springer, p. 153-171 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Distributed Systems Security

    Suri, N., 1/10/2019, CyBOK Knowledge Base. Lupu, E. (ed.). Bristol: University of Bristol, p. 38

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (ed.) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    Prediction of the attention area in ambient intelligence tasks

    Shafi, J., Angelov, P. P. & Umair, M., 3/02/2016, Innovative issues in intelligent systems. Sgurev, V., Yager, R., Kacprzyk, J. & Jotsov, V. (eds.). Berlin: Springer, p. 33-56 24 p. (Studies in Computational Intelligence; vol. 623).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Crab Cavity Development

    Burt, G. C., 10/2015, The High Luminosity Large Hadron Collider: The New Machine for Illuminating the Mysteries of Universe. Brüning, O. & Rossi, L. (eds.). World Scientific, (Advanced Series on Directions in High Energy Physics; vol. 24).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    On the feasibility of side-channel attacks in a virtualized environment

    Vateva-Gurova, T., Luna, J., Pellegrino, G. & Suri, N., 2015, E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers. Springer-Verlag, Vol. 554. p. 319-339 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  16. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  17. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  18. Published

    Error models for the representative injection of software defects

    Lanzaro, A., Natella, R., Winter, S., Cotroneo, D. & Suri, N., 2015, Software-engineering and management. Assmann, U. (ed.). Gesellschaft für Informatik, p. 118-119 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  19. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  20. Published

    Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  21. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  22. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  23. Published

    Crossing boundaries: using GIS in literary studies, history and beyond

    Gregory, I. N., Baron, A., Cooper, D., Hardie, A., Murrieta-Flores, P. & Rayson, P. E., 2014, Keys for architectural history research in the digital era. Hueber, J. & Mendes da Silva, A. (eds.). Institut national d'histoire de l'art, (Actes de colloques).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  24. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Quality Evaluation in Peer-to-Peer IPTV Services

    Mu, M., Knowles, W., Georgopoulos, P., Simpson, S., Cerqueira, E., Race, N., Mauthe, A. & Hutchison, D., 2013, Data Traffic Monitoring and Analysis: From Measurement, Classification and Anomaly Detection to Quality of Experience. Biersack, E., Callegari, C. & Matijasevic, M. (eds.). Berlin: Springer, p. 302-319 18 p. (Lecture Notes in Computer Science; vol. 7754).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  26. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  27. Published

    Brief announcement: MP-state: State-aware software model checking of message-passing systems

    Muftuoglu, C. A., Bokor, P. & Suri, N., 2012, Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Vol. 7596 LNCS. p. 183-186 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Back to top