Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Maximization of the sum of sensitivity and specificity as a diagnostic cutpoint criterion

    Kaivanto, K., 2008, In: Journal of Clinical Epidemiology. 61, 5, p. 517-518 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Negative recency, randomization device choice, and reduction of compound lotteries

    Kaivanto, K. & Kroll, E. B., 05/2012, In: Economics Letters. 115, 2, p. 263-267 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Bias-trigger manipulation and task-form understanding in Monty Hall

    Kaivanto, K., Kroll, E. B. & Zabinski, M., 2014, In: Economics Bulletin. 34, 1, p. 89-98 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    The effect of decentralized behavioral decision making on system-level risk

    Kaivanto, K., 12/2014, In: Risk Analysis. 34, 12, p. 2121-2142 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Alternation bias and reduction in St. Petersburg gambles: an experimental investigation

    Kaivanto, K. & Kroll, E., 2014, Lancaster: Lancaster University, Department of Economics, 33 p. (Economics Working Paper Series; vol. 2014, no. 14).

    Research output: Working paper

  6. Published

    Visceral emotions, within-community communication, and (ill-judged) endorsement of financial propositions

    Kaivanto, K., 2014, Lancaster: Lancaster University, Department of Economics, (Economics Working Paper Series; vol. 2014, no. 25).

    Research output: Working paper

  7. Published

    The precautionary principle as a heuristic patch

    Kaivanto, K. & Kwon, W., 09/2015, Lancaster: Lancaster University, Department of Economics, 35 p. (Economics Working Paper Series).

    Research output: Working paper

  8. Published

    When are capital structure decisions nonseparable from production planning? the case of generalized royalty-based hybrid finance

    Kaivanto, K. & Zinober, A., 2015, Lancaster: Lancaster University, Department of Economics, 13 p. (Economics working paper series).

    Research output: Working paper

  9. Published

    A Resolution of Emissions-Estimate Confusion for Informing Flight Choice

    Kaivanto, K. K. & Zhang, P., 05/2016, Economics: Lancaster University, Department of Economics, (Economics working paper series).

    Research output: Working paper

  10. Published

    Rank-order concordance among conflicting emissions estimates for informing flight choice

    Kaivanto, K. & Zhang, P., 01/2017, In: Transportation Research Part D: Transport and Environment. 50, p. 418-430 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Ensemble Prospectism

    Kaivanto, K. K., 12/2016, Lancaster: Lancaster University, Department of Economics, (Economics Working Paper Series).

    Research output: Working paper

  12. Published

    Pre-Decision Side-Bet Sequences

    Kaivanto, K. K. & Peel, D. A., 04/2017, Lancaster: Lancaster University, Department of Economics, (Economics Working Paper Series).

    Research output: Working paper

  13. Published

    Ensemble prospectism

    Kaivanto, K. K., 18/11/2017, In: Theory and Decision. 83, 4, p. 535-546 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Community-level natural resource management institutions: A noncooperative equilibrium example

    Kaivanto, K. K., 23/04/2018, In: International Journal of the Commons. 12, 1, p. 548-572 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    A Fuel-Payload Ratio Based Flight-Segmentation Benchmark

    Kaivanto, K. K. & Zhang, P., 08/2018, In: Transportation Research Part D: Transport and Environment. 63, p. 548–559 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Adjusting Inferential Thresholds to Reflect Nonepistemic Values

    Kaivanto, K. K. & Steel, D., 1/04/2019, In: Philosophy of Science. 86, 2, p. 255-285 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Pre-Decision Side-Bet Sequences

    Kaivanto, K. K. & Peel, D. A., 16/03/2019, In: Economics Bulletin. 39, 1, p. 533-539 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Investor Sentiment as a Predictor of Market Returns

    Kaivanto, K. & Zhang, P., 06/2019, Lancaster University, Department of Economics, 43 p. (Economics Working Papers Series).

    Research output: Working paper

  19. Published

    Popular Music, Sentiment, and Noise Trading

    Kaivanto, K. & Zhang, P., 31/10/2019, Lancaster: Lancaster University, Department of Economics, (Economics Working Papers Series).

    Research output: Working paper

  20. Published

    Is Business Formation Driven by Sentiment or Fundamentals?

    Kaivanto, K. & Zhang, P., 22/07/2021, Lancaster: Lancaster University, Department of Economics, (Economics Working Papers Series).

    Research output: Working paper

  21. Published

    Is business formation driven by sentiment or fundamentals?

    Kaivanto, K. & Zhang, P., 2/09/2023, In: European Journal of Finance. 29, 13, p. 1493-1519 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Design and simulation studies of the novel beam arrival monitor pickup at Daresbury Laboratory

    Kalinin, A., Thakker, T., Jamison, S., Burt, G. C., Apsimon, R. J. & Dexter, A. C., 06/2016, Proceedings of IPAC2016, Busan, Korea. Petit-Jean-Genaz, C., Kim, D. E., Kim, K. S., Ko, I. S., Kim, K. R. & Schaa, V. R. W. (eds.). Geneva: JACoW, p. 334-336 3 p. MOPMR038

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Status of the CASCADE microwave cavity experiment

    Kalliokoski, M., Bailey, I., Williams, P., Woollett, N., Burt, G., Chattopadhyay, S., Dainton, J., Dexter, A., Goudket, P., Pattalwar, S. & Thakker, T., 2013, Proceedings of the 9th Patras Workshop on Axions, WIMPs and WISPs. Oberlack, U. & Sissol, P. (eds.). Hamburg: Verlag Deutsches Elektronen-Synchrotron, p. 35-38 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    CASCADE: a cavity based dark matter experiment

    Kalliokoski, M., Bailey, I., Woollett, N., Burt, G., Dexter, A., Chattopadhyay, S., Goudket, P., Moss, A., Pattalwar, S., Thakker, T., Williams, P. & Dainton, J., 02/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  25. Published

    Tuning the properties of exciton complexes in self-assembled GaSb/GaAs quantum rings

    Kamarudin, M. A., Hayne, M., Young, R. J., Zhuang, Q. D., Ben, T. & Molina, S. I., 10/03/2011, In: Physical review B. 83, 11, 6 p., 115311 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Designing a Visual Tool for Teaching and Learning Front-End Innovation

    Kan John, P., Lear, E., L’Espoir Decosta, P., Gregor, S., Dann, S. & Sun, R., 30/09/2020, In: Technology Innovation Management Review. 10, 9, p. 16-26 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Vehicle plate recognition using improved neocognitron neural network

    Kangin, D., Kolev, G. & Angelov, P., 2013, Artificial Neural Networks and Machine Learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 628-640 13 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Evolving clustering, classification and regression with TEDA

    Kangin, D. & Angelov, P. P., 12/07/2015, Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Evolving classifier TEDAClass for big data

    Kangin, D., Angelov, P. P., Iglesias, J. A. & Sanchis, A., 08/2015, In: Procedia Computer Science. 53, p. 9-18 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Autonomously evolving classifier TEDAClass

    Kangin, D., Angelov, P. & Iglesias, J. A., 20/10/2016, In: Information Sciences. 366, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Multimedia Caching - An Overview

    Kara, H., Edwards, C. & Race, N. J. P., 06/2002. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  33. Published

    A Caching Architecture for Content Delivery to Mobile Devices

    Kara, H. & Edwards, C., 09/2003, p. 241-248. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  34. Published

    HF-IP: Propagation Analysis

    Kariyawasam Katukolihe Ga, S., Momahed Heravi, B., Honary, B., Barclay, L. & Vongas, G., 04/2009, Ionospheric radio Systems and Techniques, 2009. (IRST 2009). The Institution of Engineering and Technology 11th International Conference on . Edinburgh, UK: IET Press, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Switchable-Rate Error Control Coding for HF-IP Systems

    Kariyawasam Katukolihe Ga, S., Momahed Heravi, B., Honary, B. & Vongas, G., 04/2009, Ionospheric radio Systems and Techniques, 2009. (IRST 2009). The Institution of Engineering and Technology 11th International Conference on. Edinburgh: IET Press, p. 132–136 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    HF-IP Systems for Civilian Disaster Management

    Kariyawasam Katukolihe Ga, S., Honary, B. & Vongas, G., 10/2007, Proceeding of the IEEE Conference on Wireless Rural and Emergency Communications(WRECOM07). Rome, Italy

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Internet for HF with Link Layer Error Control Coding

    Kariyawasam Katukolihe Ga, S., Honary, B. & Vongas, G., 08/2007, Proceedings of the Nordic Shortwave Conference (HF07). Fårö, Sweden: Nordic HF, Saab Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Next Generation HF-IP for Wide Area Networks

    Kariyawasam Katukolihe Ga, S., Honary, B. & Vongas, G., 07/2007, 9th International Symposium on Communication Theory and Applications (ISCTA07). Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Network-aware Recommendations in the Wild: Methodology, Realistic Evaluations, Experiments

    Kastanakis, S., Sermpezis, P., Kotronis, V., Menasché, D. & Spyropoulos, T., 1/07/2022, In: IEEE Transactions on Mobile Computing. 21, 7, p. 2466-2479 14 p., 7.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Understanding the confounding factors of inter-domain routing modeling

    Kastanakis, S., Giotsas, V. & Suri, N., 25/10/2022, IMC 2022 - Proceedings of the 2022 ACM Internet Measurement Conference. New York: ACM, p. 758-759 2 p. (Proceedings of the 22nd ACM Internet Measurement Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Replication: 20 Years of Inferring Interdomain Routing Policies

    Kastanakis, S., Giotsas, V., Livadariu, I. & Suri, N., 24/10/2023, p. 16-29. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  42. Published

    Improvements for the IPv6 Access Network Protection Protocols in Wireless Environments

    Katsaros, I. & Honary, B., 11/2005, 3G and Beyond, 2005 6th IEE International Conference on. London : IEEE, p. 97-100 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Attacks and Threats of Value Added Service Charging Mechanisms in Third Generation Networks

    Katsaros, I., Martin, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 71

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    An improved watermarking technique for the casting of digital signatures

    Katsaros, I. & Honary, B., 10/2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. London: IEEE, p. 490-493 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Novel m-commerce security protocol for third generation mobile networks

    Katsaros, I. & Honary, B., 06/2003, 3G Mobile Communication Technologies, 2003. 3G 2003. 4th International Conference on (Conf. Publ. No. 494). IEEE, p. 23–27 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Threats to next generation mobile application software

    Katsaros, I., Martin, I. & Honary, B., 23/09/2004, Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN, 2004. The 2nd IEE (Ref. No. 2004/10660). London, UK: IEEE, p. 10/1 – 10/3 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Cooperation in P2P Systems through Sociological Incentive Patterns

    Kaune, S., Pussep, K., Tyson, G., Mauthe, A. & Steinmetz, R., 10/12/2008, Self-organizing systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer-Verlag, p. 10-22 13 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    The Seeder Promotion Problem: Measurements, Analysis and Solution Space

    Kaune, S., Tyson, G., Pussep, K., Mauthe, A. & Steinmetz, R., 2009, Proceedings of 19th International Conference on Computer Communications and Networks (ICCCN), 2010 . IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Unraveling BitTorrent’s File Unavailability:Measurements and Analysis

    Kaune, S., Rumin, R. C., Tyson, G., Mauthe, A., Guerrero, C. & Steinmetz, R., 25/08/2010, Proceedings of the IEEE 10th International Conference on Peer-to-Peer Computing (P2P '10). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    A Self-Learning Fuzzy Classifier with Feature Selection for Intelligent interrogation of mid-IR spectroscopy data from exfoliative cervical cytology using selflearning classifier eClass.

    Kelly, J. G., Angelov, P. P., Walsh, M. J., Pollock, H. M., Pitt, M. A., Martin-Hirsch, P. L. & Martin, F. L., 2008, In: International Journal of Computational Intelligence Research. 4, 4, p. 392-401 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Robust classification of low-grade cervical cytology following analysis with ATR-FTIR spectroscopy and subsequent application of self-learning classifier eClass

    Kerns, J., Angelov, P. P., Trevisan, J., Vlachopoulou, A., Paraskevaidis, E., Martin-Hirsch, P. L. & Martin, F. L., 11/2010, In: Analytical and Bioanalytical Chemistry. 398, 5, p. 2191-2201 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Multi-Fold Turbo Codes for the 2-User Binary Adder Channel

    Khalid, A., Ahmed, H., Farrell, P. & Honary, B., 06/2012, 13th Annual Post Graduate Sysosium on the Convergence of Telecommunication, Networking and Broadcasting . p. 287-291 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 1/06/2012, In: IET Wireless Sensor Systems. 2, 2, p. 108-114 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Modified Niederreiter type of GPT cryptosystem based on reducible rank codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 01/2014, In: Designs Codes and Cryptography. 70, 1-2, p. 231-239 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Improving Security of Niederreiter Type GPT Cryptosystem Based on Reducible Rank Codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 09/2011, 3rd International Castle Meeting on Coding Theory and Applications (ICMCTA). Borges, J. & Villanueva, M. (eds.). Barcelona: Servei de Publicacions de la Universitat Autònoma de Barcelona, p. 161-168 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    A Symmetric Key Generation and Pre-Distribution Scheme for WSN Using MRD Codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 06/2011, 12th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool, UK: Liverpool John Moores University, p. 135-140 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Delay tolerant monitoring of mobility-assisted WSN

    Khelil, A., Shaikh, F. K., Ali, A., Suri, N. & Reinl, C., 2016, Delay Tolerant Networks: Protocols and Applications. Vasilakos, A. V. (ed.). CRC Press, p. 189-221 33 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  58. Published

    Wireless Sensor Cooperation for a Sustainable Quality of Information

    Khelil, A., Reinl, C., Ayari, B., Shaikh, F. K., Szczytowski, P., Ali, A. & Suri, N., 2011, Pervasive Computing and Networking. John Wiley and Sons, p. 71-100 30 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  59. Published

    Map-based design for autonomic wireless sensor networks

    Khelil, A., Shaikh, F. K., Szczytowski, P., Ayari, B. & Suri, N., 2009, Autonomic Communication. Tsinghua University Press & Springer-Verlag, p. 309-326 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  60. Published

    Gossiping: Adaptive and reliable broadcasting in MANETs

    Khelil, A. & Suri, N., 2007, Dependable Computing: Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings. Springer, Vol. 4746 LNCS. p. 123-141 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  61. Published

    gMAP: Efficient construction of global maps for mobility-assisted wireless sensor networks

    Khelil, A., Shaikh, F. K., Ali, A. & Suri, N., 2/02/2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services. IEEE, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Towards benchmarking of P2P technologies from a SCADA systems protection perspective

    Khelil, A., Jeckel, S., Germanus, D. & Suri, N., 2010, Mobile Lightweight Wireless Systems: Second International ICST Conference, MOBILIGHT 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers. Springer, Vol. 45 LNICST. p. 400-414 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  63. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    MWM: A map-based world model for wireless sensor networks

    Khelil, A., Shaikh, F. K., Ayari, B. & Suri, N., 23/09/2011, Autonomics: 2nd International ICST Conference on Autonomic Computing and Communication Systems. EUDL, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  66. Published

    DEMOS-2: scalable E2E verifiable elections without random oracles

    Kiayias, A., Zacharias, T. & Zhang, B., 12/10/2015, CCS '15 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 352-363 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    End-to-end verifiable elections in the standard model

    Kiayias, A., Zacharias, T. & Zhang, B., 17/03/2015, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Oswald, E. & Fischlin, M. (eds.). Springer, Vol. II. p. 468-498 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    An Efficient E2E Verifiable E-voting System without Setup Assumptions

    Kiayias, A., Zacharias, T. & Zhang, B., 1/05/2017, In: IEEE Security and Privacy Magazine. 15, 3, p. 14-23 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Ceremonies for end-to-end verifiable elections

    Kiayias, A., Zacharias, T. & Zhang, B., 03/2017, PKC 2017: Public-Key Cryptography – PKC 2017 : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Editors (view affiliations). Springer, p. 305-334 30 p. (Lecture Notes in Computer Science; vol. 10175).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study

    Kibirige Mukisa, S. & Rashid, A., 4/09/2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  74. Published

    Why Have Progresses in Real-Time Fault Tolerant Computing Been Slow?

    Kim, K. H., Ezhilchelvan, P. D., Kaiser, J., Moser, L. E., Nett, E. & Suri, N., 2004, IEEE Symposium on Reliable Distributed Systems . IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  75. Published

    Commissioning of the electron injector for the AWAKE experiment

    Kim, S-Y., Doebert, S., Apsimon, O., Apsimon, R., Burt, G., Dayyani, M., Gessner, S., Gorgisyan, I., Granados, E., Mazzoni, S., Moody, J. T., Turner, M., Williamson, B. & Chung, M., 11/02/2020, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 953, 7 p., 163194.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    Ubiquitous technologies, cultural logics and paternalism in industrial workplaces

    Kinder, K. E., Ball, L. J. & Busby, J. S., 2008, In: Poiesis and Praxis. 5, 3-4, p. 265-290 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Pervasive technologies, risk and accountability

    Kinder, K. E., Boos, D., Grote, G. & Busby, J. S., 2010, Annual SRA-Europe Meeting, Society for Risk Analysis Europe (London) - 2010. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Estimating node lifetime in interference environments

    King, A., Brown, J., Vidler, J. & Roedig, U., 26/10/2015, Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. IEEE, p. 796-803 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Poster: RI-MAC enhancements for interference resilience

    King, A. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 283-284 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Competition: ContikiMAC with differentiating clear channel assessment

    King, A., Hadley, J. & Roedig, U., 2016, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. USA: Junction Publishing, p. 301-302 2 p. (EWSN '16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence

    King, A., Brown, J. & Roedig, U., 1/10/2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, p. 45-50 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Playful Research Fiction: A Fictional Conference

    Kirman, B., Lindley, J. G., Blythe, M., Coulton, P., Lawson, S., Linehan, C., Maxwell, D., O'Hara, D., Sturdee, M. & Thomas, V., 07/2018, Funology 2: From Usability to Enjoyment. Blythe, M. & Monk, A. (eds.). Springer, p. 157-173 17 p. (Human-Computer Interaction Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  83. Published

    Evolving extended naive Bayes classifiers

    Klawonn, F. & Angelov, P., 12/2006, Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. IEEE, p. 643-647 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management

    Knowles, W., Prince, D. & Hutchison, D., 2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2012). Liverpool: Liverpool John Moores University

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Introducing NextShareMobile, An Interactive Second Screen Application

    Knowles, W., Mu, M., Bamford, W., Race, N. & Needham, C., 2012, MobiSys '12 Proceedings of the 10th international conference on Mobile systems, applications, and services. New York: ACM, p. 489-490 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research

    Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P. & Jones, K., 2013.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  87. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  88. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    The simulated security assessment ecosystem: Does penetration testing need standardisation?

    Knowles, W., Baron, A. & McGarr, T., 09/2016, In: Computers and Security. 62, p. 296-316 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Where art meets technology: Integrating tangible and intelligent tools in creative processes

    Koch, J., Pearson, J., Lucero, A., Sturdee, M., Mackay, W. E., Lewis, M. & Robinson, S., 25/04/2020, 2020 ACM CHI Conference on Human Factors in Computing Systems, CHI EA 2020. New York: ACM, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Incremental anomaly identification in flight data analysis by adapted one-class SVM method

    Kolev, D., Suvorov, M., Morozov, E., Markarian, G. & Angelov, P., 2015, Artificial neural networks: methods and applications in bio-/neuroinformatics. Koprinkova-Hristova, P., Mladenov, V. & Kasabov, N. K. (eds.). Springer, p. 373-391 19 p. (Springer Series in Bio-/Neuroinformatics; vol. 4).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices

    Komninos, N., Honary, B. & Darnell, M., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 294-300 7 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Novel methods for enabling public key schemes in future mobile systems

    Komninos, N. & Honary, B., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 455–458 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Modified WAP for secure voice and video communication

    Komninos, N. & Honary, B., 03/2001, 3G Mobile Communication Technologies, 2001. Second International Conference on (Conf. Publ. No. 477). London, UK: IEEE, p. 33-37 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Cipher Appartus

    Komninos, N. & Honary, B., 09/2002, Patent No. 0222201.6

    Research output: Patent

Previous 1...8 9 10 11 12 13 14 15 ...26 Next

Back to top