Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A cascade of deep learning fuzzy rule-based image classifier and SVM

    Angelov, P. P. & Gu, X., 5/10/2017, Systems, Man, and Cybernetics (SMC), 2017 IEEE International Conference on: Human Intelligence for Systems and Cybernetics. IEEE, p. 746-751 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A Case for Hybrid Content Distribution for Interactive Video-on-Demand

    MacQuire, A., Brampton, A., Race, N. J. P., Mathy, L. & Fry, M., 2008, Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE Computer Society, p. 556-561 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A cell specific reference signal interference cancellation scheme for LTE cellular access systems

    Li, W., Zhang, Y., Huang, L., Cosmas, J. & Ni, Q., 06/2015, Broadband Multimedia Systems and Broadcasting (BMSB), 2015 IEEE International Symposium on . IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A Characterization of Actuation Techniques for Generating Movement in Shape-Changing Interfaces

    Taher, F., Vidler, J. & Alexander, J., 05/2017, In: International Journal of Human-Computer Interaction. 33, 5, p. 385-398 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A Class of Composite Codes with Minimum Distance 8.

    Boyarinov, I., Martin, I. & Honary, B., 10/2001, In: Problems of Information Transmission. 37, 4, p. 353-364 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A cloud based tool for knowledge exchange on local scale flood risk

    Wilkinson, M., Mackay, E., Quinn, P. F., Stutter, M., Beven, K., Macleod, C. J. A., Macklin, M. G., Elkhatib, Y., Percy, B. J., Vitolo, C. & Haygarth, P., 15/09/2015, In: Journal of Environmental Management. 161, p. 38-50 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A Cloud-based Virtual Observatory for Environmental Science

    Blair, G. S. & El-khatib, Y., 04/2011, OpenWater symposium 19th April, 2011, at UNESCO-IHE, Delft, The Netherlands : Extended abstracts. Delft: Unesco-IHE, p. 102-103 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A collaborative AAA architecture to enable secure real-world network mobility

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, NETWORKING'11: 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I. Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A. & Scoglio, C. (eds.). Berlin: Springer-Verlag, p. 212-226 15 p. (Lecture Notes in Computer Science; vol. 6640).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A Common Architecture for Cross Layer and Network Context Awareness

    Sifalakis, M., Fry, M. & Hutchison, D., 08/2007, Self-Organizing Systems. 2007 ed. Springer-Verlag, Vol. 4725. p. 103-118 16 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    A comparative performance study of IPv6 transitioning mechanisms - NAT-PT vs. TRT vs. DSTM

    Mackay, M., Edwards, C., Boavida, F. (ed.), Plagemann, T. (ed.), Stiller, B. (ed.), Westphal, C. (ed.) & Monteiro, E. (ed.), 2006, p. 1125-1131. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  11. Published

    A comparative study of autonomous learning outlier detection methods applied to fault detection

    Bezerra, C. G., Costa, B. S. J., Guedes, L. A. & Angelov, P. P., 08/2015, Proceedings of the 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) . IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A comparative study of data transport protocols in wireless sensor networks

    Shaikh, F. K., Khelil, A. & Suri, N., 23/06/2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    A Comparative Study of two Approaches for Data-Driven Design of Evolving Fuzzy Systems: eTS and FLEXFIS

    Angelov, P. & Lughofer, E., 02/2008, In: International Journal of General Systems. 37, 1, p. 45-67 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A Comparative Study on Iterative Methods Regarding Cross-Layer Optimization for OFDMA Systems

    C. Zarakovitis, C., Nikolaros, I., Skordoulis, D., Hadjinicolaou, M. & Ni, Q., 08/2010, IEEE International Conference on Computer and Information Technology (CIT), 10.1109/CIT.2010.98. IEEE, p. 420-425 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    A comparison of MANET emulation techniques for the production of a realistic testbed with global communication capabilities

    Palmer, W., McCarthy, B. & Edwards, C., 04/2009, Wireless Telecommunications Symposium, 2009. WTS 2009. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    A comparison of static and dynamic component models for Wireless Sensor Networks

    Porter, B., Roedig, U., Taiani, F. & Coulson, G., 04/2010, Proceedings of the The First International Workshop on Networks of Cooperating Objects (CONET2010). 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2008, In: Journal of Networks. 3, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    A comprehensive review on handcrafted and learning-based action representation approaches for human activity recognition

    Bux, A., Angelov, P. P. & Habib, Z., 23/01/2017, In: Applied Sciences. 7, 1, 37 p., 110.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    A compressive sensing assisted massive SM-VBLAST system: error probability performance and capacity analysis

    Xiao, L., Xiao, P., Liu, Z., Yu, W., Haas, H. & Hanzo, L., 31/03/2020, In: IEEE Transactions on Wireless Communications. 19, 3, p. 1990-2005 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A Computational Model for Reputation and Ensemble-Based Learning Model for Prediction of Trustworthiness in Vehicular Ad Hoc Network

    Alharthi, A., Ni, Q., Jiang, R. & Khan, M. A., 15/10/2023, In: IEEE Internet of Things Journal. 10, 20, p. 18248-18258 11 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    A computational protocol and software implementation (as a MATLAB application) for biomaker identification in infrared spectroscopy datasets

    Trevisan, J., Angelov, P. & Martin, F., 2010, In: Nature Protocols.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    A connection-level call admission control using genetic algorithm for multi-class multimedia services in wireless networks

    Hong, X., Xiao, Y., Ni, Q. & Li, T., 2006, In: International Journal of Mobile Communications. 4, 5, p. 568-580 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    A conservative index heuristic for routing problems with multiple heterogeneous service facilities

    Shone, R., Knight, V. A. & Harper, P. R., 1/12/2020, In: Mathematical Methods of Operational Research. 92, 3, p. 511-543 33 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    A control theory approach for analyzing the effects of data errors in safety-critical control systems

    Askerdal, O., Gäfvert, M., Hiller, M. & Suri, N., 16/12/2002, Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings. IEEE, p. 105-114 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...102 Next

Back to top