Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A randomized neural network for data streams

    Pratama, M., Angelov, P. P., Lu, J., Lughofer, E., Seera, M. & Lim, C. P., 19/05/2017, Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN). USA: IEEE, p. 3423-3430 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A Ray-Tracing Technique for Ultra Wideband Channel Modelling

    Asif, H., Zeng, Y., Memari, B. & Honary, B., 07/2009, IEEE 10th International Symposium on Communication Theory and Applications”, (ISCTA’09). Ambleside, UK, p. 262–265 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A real-time approach for autonomous detection and tracking of moving objects from UAV

    Sadeghi Tehran, P., Clarke, C. & Angelov, P. P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Piscataway, N. J.: IEEE, p. 43-49 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Real-time Approach for Novelty Detection and Trajectories Analysis for Anomaly Recognition in Video Surveillance Systems

    Sadeghi-Tehran, P. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on . IEEE, p. 108-113 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems

    Birkholz, H., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Arul, T., Heinrich, M., Katzenbeisser, S., Suri, N., Vateva-Gurova, T. & Schlehuber, C., 25/06/2018. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    A Reflective Middleware to Support Peer-to-Peer Overlay Adaptation

    Tyson, G., Grace, P., Mauthe, A., Blair, G. S., Kaune, S. & Content Network of Excellence (FP6-IST-038423) (Funder), 9/06/2009, Distributed Applications and Interoperable Systems : 9th IFIP WG 6.1 International Conference, DAIS 2009, Lisbon, Portugal, June 9-11, 2009. Proceedings. Senivongse, T. & Oliveira, R. (eds.). Berlin: Springer, p. 30-43 14 p. (Lecture Notes in Computer Science; vol. 5523).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A Reinforcement Learning-based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

    Ling, M. H., Yau, K. A., Qadir, J. & Ni, Q., 1/03/2019, In: IEEE Transactions on Cognitive Communications and Networking. 5, 1, p. 28 - 43 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways

    Eiza, M. H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1578-1585 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A Resolution of Emissions-Estimate Confusion for Informing Flight Choice

    Kaivanto, K. K. & Zhang, P., 05/2016, Economics: Lancaster University, Department of Economics, (Economics working paper series).

    Research output: Working paper

  12. Published

    A retrospective analysis of QoS deployment, operation and use in enterprise and provider networks

    Mackay, M. & Edwards, C., 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Barolli, L., Xhafa, F., Takizawa, M., Enokido, T. & Hsu, H. H. (eds.). New York: IEEE, p. 583-588 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    A retrospective comparative study of three data modelling techniques in anticoagulation therapy.

    McDonald, S., Angelov, P. & Xydeas, C., 28/05/2008, BMEI 2008. International Conference on BioMedical Engineering and Informatics, 2008.. Sanya, China: IEEE, p. 219-225 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    A robust evolving cloud-based controller

    Angelov, P., Skrjanc, I. & Blazic, S., 2015, Springer Handbook of Computational Intelligence . Kacprzyk, J. & Pedrycz, W. (eds.). Berlin: Springer, Vol. G. p. 1435-1449 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  15. Published

    A route towards practical quantum communication

    Roberts, J., Young, M., Noori, Y., Smakman, E. P., Koenraad, P. M., Hayne, M. & Young, R., 10/07/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  16. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In: Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    A scalable user fairness model for adaptive video streaming over SDN-assisted future networks

    Mu, M., Broadbent, M., Farshad, A., Hart, N., Hutchison, D., Ni, Q. & Race, N., 1/08/2016, In: IEEE Journal on Selected Areas in Communications. 34, 8, p. 2168-2184 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    A Scenario-Based Review of IPv6 Transition Tools

    Mackay, M., Edwards, C., Dunmore, M., Chown, T. & Carvalho, G., 2003, In: IEEE Internet Computing. 7, 3, p. 27-35 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    A secure collaborative spectrum sensing strategy in cyber-physical systems

    Lin, H., Hu, J., Ma, J., Xu, L. & Yu, Z., 22/12/2017, In: IEEE Access. 5, p. 27679-27690 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system

    Kumar, A., Yadav, A. S., Gill, S. S., Pervaiz, H., Ni, Q. & Buyya, R., 30/11/2022, In: Simulation Modelling Practice and Theory. 120, 27 p., 102621.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A Secure Group-Oriented Framework for Intelligent Virtual Environments

    Such, J. M., Alberola, J. M., Barella, A. & Garcia-Fornes, A., 2011, In: Computing and Informatics. 30, 6, p. 1225-1246 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Unpublished

    A Secure Quorum Based Membership Mechanism for P2P Systems

    Mauthe, A., Liebau, N., Heckmann, O., Kovacevic, A., Tafreschi, O., Fidler, M. & Steinmetz, R., 08/2006, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  23. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A security architecture for railway signalling

    Schlehuber, C., Heinrich, M., Vateva-Gurova, T., Katzenbeisser, S., Suri, N., Bitsch, F. (ed.), Tonetta, S. (ed.) & Schoitsch, E. (ed.), 17/08/2017, Computer Safety, Reliability, and Security: 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13-15, 2017, Proceedings. Springer-Verlag, Vol. 10488 LNCS. p. 320-328 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    A Selective Delayed Channel Access (SDCA) for the high-throughput IEEE 802.11n

    Skordoulis, D., Ni, Q. & C. Zarakovitis, C., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. New York: IEEE, p. 1173-1178 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    A Self-Learning Fuzzy Classifier with Feature Selection for Intelligent interrogation of mid-IR spectroscopy data from exfoliative cervical cytology using selflearning classifier eClass.

    Kelly, J. G., Angelov, P. P., Walsh, M. J., Pollock, H. M., Pitt, M. A., Martin-Hirsch, P. L. & Martin, F. L., 2008, In: International Journal of Computational Intelligence Research. 4, 4, p. 392-401 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    A Semi-autonomic Framework for Intrusion Tolerance in Heterogeneous Networks

    D'Antonio, S., Romano, S., Simpson, S., Smith, P. & Hutchison, D., 10/2008, Self-Organizing Systems: Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings. Hummel, K. A. & Sterbenz, J. P. G. (eds.). Berlin: Springer, p. 230-241 12 p. (Lecture Notes in Computer Science; vol. 5343).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    A semiconductor source of triggered entangled photon pairs

    Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 12/01/2006, In: Nature. 439, 7073, p. 179-182 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    A Sensor Fusion Method for Smart phone Orientation Estimation

    Ayub, S., Bahraminasab, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    A simple fuzzy rule-based system through vector membership and kernel-based granulation.

    Angelov, P. & Yager, R., 9/07/2010, 5th IEEE International Conference Intelligent Systems (IS), 2010 . IEEE, p. 349-354 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

    Hirst, S. A. & Honary, B., 2001, Cryptography and Coding : 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 38-43 6 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    A site-controlled quantum dot system offering both high uniformity and spectral purity

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 1/06/2009, In: Applied Physics Letters. 94, 22, p. - 3 p., 223121.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    A Situation Aware Information Infrastructure (SAI^2) Framework

    Marnerides, A., Pezaros, D., Jose, J., Mauthe, A. U. & Hutchison, D., 2017, Smart Objects and Technologies for Social Good Second International Conference, GOODTECHS 2016, Venice, Italy, November 30 – December 1, 2016, Proceedings. Gaggi, O., Manzoni, P., Palazzi, C., Bujari, A. & Marquez-Barja, J. (eds.). Cham: Springer, p. 186-194 9 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 195).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    A situational analysis of how barriers to systemic failure are undermined during accident sequences

    Busby, J. S., Chung, P. W. H. & Wen, Q., 2004, In: Journal of Risk Research. 7, 7/8, p. 811-826 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published
  37. Published

    A Smart approach for GPT cryptosystem based on rank codes

    Rashwan, H., Gabidulin, E. M. & Honary, B., 2010, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on. IEEE, p. 2463-2467 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    A Stitch in Time: Supporting Android Developers in Writing Secure Code

    Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C. A. F. & Fahl, S., 30/10/2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1065-1077 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published
  41. Published

    A Stochastic Programming Model for Slot Allocation at Congested Airports

    Fairbrother, J., Shone, R., Glazebrook, K. & Zografos, K. G., 17/09/2020.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  42. Published

    A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed.

    Mohr, M., Edwards, C. & McCarthy, B., 18/04/2008, In: Computer Communications. 31, 6, p. 1148 - 1159

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    A study on helix pitch tolerance impact on TWT small-signal gain

    D'Agostino, S. & Paoloni, C., 12/2002, In: IEEE Electron Device Letters. 23, 12, p. 746-748 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    A survey of key management for secure group communications.

    Rafaeli, S. & Hutchison, D., 1/09/2003, In: ACM Computing Surveys. 35, 3, p. 309-329 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    A survey of mobility in information-centric networks

    Tyson, G., Sastry, N., Cuevas, R., Rimac, I. & Mauthe, A., 1/12/2013, In: Communications of the ACM. 56, 12, p. 90-98 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    A survey of mobility in information-centric networks: challenges and research directions

    Tyson, G., Sastry, N., Rimac, I., Cuevas, R. & Mauthe, A., 2012, NoM '12: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications. New York: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    A survey of pervasive displays for information presentation

    Clinch, S. E., Alexander, J. M. & Gehring, S., 07/2016, In: IEEE Pervasive Computing. 15, 3, p. 14-22 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In: Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...51 Next

Back to top