Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    The utility of MPEG-7 systems in audio-visual applications with multiple streams.

    Lopes, R. J., Lindsay, A. T. & Hutchison, D., 01/2003, In: IEEE Transactions on Circuits and Systems for Video Technology. 13, 1, p. 16-25 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    The use of surrounding visual context in handheld AR: device vs. user perspective rendering

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 28/04/2014, CHI '14 Proceedings of the 32nd annual ACM conference on Human factors in computing systems. New York: ACM, p. 197-206 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    The unintended consequences of risk regulation

    MacGillivray, B. H., Alcock, R. E. & Busby, J. S., 2008, Proc 17th Annual Conference of SRA-Europe (Valencia) - 2008. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    The UK Programmable Fixed and Mobile Internet Infrastructure: Overview, capabilities and use cases deployment

    Alshaer, H., Uniyal, N., Katsaros, K., Antonakoglou, K., Simpson, S., Abumarshoud, H., Falaki, H., McCherry, P., Rotsos, C., Mahmoodi, T., Kaleshi, D., Hutchison, D., Haas, H. & Simeonidou, D., 1/09/2020, In: IEEE Access. 8, p. 175398 - 175411 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Unpublished

    The Two-Step P2P Simulation Approach

    Mauthe, A., Birck, H. & Heckmann, O., 09/2005, (Unpublished)

    Research output: Other contribution

  6. Published

    The Survival of the Fittest: An Evolutionary Approach to Deploying Adaptive Functionality in Peer-to-Peer Systems

    Tyson, G., Grace, P., Mauthe, A. & Kaune, S., 1/12/2008, ARM '08 Proceedings of the 7th workshop on Reflective and Adaptive Middleware. New York: ACM, p. 23-28 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    The structure of communication behavior in simulated and actual crisis negotiations

    Taylor, P. J. & Donald, I., 10/2004, In: Human Communication Research. 30, 4, p. 443-478 36 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    The structural, electronic and optical properties of GaSb/GaAs nanostructures for charge-based memory

    Hayne, M., Young, R. J., Smakman, E. P., Nowozin, T., Hodgson, P., Garleff, J. K., Rambabu, P., Koenraad, P. M., Marent, A., Bonato, L., Schliwa, A. & Bimberg, D., 3/07/2013, In: Journal of Physics D: Applied Physics. 46, 26, 10 p., 264001.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    The State of the (CHI)Art

    Sturdee, M., Lewis, M., Gamboa, M., Hoang, T. N., Miers, J., Smorgun, I., Jain, P., Strohmayer, A., Alaoui, S. F. & Wodtke, C. R., 27/04/2022, CHI 2022 - Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems. New York: ACM, p. 104:1-104:6 6 p. 104. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    The social ascription of obligations to engineers

    Busby, J. S. & Coeckelbergh, M., 2003, In: Science and Engineering Ethics. 9, 3, p. 363-376 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    The simulated security assessment ecosystem: Does penetration testing need standardisation?

    Knowles, W., Baron, A. & McGarr, T., 09/2016, In: Computers and Security. 62, p. 296-316 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    The shadow warriors: in the no man’s land between industrial control systems and enterprise IT systems

    Zanutto, A., Shreeve, B. O., Follis, K., Busby, J. S. & Rashid, A., 12/07/2017, 3rd Workshop on Security Information Workers (WSIW 2017): In conjunction with 13th Symposium on Usable Privacy and Security (SOUPS). USENIX Association, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    The seven year glitch: Unpacking beauty and despair in malfunction

    Sturdee, M., Lindley, J., Kluth, T. & Harrison, R., 21/04/2020, CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. New York: ACM, 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    The Seeder Promotion Problem: Measurements, Analysis and Solution Space

    Kaune, S., Tyson, G., Pussep, K., Mauthe, A. & Steinmetz, R., 2009, Proceedings of 19th International Conference on Computer Communications and Networks (ICCCN), 2010 . IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  16. Published

    The role of system‐use practices for sustaining motivation in crowdsourcing: A technology‐in‐practice perspective

    Alam, S. L. & Sun, R., 31/07/2023, In: Information Systems Journal . 33, 4, p. 758-789 32 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  18. Published

    The role of distributed cognition in the causation of accidents

    Busby, J. S. & Hughes, E. J., 2003, In: International Journal of Risk Assessment and Management. 4, p. 36-51 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    The responsibility for taking precautions against the risks of engineering design

    Coeckelbergh, M. & Busby, J. S., 2002, International Conference on Research in Ethics and Engineering (Delft) - 2002. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    The relationship between risk control imperative and perceived causation: the case of product counterfeiting in China

    Ding, B., Stevenson, M. & Busby, J. S., 2017, In: Journal of Risk Research. 20, 6, p. 800-826 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    The relational focus of small and medium sized actors’ understandings of supply chain finance (SCF)

    Phraknoi, N., Busby, J. & Stevenson, M., 12/08/2022, In: International Journal of Operations and Production Management. 42, 9, p. 1435-1466 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    The relational aspect to high reliability organization

    Busby, J. & Iszatt-White, M., 06/2014, In: Journal of Contingencies and Crisis Management. 22, 2, p. 69-80 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    The prenatal concept of number: further evidence of visual processing of stimuli before birth

    Dunn, K. J., Reissland, N., Young, R. J., Amu, J. & Reid, V. M., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  24. Published

    The precision, accuracy and efficiency of geographic profiling predictions: a simple heuristic versus mathematical algorithms

    Bennell, C., Emeno, K., Snook, B., Taylor, P. & Goodwill, A., 2009, In: Crime Mapping: A Journal of Research and Practice. 1, 2, p. 65-84 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    The precautionary principle as a heuristic patch

    Kaivanto, K. & Kwon, W., 09/2015, Lancaster: Lancaster University, Department of Economics, 35 p. (Economics Working Paper Series).

    Research output: Working paper

  26. Published

    The Power of Synchronisation: Formal Analysis of Power Consumption in Networks of Pulse-Coupled Oscillators

    Gainer, P., Linker, S., Dixon, C., Hustadt, U. & Fisher, M., 11/10/2018, Formal Methods and Software Engineering: 20th International Conference on Formal Engineering Methods, ICFEM 2018, Gold Coast, QLD, Australia, November 12-16, 2018, Proceedings. Sun, J. & Sun, M. (eds.). Cham: Springer, p. 160-176 17 p. (Lecture Notes in Computer Science; vol. 11232).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    The pathogen construct in risk analysis

    Busby, J. S. & Zhang, H., 2008, In: International Journal of Project Management. 39, 3, p. 86-96 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    The OPTHER project: Progress toward the THz amplifier

    Paoloni, C., Brunetti, F., Di Carlo, A., Mineo, M., Tamburri, E., Terranova, M. L., Ulisse, G., Durand, A., Marchesin, R., Pham, K., Krozer, V., Kotiranta, M., de Rossi, A., Dolfi, D., Guiset, P., Legagneux, P., Schnell, J. P., Fiorello, A., Dispenza, M., Secchi, A., & 5 othersZhurbenko, V., Megtert, S., Bouamrane, F., Cojocaru, C-S. & Gohier, A., 1/02/2011, Vacuum Electronics Conference (IVEC), 2011 IEEE International. IEEE, p. 55-56 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

  30. Published

    The need for a generalized compositional framework

    Suri, N., 3/03/2004, 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.. IEEE, p. 340 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    The morphology of GaSb/GaAs nanostructures grown by MBE

    Young, R., 5/01/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  32. Published

    The measurement and modeling of a P2P streaming video service

    Gao, P., Liu, T., Chen, Y., Wu, X., El-khatib, Y. & Edwards, C., 10/2008, Networks for Grid Applications : Second International Conference, GridNets 2008, Beijing, China, October 8-10, 2008, Revised Selected Papers. Vicat-Blanc Primet, P., Kudoh, T. & Mambretti, J. (eds.). Berlin: Springer, p. 24-34 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 2).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    The Manipulative Presentation Techniques of Controlling and Coercive Offenders

    Watson, S. J., Luther, K., Jackson, J., Taylor, P. J. & Alison, L., 25/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  34. Published

    The Lorien dynamic component based OS

    Porter, B., Roedig, U., Taiani, F. & Coulson, G., 11/2010, SenSys '10 Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems. ACM, p. 355-356 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    The language of Islamic extremism: towards an automated identification of beliefs, motivations and justifications

    Prentice, S., Rayson, P. & Taylor, P., 2012, In: International Journal of Corpus Linguistics. 17, 2, p. 259-286 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    The Integration of Ad-hoc (MANET) and Mobile Networking (NEMO): Principles to Support Rescue Team Communication

    McCarthy, B., Edwards, C. & Dunmore, M., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  37. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  38. Published

    The influence of geopolitics on polar research – Options for HM Government

    Germond, B. & Suri, N., 8/06/2023

    Research output: Exhibits, objects and web-based outputsBlog

  39. Published

    The impact of wireless device access on content delivery networks

    Denney, J. & Race, N., 2003, Interactive multimedia on next generation networks: first international workshop on multimedia interactive protocols and systems, MIPS 2003, Naples, Italy, November 18-21, 2003. Proceedings. Ventre, G. & Canonico, R. (eds.). Berlin: Springer Verlag, p. 1-15 15 p. (Lecture Notes in Computer Science; vol. 2899).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    The impact of temperature on outdoor industrial sensornet applications

    Boano, C. A., Tsiftes, N., Voigt, T., Brown, J. & Roedig, U., 08/2010, In: IEEE Transactions on Industrial Informatics. 6, 3, p. 451-459 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    The impact of hypervisor scheduling on compromising virtualized environments

    Vateva-Gurova, T., Suri, N., Mendelson, A., Atzori, L. (ed.), Jin, X. (ed.), Jarvis, S. (ed.), Liu, L. (ed.), Calvo, R. A. (ed.), Hu, J. (ed.), Min, G. (ed.), Georgalas, N. (ed.) & Wu, Y. (ed.), 26/10/2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, p. 1910-1917 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    The impact of fault models on software robustness evaluations

    Winter, S., Sârbu, C., Suri, N. & Murphy, B., 21/05/2011, Proceedings of the 33rd International Conference on Software Engineering . ACM, p. 51-60 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    The human fetus preferentially engages with face-like visual stimuli

    Reid, V. M., Dunn, K. J., Young, R. J., Amu, J., Donovan, T. & Reissland, N., 19/06/2017, In: Current Biology. 27, 12, p. 1825-1828 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    The great plains environment for network innovation (GpENI): a programmable testbed for future internet architecture research

    Sterbenz, J. P. G., Medhi, D., Ramamurthy, B., Scoglio, C. M., Hutchison, D., Plattner, B., Anjali, T., Scott, A., Buffington, C. & Monaco, G. E., 2010, Testbeds and Research Infrastructures. Development of Networks and Communities: 6th International ICST Conference, TridentCom 2010, Berlin, Germany, May 18-20, 2010, Revised Selected Papers. Magendanz, T., Gavras, A., Thanh, N. H. & Chase, J. S. (eds.). Berlin: Springer, p. 428-441 14 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 46).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    The GPT Cryptosystems for Secure Broadband Communication

    Rashwan, H. & Honary, B., 07/2010, 4th International Symposium on Broadband Communications (ISBC 2010) . Melaka, Malaysia

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    The GINSENG system for wireless monitoring and Control: design and deployment experiences

    O'Donovan, T., Brown, J., Buesching, F., Cardoso, A., Cecilio, J., Ó, J. M. D., Futado, P., Gil, P., Jugel, A., Pöttner, W-B., Roedig, U., Silva, J. S., Silva, R., Sreenan, C., Vassiliou, V., Voigt, T., Wolf, L. & Zinonos, Z., 11/2013, In: ACM Transactions on Sensor Networks. 10, 1, 40 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    The future of mobile devices: security and mobility

    Fitton, O. & Prince, D., 17/11/2014, Lancaster: Lancaster University. 34 p.

    Research output: Book/Report/ProceedingsOther report

  49. Published

    The future of maritime cyber security

    Fitton, O., Prince, D., Germond, B. & Lacy, M., 23/01/2015, Lancaster: Lancaster University. 36 p.

    Research output: Book/Report/ProceedingsOther report

  50. Published

    The future of digital disrupters: rethinking the digital divide

    Lacy, M. & Prince, D., 12/06/2013, Lancaster: Lancaster University. 46 p. (Future of...)

    Research output: Book/Report/ProceedingsOther report

Previous 12 3 4 5 6 7 8 9 ...51 Next

Back to top