Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Analysis of Wakefields in the ILC crab cavity.

    Burt, G., Dexter, A., Bellantoni, C., Beard, P. & Goudket, P., 2006, Proceedings of the EPAC 2006 conference..

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  2. Published

    Analytical and Numerical Simulation of Multipactor within a Helical Resonant Filter

    Constable, DA., McElhinney, P., Lingwood, C. J., Burt, G. C., Salza, G. & Goussetis, G., 24/04/2017, Vacuum Electronics Conference (IVEC), 2017 Eighteenth International. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Analytical computations, measurements and 3-D EM simulations for the calculation of cold parameters in helical SWSs

    Aloisio, M., Carter, R. & Paoloni, C., 2007, EIGHTH IEEE INTERNATIONAL VACUUM ELECTRONICS CONFERENCE. NEW YORK: IEEE, ELECTRON DEVICES SOC & RELIABILITY GROUP, p. 413-414 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Analytical Design Method for Corrugated Rectangular Waveguide SWS THz Vacuum Tubes

    Mineo, M., Di Carlo, A. & Paoloni, C., 2010, In: Journal of Electromagnetic Waves and Applications. 24, 17-18, p. 2479-2494 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Analyzing and improving customer-side cloud security certifiability

    Zhao, S., Chen, Y., Winter, S. & Suri, N., 1/10/2019, Proceedings - 2019 IEEE 30th International Symposium on Software Reliability Engineering Workshops, ISSREW 2019. p. 300-307 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Analyzing the Impact of Data Errors in Safety-Critical Control Systems

    Askerdal, Ö., Gäfvert, M., Hiller, M. & Suri, N., 2003, In: IEICE Transactions on Information and Systems. E86-D, 12, p. 2623-2633 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict

    Prentice, S., Taylor, P. J., Rayson, P., Hoskins, A. & O'Loughlin, B., 03/2011, In: Information Systems Frontiers . 13, 1, p. 61-73 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Anomalous behaviour detection based on heterogeneous data and data fusion

    Mohd Ali, A. & Angelov, P., 05/2018, In: Soft Computing. 22, 10, p. 3187-3201 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Anomaly detection for resilience in cloud computing infrastructures

    Shirazi, S. N. U. H., 2017, Lancaster University. 205 p.

    Research output: ThesisDoctoral Thesis

  12. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features

    Shirazi, S. N. U. H., Stephanakis, I. M., Chochliouros, I. P. & Sfakianakis, E., 2015, EANN '15: Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS). Iliadis, L. (ed.). ACM, 9 p. 27

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Anomaly detection in the cloud using data density

    Shirazi, S. N. U. H., Simpson, S., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 27/06/2016, Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE, p. 616-623 8 p. 7820324. (Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment

    Derbyshire, R., 2022, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  16. Published

    Anticrab cavities for the removal of spurious vertical bunch rotations caused by crab cavities

    Burt, G., Latina, A., Schulte, D., Dexter, A. C. & McIntosh, P. A., 26/09/2008, In: Physical Review Special Topics: Accelerators and Beams. 11, 9, 6 p., 092801.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Antimonide quantum dot nanostructures for novel photonic device applications

    Krier, A., Carrington, P., Zhuang, Q., Young, R., Hayne, M., Lu, Q., James Asirvatham, J., Wagener, M., Botha, J. R., Koenraad, P. M. & Smakman, E. P., 5/11/2013, The wonder of nanotechnology: quantum optoelectronic devices and applications . SPIE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  20. Published

    AoI-Minimal Online Scheduling for Wireless Powered IoT: A Lyapunov Optimization-based Approach

    Hu, H., Xiong, K., Yang, H-C., Ni, Q., Gao, B., Fan, P. & Letaief, K. B., 1/12/2023, In: IEEE Transactions on Green Communications and Networking. 7, 4, p. 2081-2092

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. E-pub ahead of print

    AoI-minimal Power Adjustment in RF-EH-powered Industrial IoT Networks: A Soft Actor-Critic-Based Method

    Ge, Y., Xiong, K., Wang, Q., Ni, Q., Fan, P. & Letaief, K. B., 5/02/2024, (E-pub ahead of print) In: IEEE Transactions on Mobile Computing. 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    AoI-Minimal Trajectory Planning and Data Collection in UAV-Assisted Wireless Powered IoT Networks

    Hu, H., Xiong, K., Qu, G., Ni, Q., Fan, P. & Letaief, K. B., 15/01/2021, In: IEEE Internet of Things Journal. 8, 2, p. 1211-1223 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Forthcoming

    Apparatus and method for projecting light through a light dispersive medium

    Young, R. J. & Reid, V. M., 13/11/2015, (Accepted/In press) Priority date 13/11/2015, Priority No. GB1520076.9

    Research output: Patent

  24. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Application of non-orthogonal multiple access in cooperative spectrum-sharing networks over Nakagami-m fading channels

    Lv, L., Ni, Q., Ding, Z. & Chen, J., 06/2017, In: IEEE Transactions on Vehicular Technology. 66, 6, p. 5506-5511 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Application of reinforcement learning for security enhancement in cognitive radio networks

    Ling, M. H., Yau, K. A., Qadir, J., Poh, G. S. & Ni, Q., 12/2015, In: Applied Soft Computing. 37, p. 809-829 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Application of space time diversity/coding to power line communication systems

    Honary, B., Yazdani, J., Brown, P. & Bahram Honary, Javad Yazdani, and Paul Brown (Patent applicant), 12/2001, Patent No. 0130043.3

    Research output: Patent

  28. Published

    Application of Space-Time Diversity/Coding for Power Channels

    Lopez Giovaneli, C., Yazdani, J., Farrell, P. & Honary, B., 03/2002, Proceedings of the 6th International Symposium on Power-line Communications and Its Application, ISPLC 2002. Athens, Greece: ISPLC, p. 101-105 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Application of turbo codes to tactical communications

    Fagoonee, L. & Honary, B., 5/12/2004, In: Computer Networks. 46, 5, p. 741-749 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Application-level diagnostic and membership protocols for generic time-triggered systems

    Serafini, M., Bokor, P., Suri, N., Vinter, J., Ademaj, A., Brandstätter, W., Tagliabo, F. & Koch, J., 1/03/2011, In: IEEE Transactions on Dependable and Secure Computing. 8, 2, p. 177-193 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Applications of evolving intelligent systems to oil and gas industry.

    Macias Hernandez, J. & Angelov, P., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 401-422 22 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    Applications of stochastic modeling in air traffic management: Methods, challenges and opportunities for solving air traffic problems under uncertainty

    Shone, R., Glazebrook, K. & Zografos, K. G., 1/07/2021, In: European Journal of Operational Research. 292, 1, p. 1-26 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Applied sketching in HCI: Hands-on course of sketching techniques

    Lewis, M., Sturdee, M. & Marquardt, N., 20/04/2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery (ACM), C0. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Applying NEMO to a mountain rescue domain

    McCarthy, B., Edwards, C. & Dunmore, M., 2006, Information Networking Advances in Data Communications and Wireless Networks. Chong, I. & Kawahara, K. (eds.). Springer, p. 11-20 9 p. (Lecture Notes in Computer Science; vol. 3961).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    AppMonitor: A Tool for Recording User Actions in Unmodified Windows Applications

    Alexander, J., Cockburn, A. & Lobb, R., 2008, In: Behavior Research Methods. 40, 2, p. 413-421 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Approaching cut-off rate on the binary symmetric channel using weighted bit flipping

    Hirst, S. A. & Honary, B., 07/2001, Proceedings of the 6th International Symposium on Communication Theory and Applications (ISCTA 2001). Lancaster: HW Communications Limited, p. 375–380 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Architectures of evolving fuzzy rule-based classifiers

    Angelov, P., Zhou, X., Filev, D. & Lughofer, E., 9/10/2007, Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on. IEEE, p. 2050-2055 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Are People Really Social on Porn 2.0?

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 2015, Proceedings of the AAAI Conference on Web and Social Media (ICWSM). AAAI, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Are risk assessments sufficiently credible to support questions of liability?

    Hughes, E. J., Busby, J. S. & Alcock, R., 2004, International Conference on Probalistic Safety Assessment and Management PSAM7, (Berlin) - 2004. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Area energy and area spectrum efficiency trade-off in 5G heterogeneous networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on . IEEE, p. 1178-1183 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    AReIT: Adaptive Reliable Information Transport Protocol for Wireless Sensor Networks

    Shaikh, F. K., Khelil, A. & Suri, N., 2009, Proceedings of the 2009 International Conference on Wireless Networks, ICWN 2009. CSREA Press, p. 75-81 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Argumentation for multi-party privacy management

    Fogues, R. L., Murukanniah, P., Such, J. M., Espinosa, A., Garcia-Fornes, A. & Singh, M., 05/2015, The Second International Workshop on Agents and CyberSecurity (ACySe). p. 3-6 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Arithmetic Block Coding to reduce error propagation

    Baichoo, S., Honary, B. & Soyjaudah, K. S., 07/2005, 8th International Symposium on Communication Theory and Applications. Lancaster: HW Communications Limited, p. 52-56 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Art is Not Research. Research is not Art.

    Blair, K., Sturdee, M., Vermeulen, L. M. & Oehlberg, L., 27/04/2022, CHI EA '22: Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems. New York: ACM, p. 4:1-4:9 9 p. 4. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Artefacts, sensemaking and catastrophic failure in railway systems

    Hibberd, R. E. & Busby, J. S., 2004, IEEE Conference on systems, man and cybernetics SMC2004 (The Hague ) - 2004. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  48. Published

    ARTOT: Autonomous Real-Time Object detection and Tracking by a moving camera

    Angelov, P., Gude, C., Sadeghi-Tehran, P. & Ivanov, T., 09/2012, Intelligent Systems (IS), 2012 6th IEEE International Conference. IEEE, p. 446-452 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    AS relationships, customer cones, and validation

    Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V. & Claffy, K., 2013, IMC '13 Proceedings of the 2013 conference on Internet measurement conference. New York: ACM, p. 243-256 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...4 5 6 7 8 9 10 11 ...51 Next

Back to top