Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    Assessing inter-modular error propagation in distributed software

    Jhumka, A., Hiller, M. & Suri, N., 31/10/2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, p. 152-161 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Assessing privacy capabilities of cloud service providers

    Del Alamo, J. M., Trapero, R., Martin, Y. S., Yelmo, J. C. & Suri, N., 1/11/2015, In: IEEE Latin America Transactions. 13, 11, p. 3634-3641 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  6. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Asymmetric dual axis energy recovery linac for ultrahigh flux sources of coherent x-ray and THz radiation: investigations towards its ultimate performance

    Ainsworth, R., Burt, G. C., Konoplev, I. V. & Seryi, A., 18/08/2016, In: Physical Review Accelerators and Beams. 19, 8, 15 p., 083502.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Asymptotic Performance Analysis of NOMA Uplink Networks Under Statistical QoS Delay Constraints

    Bello, M., Chorti, A., Fijalkow, I., Yu, W. & Musavian, L., 31/12/2020, In: IEEE Open Journal of the Communications Society. 1, p. 1691-1706 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  15. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal article

  16. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In: MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  18. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  19. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Attacks and Threats of Value Added Service Charging Mechanisms in Third Generation Networks

    Katsaros, I., Martin, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 71

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  22. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In: Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Auction based models for ticket allocation problem in IT service delivery industry

    Deshpande, P. M., Garg, D. & Suri, N., 7/07/2008, 2008 IEEE International Conference on Services Computing. IEEE, p. 111-118 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    AURORA: autonomous real-time on-board video analytics

    Angelov, P., Sadeghi Tehran, P. & Clarke, C., 05/2017, In: Neural Computing and Applications. 28, 5, p. 855-865 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Authentication in stealth distributed hash tables

    MacQuire, A., Brampton, A., Rai, I., Race, N. J. P. & Mathy, L., 28/08/2006, 32nd Euromicro Conference on Software Engineering and Advanced Applications, 2006. IEEE, p. 348-355 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Authentication in stealth distributed hash tables

    MacQuire, A., Brampton, A., Rai, I. A., Race, N. J. P. & Mathy, L., 06/2008, In: Journal of Systems Architecture. 54, 6, p. 607 - 618 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Automated buyer profiling control based on human privacy attitudes

    Such, J. M., Garcia-Fornes, A. & Botti, V., 11/2013, In: Electronic Commerce Research and Applications. 12, 6, p. 386-396 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Automated Planning and BDI Agents: A Case Study

    Cardoso, R. C., Ferrando, A. & Papacchini, F., 25/09/2021, Advances in Practical Applications of Agents, Multi-Agent Systems, and Social Good. The PAAMS Collection: 19th International Conference, PAAMS 2021, Salamanca, Spain, October 6–8, 2021, Proceedings. Dignum, F., Corchado, J. M. & Prieta, F. D. L. (eds.). Cham: Springer, p. 52-63 12 p. (Lecture Notes in Computer Science ; vol. 12946).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Automatic design generation of component-based systems using GA and fuzzy optimisation

    Angelov, P., Zhang, Y. & Wright, J. A., 17/03/2005, p. 95-100. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  32. Published

    Automatic design synthesis and optimization of component-based systems by evolutionary algorithms

    Angelov, P. P., Zhang, Y., Wright, J. A., Hanby, V. I. & Buswell, R. A., 07/2003, Genetic and Evolutionary Computation. Cantu-Paz, E., Foster, J. A., Deb, K., Davis, L. D., Roy, R., O'Reilly, U-M., Beyer, H. G., Standish, R., Kendall, G., Willson, S., Harman, M., Dasgupta, D., Potter, M. A., Schultz, A. C., Jonoska, N. & Miller, J. (eds.). 2724 ed. Berlin/Heidelberg: Springer, Vol. 2. p. 1938-1950 13 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  33. Published

    Automatic error tagging of spelling mistakes in learner corpora

    Rayson, P. & Baron, A., 2011, A Taste for Corpora: In honour of Sylviane Granger. Meunier, F., De Cock, S., Gilquin, G. & Paquot, M. (eds.). Amsterdam: John Benjamins, Vol. 45. p. 109-126 28 p. (Studies in Corpus Linguistics; vol. 45).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  34. Published

    Automatic generation of fuzzy rule-based models from data by genetic algorithms

    Angelov, P., Hanby, V. I., Buswell, R. A. & Wright, J. A., 2001, Developments in Soft Computing. John, R. I. & Birkenhead, R. (eds.). Berlin/Heidelberg: Springer, p. 31-40 10 p. (Advances in Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    Automatic generation of fuzzy rule-based models from data by genetic algorithms.

    Angelov, P. & Buswell, R., 2003, In: Information Sciences. 150, 1-2, p. 17-31 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Automatic mobile photographer and picture diary

    Angelov, P., Andreu, J. & Vong, T., 05/2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 102-107

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Automatic Optimization of a Klystron Interaction Structure

    Lingwood, C., Burt, G., Gunn, K., Carter, R., Marchesin, R. & Jensen, E., 08/2013, In: IEEE Transactions on Electron Devices. 60, 8, p. 2671-2676 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Automatic scene recognition for low-resource devices using evolving classifiers

    Andreu, J., Dutta Baruah, R. & Angelov, P., 09/2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ). IEEE, p. 2779-2785 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Automatic standardisation of texts containing spelling variation: How much training data do you need?

    Baron, A. & Rayson, P., 2009, Proceedings of the Corpus Linguistics Conference: CL2009. Mahlberg, M., González-Díaz, V. & Smith, C. (eds.). Lancaster: Lancaster University, 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Automatic Standardization of Spelling for Historical Text Mining

    Baron, A., Rayson, P. & Archer, D., 06/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  41. Published

    Automatically analysing large texts in a GIS environment: the Registrar General’s reports and cholera in the nineteenth century

    Murrieta-Flores, P., Baron, A., Gregory, I. N., Hardie, A. & Rayson, P. E., 04/2015, In: Transactions in GIS. 19, 2, p. 296-320 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Autonomic diagnosis of anomalous network traffic.

    Marnerides, A., Pezaros, D. P. & Hutchison, D., 14/06/2010. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  43. Published

    Autonomous anomaly detection

    Gu, X. & Angelov, P. P., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems. p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Autonomous data density based clustering method

    Angelov, P. P., Gu, X., Gutierrez, G., Iglesias, J. A. & Sanchis, A., 24/07/2016, p. 2405-2413. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  45. Published

    Autonomous data-driven clustering for live data stream

    Gu, X. & Angelov, P. P., 9/10/2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). IEEE, p. 1128-1135 8 p. 1303

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Autonomous Learning Multi-Model Classifier of 0-Order (ALMMo-0)

    Angelov, P. P. & Gu, X., 31/05/2017, IEEE Conference on Evolving and Adaptive Intelligent Systems 2017. p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Autonomous learning multi-model systems from data streams

    Angelov, P. P., Gu, X. & Principe, J., 1/08/2018, In: IEEE Transactions on Fuzzy Systems. 26, 4, p. 2213-2224 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Autonomous Learning Systems: From Data to Knowledge in Real Time

    Angelov, P., 1/12/2012, Chichester: John Willey and Sons. 288 p.

    Research output: Book/Report/ProceedingsMonograph

  49. Published

    Autonomous Machine Learning (ALMA): generating rules from data streams

    Angelov, P., 19/09/2011, Proceedings of the Special International Conference on Complex Systems, COSY-2011: 16-19 September 2011. Ohrid, FYR of Macedonia, p. 249-256 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  50. Published

    Autonomous novelty detection and object tracking in video streams using evolving clustering and Takagi-Sugeno type neuro-fuzzy system.

    Angelov, P., Ramezani, R. & Zhou, X., 2008, IEEE International Joint Conference on Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). . IEEE, p. 1456-1463 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...5 6 7 8 9 10 11 12 ...51 Next

Back to top