Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Chapter
  2. Published

    On enhancing the robustness of commercial operating systems

    Johansson, A., Sârbu, A., Jhumka, A. & Suri, N., 2005, Service Availability: First International Service Availability Symposium, ISAS 2004, Munich, Germany, May 13-14, 2004, Revised Selected Papers. Springer, p. 148-159 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Designing efficient fail-safe multitolerant systems

    Jhumka, A. & Suri, N., 2005, Formal Techniques for Networked and Distributed Systems - FORTE 2005 . Springer, Vol. 3731 LNCS. p. 428-422 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    An approach to on-line design of fuzzy controllers with evolving structure

    Angelov, P., 10/2004, Applications and Science in Soft Computing. Ahmad, L. & Garibaldi, J. M. (eds.). Berlin/Heidelberg: Springer, p. 63-68 6 p. (Advances in Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Optimal design synthesis of component-based systems using intelligent techniques

    Angelov, P., Zhang, Y. & Wright, J. A., 2004, Do Smart Adaptive Systems Exist?. Gabrys, B., Leviska, K. & Strackelijan, J. (eds.). 173 ed. Berlin/Heidelberg: Springer, Vol. 173. p. 267-284 18 p. (Studies in Fuzziness and Soft Computing).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Automatic design synthesis and optimization of component-based systems by evolutionary algorithms

    Angelov, P. P., Zhang, Y., Wright, J. A., Hanby, V. I. & Buswell, R. A., 07/2003, Genetic and Evolutionary Computation. Cantu-Paz, E., Foster, J. A., Deb, K., Davis, L. D., Roy, R., O'Reilly, U-M., Beyer, H. G., Standish, R., Kendall, G., Willson, S., Harman, M., Dasgupta, D., Potter, M. A., Schultz, A. C., Jonoska, N. & Miller, J. (eds.). 2724 ed. Berlin/Heidelberg: Springer, Vol. 2. p. 1938-1950 13 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    On-line Design of Takagi-Sugeno Models.

    Angelov, P. & Filev, D., 2003, Fuzzy Sets and Systems – IFSA 2003. Biglic, T., de Baets, B. & Kaynak, O. (eds.). 2715/2 ed. Berlin/Heidelberg: Springer, Vol. 2715/2. p. 576-584 9 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    A framework for the design and validation of efficient fail-safe fault-tolerant programs

    Jhumka, A., Suri, N. & Hiller, M., 2003, Software and Compilers for Embedded Systems . Springer-Verlag, Vol. 2826. p. 182-197 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Component-based synthesis of dependable embedded software

    Jhumka, A., Hiller, M. & Suri, N., 2002, Formal Techniques in Real-Time and Fault-Tolerant Systems. Springer-Verlag, Vol. 2469. p. 111-128 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    Baseband processing for SDR

    Lund, D. & Honary, B., 2002, Software defined radio : enabling technology. Tuttlebee, W. H. W. (ed.). New York: Wiley, p. 201-232 32 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    Vulnerabilities and security limitations of current IP telephony systems

    Ackermann, R., Schumacher, M., Roedig, U. & Steinmetz, R., 1/05/2001, Communications and multimedia security issues of the new century. Steinmetz, R., Dittman, J. & Steinebach, M. (eds.). Kluwer Academic Publishers, p. 53-66 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Back to top