Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2018
  2. Published

    A Van Benthem Theorem for Horn Description and Modal Logic

    Papacchini, F. & Wolter, F., 2018, Proceedings of the 31st International Workshop on Description Logics co-located with 16th International Conference on Principles of Knowledge Representation and Reasoning (KR 2018), Tempe, Arizona, US, October 27th - to - 29th, 2018.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    ADP strategies for resource allocation at congested airports

    Shone, R., Glazebrook, K. D. & Zografos, K., 2018.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  4. Published

    Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

    Tian, D., Zhou, J., Chen, M., Sheng, Z., Ni, Q. & Leung, V. C. M., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, p. 90-98 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    CreativeTeams: exploring the creative performance of co-located and virtual teams

    Shreeve, B., 2018, Lancaster University. 185 p.

    Research output: ThesisDoctoral Thesis

  6. Published

    G-DPS: A Game-theoretical Decision-making Framework for Physical Surveillance Games

    Alshawish, A., Amine Abid, M., de Meer, H., Schauer, S., König, S., Gouglidis, A. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice . Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 129-156 28 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  7. Published

    Looking at the same interaction and seeing something different: The role of information, judgment perspective and behavioral coding on judgment 'accuracy'

    Wall, H., Taylor, P. J., Campbell, C., Heim, D. & Richardson, B., 2018, In: Journal of Individual Differences. 39, p. 123-141 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    Gouglidis, A., König, S., Green, B., Rossegger, K. & Hutchison, D., 2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Basel: Springer Birkhäuser, p. 313-333 21 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  9. Published

    Sketching as a support mechanism for the design and development of shape-changing interfaces

    Sturdee, M. A., 2018, Lancaster University. 262 p.

    Research output: ThesisDoctoral Thesis

  10. Unpublished

    Statistical delay QoS driven resource allocation and performance analysis for wireless communication networks

    Yu, W., 2018, (Unpublished) Lancaster University. 168 p.

    Research output: ThesisDoctoral Thesis

  11. 2017
  12. Published

    A secure collaborative spectrum sensing strategy in cyber-physical systems

    Lin, H., Hu, J., Ma, J., Xu, L. & Yu, Z., 22/12/2017, In: IEEE Access. 5, p. 27679-27690 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Extracting random numbers from quantum tunnelling through a single diode

    Bernardo Gavito, R., Bagci, I. E., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C., Missous, M., Roedig, U. & Young, R. J., 19/12/2017, In: Scientific Reports. 7, 6 p., 17879.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Advances in Information and Communication Technologies for Adapting Agriculture to Climate Change: Proceedings of the International Conference of ICT for Adapting Agriculture to Climate Change AACC'17, November 22-24, 2017, Popayan, Colombia)

    Angelov, P. P. (Editor), Iglesias, J. A. (Editor) & Carlos Corrales, J. (Editor), 17/12/2017, 1st ed. Cham: Springer. 265 p. (Advances in Intelligent Systems and Computing; vol. 687)

    Research output: Book/Report/ProceedingsBook

  15. Published

    Navigating Diverse Data Science Learning: Critical Reflections Towards Future Practice

    Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 357-362 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Using DSML for Handling Multi-tenant Evolution in Cloud Applications

    Jumagaliyev, A., Whittle, J. N. D. & Elkhatib, Y., 11/12/2017, Cloud Computing Technology and Science (CloudCom), 2017 IEEE International Conference on. IEEE, p. 272-279 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Malware detection in migrated virtual machines

    El-Moussa, F. (Inventor), Mauthe, A. U. (Inventor), Marnerides, A. (Inventor) & Watson, M. (Inventor), 7/12/2017, Patent No. 20170351861

    Research output: Patent

  18. Published

    Supply chain resilience in a developing country context: A case study on the interconnectedness of threats, strategies, and outcomes

    Tukamuhabwa Rwakira, B., Stevenson, M. & Busby, J. S., 4/12/2017, In: Supply Chain Management: An International Journal. 22, 6, p. 486-505 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Adaptive management of cognitive radio networks employing femtocells

    Al-dulaimi, A., Anpalagan, A., Al-rubaye, S. & Ni, Q., 12/2017, In: IEEE Systems Journal. 11, 4, p. 2687-2698 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    All that glitters is not gold: on the effectiveness of cyber security qualifications

    Knowles, W., Such, J. M., Gouglidis, A., Misra, G. & Rashid, A., 12/2017, In: IEEE Computer. 50, 12, p. 60-71 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Empirical data analytics

    Angelov, P. P., Gu, X. & Kangin, D., 12/2017, In: International Journal of Intelligent Systems. 32, 12, p. 1261-1284 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    NOMA-Enabled Cooperative Unicast–Multicast: Design and Outage Analysis

    Yang, L., Chen, J., Ni, Q., Shi, J. & Xue, X., 12/2017, In: IEEE Transactions on Wireless Communications. 16, 12, p. 7870-7889 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Charting an Intent Driven Network

    Elkhatib, Y., Coulson, G. & Tyson, G., 26/11/2017, 2017 13th International Conference on Network and Service Management (CNSM). IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Ensemble prospectism

    Kaivanto, K. K., 18/11/2017, In: Theory and Decision. 83, 4, p. 535-546 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks

    Boukoros, S., Nugaliyadde, A., Marnerides, A., Vassilakis, C., Koutsakis, P. & Wai Wong, K., 14/11/2017, Neural Information Processing. ICONIP 2017. Liu, D., Xie, S., Li, Y., Zhou, D. & El-Alfy, E. S. (eds.). Cham: Springer, p. 57-66 10 p. (Lecture Notes in Computer Science; vol. 10638).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

    Green, B., Prince, D. D. C., Busby, J. S. & Hutchison, D., 3/11/2017, CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM, p. 103-109 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Inferring BGP blackholing activity in the Internet

    Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A. & Berger, A., 1/11/2017, IMC 2017 - Proceedings of the 2017 Internet Measurement Conference. New York: Association for Computing Machinery, Inc, p. 1-14 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top