Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2016
  2. Published

    Composite vulnerabilities in Cyber Physical Systems

    Ciholas, P. & Such, J. M., 6/04/2016, p. 4-7. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    Testbed diversity as a fundamental principle for effective ICS security research

    Green, B., Frey, S. A. F., Rashid, A. & Hutchison, D., 6/04/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    THz backward-wave oscillators for plasma diagnostic in nuclear fusion

    Paoloni, C., Gamzina, D., Himes, L., Popovic, B., Barchfeld, R., Yue, L., zheng, Y., Tang, X., Tang, Y., Pan, P., Li, H., Letizia, R., Mineo, M., Feng, J. & Luhmann Jr., N. C., 04/2016, In: IEEE Transactions on Plasma Science. 44, 4, p. 369-376 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Increasing quantum light extraction from TMDC's

    Woodhead, C., Young, R. J., Noori, Y., Roberts, J., Cao, Y., Bernardo Gavito, R., Kozikov, A. & Novoselov, K., 22/03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  6. Published

    Pillar-based photonic crystals for light extraction from 2D materials

    Noori, Y., Cao, Y., Woodhead, C., Roberts, J. & Young, R. J., 22/03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  7. Published

    Shielding noises from spins

    Cao, Y., Bennett, A. J., Ellis, D., Farrer, I., Ritchie, D. A., Shields, A. J., Noori, Y., Roberts, J., Woodhead, C. & Young, R. J., 22/03/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  8. Published

    Handbook in computational intelligence

    Angelov, P. (Editor), 21/03/2016, World Scientific Publishing. 964 p.

    Research output: Book/Report/ProceedingsBook

  9. Published

    It bends but would it break? topological analysis of BGP infrastructures in Europe

    Frey, S. A. F., El Khatib, Y., Rashid, A., Szmagalska-Follis, K., Vidler, J. E., Race, N. J. P. & Edwards, C. J., 21/03/2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, p. 423-438 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Analysing radiative and non-radiative recombination in InAs quantum dots grown on Si substrates for integrated laser applications

    Orchard, J., Woodhead, C., Shutts, S., Wu, J., Sobiesierski, A., Young, R. J., Beanland, R., Liu, H., Smowton, P. & Mowbray, D., 15/03/2016, Proceedings Volume 9758, Quantum Dots and Nanostructures: Growth, Characterization, and Modeling XIII. Huffaker, D. L., Eisele, H. & Dick, K. A. (eds.). SPIE, Vol. 9758. 7 p. 975809. (Proceedings of SPIE).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Geographic profiling survey: a preliminary examination of geographic profilers’ views and experiences

    Emeno, K., Bennell, C., Snook, B. & Taylor, P. J., 03/2016, In: International Journal of Police Science and Management. 18, 1, p. 3-12 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    How socially aware are social media privacy controls?

    Misra, G. & Such Aparicio, J. M., 03/2016, In: IEEE Computer. 49, 3, p. 96-99 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Malware detection in cloud computing infrastructures

    Watson, M., Shirazi, S. N. U. H., Marnerides, A., Mauthe, A. U. & Hutchison, D., 03/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 2, p. 192-205 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Sibyl: A Practical Internet Route Oracle

    Cunha, I., Marchetta, P., Calder, M., Chiu, Y.-C., Machado, B. V. A., Pescapè, A., Giotsas, V., Madhyastha, H. V. & Katz-Bassett, E., 03/2016, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, p. 325-344 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Named Data Networking: A survey

    Saxena, D., Raychoudhury, V., Suri, N., Becker, C. & Cao, J., 28/02/2016, In: Computer Science Review. 19, p. 15-55 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    LoRa for the Internet of Things

    Bor, M., Vidler, J. E. & Roedig, U., 15/02/2016, EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks. Canada: Junction Publishing, p. 361-366 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Tangible Data, explorations in data physicalization

    Hogan, T., Hornecker, E., Stusak, S., Jansen, Y., Alexander, J. M., Van Moere, A., Hinrichs, U. & Nolan, K., 14/02/2016, Proceedings of the TEI '16: Tenth International Conference on Tangible, Embedded, and Embodied Interaction . New York: ACM, p. 753-756 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Prediction of the attention area in ambient intelligence tasks

    Shafi, J., Angelov, P. P. & Umair, M., 3/02/2016, Innovative issues in intelligent systems. Sgurev, V., Yager, R., Kacprzyk, J. & Jotsov, V. (eds.). Berlin: Springer, p. 33-56 24 p. (Studies in Computational Intelligence; vol. 623).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  20. Published

    Heterodimensional charge-carrier confinement in stacked submonolayer InAs in GaAs

    Harrison, S., Young, M., Hodgson, P. D., Young, R. J., Hayne, M., Danos, E., Schliwa, A., Strittmatter, A., Lenz, A., Eisele, H., Pohl, U. & Bimberg, D., 2/02/2016, In: Physical review B. 93, 9 p., 085302.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    SBVLC: Secure Barcode-based Visible Light Communication for Smartphones

    Zhang, B., Ren, K., Xing, G., Fu, X. & Wang, C., 1/02/2016, In: IEEE Transactions on Mobile Computing. 15, 2, p. 432-446 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Privacy policy negotiation in social media

    Such, J. M. & Rovatsos, M., 02/2016, In: ACM Transactions on Autonomous and Adaptive Systems. 11, 1, 29 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Novel security mechanisms for wireless sensor networks

    Bagci, I. E., 29/01/2016, Lancaster University. 128 p.

    Research output: ThesisDoctoral Thesis

  24. Published

    ARTOD: Autonomous Real Time Objects Detection by a moving camera using recursive density estimation

    Sadeghi Tehran, P. & Angelov, P., 28/01/2016, Novel applications of intelligent systems. Hadjiski, M., Kasabov, N., Filev, D. & Jotsov, V. (eds.). Cham: Springer Verlag, p. 123-138 16 p. (Studies in Computational Intelligence; vol. 586).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    Curriculum innovation: reflection on MSci Integrated Masters with Industrial Experience

    Sas, C., Mauthe, A. U., Mills, S., McLaughlin, C. I., Finney, J. & Fish, S. A., 28/01/2016. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  26. Published

    The North West cyber security industry: export potential assessment

    Prince, D. D. C. & Fitton, O. J., 27/01/2016, Lancaster: Lancaster University. 60 p.

    Research output: Book/Report/ProceedingsCommissioned report

Back to top