Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2010
  2. Published

    Evolving intelligent systems : methodology and applications.

    Angelov, P., Filev, D., Kasabov, N., Angelov, P. (Editor), Filev, D. (Editor) & Kasabov, N. (Editor), 04/2010, New York: Wiley-Blackwell. 444 p. (IEEE Press Series on Computational Intelligence)

    Research output: Book/Report/ProceedingsBook

  3. Published

    Evolving Takagi-Sugeno fuzzy systems from data streams (eTS+).

    Angelov, P., 04/2010, Evolving intelligent systems : methodology and applications. Angelov, P., Filev, D. & Kasabov, N. (eds.). New York, USA: John Wiley and Sons and IEEE Press, p. 21-50 30 p. (IEEE Press series in Computational Intelligence).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  5. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  6. Published

    Evolving Takagi Sugeno modelling with memory for slow processes.

    McDonald, S. & Angelov, P., 02/2010, In: International Journal of Knowledge-Based and Intelligent Engineering Systems. 14, 1, p. 11-16 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Event detection and correlation for network environments

    Sifalakis, M., Fry, M. & Hutchison, D., 1/01/2010, In: IEEE Journal on Selected Areas in Communications. 28, 1, p. 60-69 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    An unsaturated model for request mechanisms in WiMAX

    Ni, Q. & Hu, L., 01/2010, In: IEEE Communications Letters. 14, 1, p. 45-47 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Pyramidal quantum dots: High uniformity and narrow excitonic emission

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 01/2010, In: Superlattices and Microstructures. 47, 1, p. 78-82 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    A computational protocol and software implementation (as a MATLAB application) for biomaker identification in infrared spectroscopy datasets

    Trevisan, J., Angelov, P. & Martin, F., 2010, In: Nature Protocols.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks

    Noureddine, H., Ni, Q., Min, G. & Al-Raweshidy, H., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2662-2667 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    A Novel Game-Theoretic Cross-Layer Design for OFDMA Broadband Wireless Networks

    Zarakovitis, C. C., Ni, Q., Nikolaros, I. & Tyce, O., 2010, Communications (ICC), 2010 IEEE International Conference on. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    A secure ubiquitous healthcare system based on IMS and the HL7 standards

    Nikolidakis, S. A., Georgakakis, E., Giotsas, V., Vergados, D. D. & Douligeris, C., 2010, PETRA '10 Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments. New York: ACM, 42

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    A Smart approach for GPT cryptosystem based on rank codes

    Rashwan, H., Gabidulin, E. M. & Honary, B., 2010, Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on. IEEE, p. 2463-2467 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Adaptive contention resolution procedure for emerging WiMAX networks

    Delicado, J., Delicado, F. M., Orozco-Barbosa, L. & Ni, Q., 2010, Wireless and Mobile Networking Conference (WMNC), 2010 Third Joint IFIP. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    An adaptive medium access control scheme for mobile ad hoc networks under self-similar traffic

    Abu-Tair, M., Min, G., Ni, Q. & Liu, H., 2010, In: Journal of Supercomputing. 53, 1, p. 212-230 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Analytical Design Method for Corrugated Rectangular Waveguide SWS THz Vacuum Tubes

    Mineo, M., Di Carlo, A. & Paoloni, C., 2010, In: Journal of Electromagnetic Waves and Applications. 24, 17-18, p. 2479-2494 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Backward Wave Oscillator for THz Frequency Range Based on Double Corrugation Slow-Wave Structure

    Mineo, M., Bariou, D., David, J. F., Durand, A. J. & Paoloni, C., 2010, 35TH INTERNATIONAL CONFERENCE ON INFRARED, MILLIMETER, AND TERAHERTZ WAVES (IRMMW-THZ 2010). New York: IEEE, p. - 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination Transfers

    Srebrny, P., Plagemann, T., Goebel, V. & Mauthe, A., 2010, ICDCS '10: Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, p. 209-220 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Characterising a grid site's traffic

    Ma, T., El-khatib, Y., Mackay, M. & Edwards, C., 2010, HPDC '10 Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing. New York: ACM, p. 707-716 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Cross-layer Design for Multiuser OFDMA Systems with Cooperative Game and MMPP Queuing Considerations

    Nikolaros, I. G., Zarakovitis, C. C., Skordoulis, D., Hadjinicolaou, M. G. & Ni, Q., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2649-2654 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Developing a Portable Wireless LAN Kit

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, JANET.

    Research output: Working paper

  25. Published

    Dynamic Deployment and Reconfiguration of Ad-Hoc Routing Protocols

    Ramdhany, R., Grace, P., Coulson, G. & Hutchison, D., 2010, In: Journal of Internet Services and Applications. 1, 2, p. 135-152 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Être sur la même longueur d'onde : la communication interculturelle en contexte de négociation de crise

    Giebels, E. & Taylor, P., 2010, Psychologie de l'intervention policière en situation de crise. St-Yves, M. & Collins, P. (eds.). Editions Yvon Blais

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  27. Published
    No renderer
  28. Published

    Evading virus detection using code obfuscation

    Murad, K., Shirazi, S. N., Bin Zikria, Y. & Ikram, N., 2010, Future Generation Information Technology. Kim, T. H., Lee, Y. H., Kang, B. H. & Slezak, D. (eds.). Springer, p. 394-401 8 p. (Lecture Notes in Computer Science; vol. 6485).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Evaluation of QoS Parameters for Real-time Rich Media Applications Using a Test-bed Implementation

    Panchadcharam, S., Ni, Q. & Taylor, G. A., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 343-348 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Forecasting Time-Series for NN GC1 using Evolving Takagi-Sugeno (eTS) Fuzzy Systems with On-line Inputs Selection

    Andreu, J. & Angelov, P., 2010, 2010 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2010). New York: IEEE, p. 1479-1483 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    FORTEL: Forecasting routing technique using location information for Mobile Ad hoc networks

    Noureddine, H., Hamed, A. & Ni, Q., 2010, Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), 2010 IEEE 21st International Symposium on. IEEE, p. 473-478 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    GesText: Accelerometer-Based Gestural Text-Entry Systems

    Jones, E., Alexander, J., Andreou, A., Irani, P. & Subramanian, S., 2010, Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI'10). New York, NY, USA: ACM, p. 2173-2182 10 p. (CHI '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    High-speed, in-band performance measurement instrumentation for next generation IP networks

    Pezaros, D. P., Georgopoulos, K. & Hutchison, D., 2010, In: Computer Networks. 54, 18, p. 3246-3263 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Human Activity Recognition in Intelligent Home Environments: An Evolving Approach

    Antonio Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 2010, ECAI 2010 - 19th European Conference on Artificial Intelligence. Coelho, H., Studer, R. & Wooldridge, M. (eds.). Amsterdam: IOS Press, p. 1047-1048 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Improving the precision of corpus methods: The standardized version of Early Modern English Medical Texts

    Lehto, A., Baron, A., Ratia, M. & Rayson, P., 2010, Early Modern English Medical Texts: Corpus description and studies. Taavitsainen, I. & Pahta, P. (eds.). Amsterdam: John Benjamins, p. 279-289 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  36. Published

    Incorporating mobile sensor networks into the internet: an all IP approach

    McCarthy, B., Edwards, C., Varakliotis, S. & Kirstein, P., 2010, MobiArch '10: Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture. New York, NY, USA: ACM, p. 15-20 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  38. Published

    INDEXYS, a logical step beyond GENESYS

    Eckel, A., Milbredt, P., Al-Ars, Z., Schneele, S., Vermeulen, B., Csertán, G., Scheerer, C., Suri, N., Khelil, A., Fohler, G., Obermaisser, R. & Fidi, C., 2010, Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer, Vol. 6351 LNCS. p. 431-451 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  39. Published

    Intelligent Autonomous Handover in iMANETs

    McCarthy, B., Georgopoulos, P. & Edwards, C., 2010, MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking. New York: ACM, p. 86-92 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  41. Published

    Joint Channel Parameter Estimation Using Evolutionary Algorithm

    Li, W. & Ni, Q., 2010, Communications (ICC), 2010 IEEE International Conference on. New York: IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Linkage analysis in cases of serial burglary: comparing the performance of university students, police professionals, and a logistic regression model

    Bennell, C., Bloomfield, S., Snook, B., Taylor, P. & Barnes, C., 2010, In: Psychology, Crime and Law. 16, 6, p. 507-524 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Location Awareness Rescue System : Support for Mountain Rescue Teams

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, 9th IEEE International Symposium on Network Computing and Applications (NCA), 2010 . IEEE, p. 243-246 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Low energy RF accelerator for various applications

    Ambattu, P., Burt, G., Tahir, I., Corlett, P., Moss, A. & McIntosh, P. A., 2010, Proceedings of Linear Accelerator Conference LINAC2010. p. 127-129 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    MeshUp: reliably evolving a living lab

    Ishmael, J., Hugelshofer, F., Smith, P. & Race, N. J. P., 2010, Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization. New York, NY, USA: ACM, p. 23-30 8 p. (WiNTECH '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    MIMO-UWB channel modelling using a 3D ray tracing simulator

    Asif, H., Zeng, Y., Honary, B. & Ahmed, H., 2010, Wireless, Mobile and Multimedia Networks (ICWMNN 2010), IET 3rd International Conference on. IEEE, p. 90-94 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    MPLS unleashed: remedy using IPSEC over MPLS VPN

    Shirazi, S. N., Asim, M., Irfan, M. & Ikram, N., 2010, Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Bandyopadhyay, S. K., Adi, W., Kim, T.-H. & Xiao, Y. (eds.). Berlin: Springer-Verlag, p. 241-248 8 p. (Communications in Computer and Information Science; vol. 76).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    MPM: Map based Predictive Monitoring for Wireless Sensor Networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2010, Autonomic Computing and Communications Systems: Third International ICST Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected Papers. Springer, Vol. 23 LNICST. p. 79-95 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  49. Published

    On efficient models for model checking message-passing distributed protocols

    Bokor, P., Serafini, M. & Suri, N., 2010, Formal Techniques for Distributed Systems: Joint 12th IFIP WG 6.1 International Conference, FMOODS 2010 and 30th IFIP WG 6.1 International Conference, FORTE 2010, Amsterdam, The Netherlands, June 7-9, 2010. Proceedings. Springer, Vol. 6117 LNCS. p. 216-223 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  50. Published

    Pervasive technologies, risk and accountability

    Kinder, K. E., Boos, D., Grote, G. & Busby, J. S., 2010, Annual SRA-Europe Meeting, Society for Risk Analysis Europe (London) - 2010. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Quality of information in wireless sensor networks: A survey

    Sachidananda, V., Khelil, A. & Suri, N., 2010.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Back to top