Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2019
  2. Published

    Preliminary Study of a New Meander Line for W-band TWT

    Socuellamos, J. M., Letizia, R., Dionisio, R. & Paoloni, C., 28/04/2019, 2019 International Vacuum Electronics Conference (IVEC 2019): Proceedings of a meeting held 28 April - 1 May 2019, Busan, South Korea.. 8744814

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Optimising the trade-off between scheduling and operational delays at congested airports

    Shone, R., Fairbrother, J., Glazebrook, K. & Zografos, K., 26/04/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  4. Published

    MemFuzz: Using memory accesses to guide fuzzing

    Coppik, N., Schwahn, O. & Suri, N., 24/04/2019, 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE, p. 48-58 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    To freeze or not to freeze: A culture-sensitive motion capture approach to detecting deceit

    Van der Zee, S., Poppe, R., Taylor, P. J. & Anderson, R., 12/04/2019, In: PLoS ONE. 14, 4, 18 p., e0215000.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Fool’s Errand: Looking at April Fools Hoaxes as Disinformation through the Lens of Deception and Humour

    Dearden, E. & Baron, A., 7/04/2019. 17 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Relay Selections for Cooperative Underlay CR Systems with Energy Harvesting

    Ye, J., Liu, Z., Zhao, H., Pan, G., Ni, Q. & Alouini, M.-S., 2/04/2019, In: IEEE Transactions on Cognitive Communications and Networking. 5, 2, p. 358-369 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In: IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Adjusting Inferential Thresholds to Reflect Nonepistemic Values

    Kaivanto, K. K. & Steel, D., 1/04/2019, In: Philosophy of Science. 86, 2, p. 255-285 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Energy efficiency using cloud management of LTE networks employing fronthaul and virtualized baseband processing pool

    Al-dulaimi, A., Al-rubaye, S. & Ni, Q., 1/04/2019, In: IEEE Transactions on Cloud Computing. 7, 2, p. 1-12 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top