Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2019
  2. Published

    Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

    Vateva-Gurova, T., Manzoor, S., Trapero, R., Suri, N., E., M. T., A.P., F. (Editor) & K., L., 30/01/2019, Information and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Springer-Verlag, Vol. 11398 LNCS. p. 27-38 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    The Security of Smart Buildings - A Systematic Literature Review

    Ciholas, P., Lennie, A., Sadigova, P. & Such, J. M., 28/01/2019, In: arXiv. 50 p.

    Research output: Contribution to Journal/MagazineJournal article

  5. Published

    Email fraud: The search for psychological predictors of susceptibility

    Jones, H., Towse, J. N., Race, N. J. P. & Harrison, T., 16/01/2019, In: PLoS ONE. 14, 1, 15 p., e0209684.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Towards a Security Cost Model for Cyber-Physical Systems

    Ivkic, I., Mauthe, A. & Tauber, M., 11/01/2019, 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Modeling and Analysis of Point-to-Multipoint Millimeter-Wave Backhaul Networks

    Shi, J., Lv, L., Ni, Q., Pervaiz, H. & Paoloni, C., 01/2019, In: IEEE Transactions on Wireless Communications. 18, 1, p. 268-285 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    FUJITSU White Paper: Cyber Threat Lab

    Marnerides, A., Prince, D., Couzins, J., Mills, R., Giotsas, V., McEvatt, P., Markham, D. & Irvine, C., 2019, FUJITSU .

    Research output: Other contribution

  11. Published

    Model Comparison Games for Horn Description Logics: A Summary

    Jung, J. C., Papacchini, F., Wolter, F. & Zakharyaschev, M., 2019, Proceedings of the 32nd International Workshop on Description Logics, Oslo, Norway, June 18-21, 2019. Vol. 2373. (CEUR Workshop Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top