Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2015
  2. Published

    Open challenges in relationship-based privacy mechanisms for social network services

    Fogues, R. L., Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2015, In: International Journal of Human-Computer Interaction. 31, 5, p. 350-370 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    PBMC: Symbolic slicing for the verification of concurrent programs

    Saissi, H., Bokor, P. & Suri, N., 2015, Automated Technology for Verification and Analysis: 13th International Symposium, ATVA 2015, Shanghai, China, October 12-15, 2015, Proceedings. Springer-Verlag, Vol. 9364. p. 344-360 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    ProTec - A Normal-Conducting Cyclinac for Proton Therapy Research and Radioisotope Production

    Apsimon, R. J., Burt, G. C., Mitchell, J., Pitman, S., Owen, H. & Degiovanni, A., 2015, Proceedings of the 6th International Particle Accelerator Conference. JACoW, p. 3883-3885 3 p. THPF084

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    RDE with forgetting: an approximate solution for large values of k with an application to fault detection problems

    Bezerra, C. G., Costa, B., Guedes, L. A. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 169-178 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Recursive SVM based on TEDA

    Kangin, D. & Angelov, P., 2015, Statistical learning and data sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Cham: Springer, p. 156-168 13 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Social computing privacy and online relationships

    Misra, G. & Such, J. M., 2015, AISB Social Aspects of Cognition and Computing Symposium. p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Sonar phishing: pinpointing highly vulnerable victims for social engineering attacks

    Larson, R., Edwards, M., Baron, A. & Rashid, A., 2015, 36th IEEE Symposium on Security and Privacy Posters. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    SPATA: Spatio-tangible tools for fabrication-aware design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 2015, TEI '15 Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction. New York: ACM, p. 189-196 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Sub-THz traveling wave amplifiers based on the double corrugated waveguide

    Paoloni, C. & Mineo, M., 2015, Plasma Sciences (ICOPS), 2015 IEEE International Conference on. IEEE, 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Supply chain resilience: definition, review and theoretical foundations for further study

    Tukamuhabwa Rwakira, B., Stevenson, M., Busby, J. & Zorzini, M., 2015, In: International Journal of Production Research. 53, 18, p. 5592-5623 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Susceptibility to email fraud: a review of psychological perspectives, data-collection methods, and ethical considerations

    Jones, H., Towse, J. & Race, N., 2015, In: International Journal of Cyber Behavior, Psychology and Learning. 5, 3, p. 13-29 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Technical implementation and feasibility

    Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N. & Zhang, H., 2015, Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, p. 255-318 64 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  16. Published

    The impact of social engineering on Industrial Control System security

    Green, B., Prince, D., Busby, J. & Hutchison, D., 2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 23-29 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    THz BWO based on photonic crystal corrugated waveguide

    Letizia, R., Mineo, M. & Paoloni, C., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Time for a Change: Examining Temporality in Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 2015, 11 p.

    Research output: Book/Report/ProceedingsOther report

  19. Published

    Towards implicit contextual integrity

    Criado, N. & Such, J. M., 2015, The Second International Workshop on Agents and CyberSecurity (ACySE). p. 23-26 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    When are capital structure decisions nonseparable from production planning? the case of generalized royalty-based hybrid finance

    Kaivanto, K. & Zinober, A., 2015, Lancaster: Lancaster University, Department of Economics, 13 p. (Economics working paper series).

    Research output: Working paper

  23. 2014
  24. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  25. Published

    Collaborative IT Outsourcing in the Public Sector: A Case Analysis of Standard Business Reporting in Australia

    Sun, R., Gregor, S. & Keating, B., 10/12/2014, Proceedings of the 25th Australasian Conference on Information Systems. p. 1-11 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    A fully autonomous data density based clustering algorithm

    Hyde, R. & Angelov, P., 9/12/2014, Evolving and Autonomous Learning Systems (EALS), 2014 IEEE Symposium on. Piscataway, N.J.: IEEE, p. 116-123 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top