Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2018
  2. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    EU H2020 ULTRAWAVE - The concept

    Paoloni, C. (Artist), 1/09/2018

    Research output: Exhibits, objects and web-based outputsDigital or Visual Products

  4. Published

    A Method for Autonomous Data Partitioning

    Gu, X., Angelov, P. P. & Principe, J., 09/2018, In: Information Sciences. 460-461, p. 65-82 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published
  6. Published

    The Benefits of a Self-Generated Cue Mnemonic for Timeline Interviewing

    Kontogianni, F., Hope, L., Vrij, A., Taylor, P. J. & Gabbert, F., 09/2018, In: Journal of Applied Research in Memory and Cognition. 7, 3, p. 454-461 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Acceleration of electrons in the plasma wakefield of a proton bunch

    Adli, E., Apsimon, R. J., Burt, G. C., Dexter, A. C., Mitchell, J. & Pitman, S., 29/08/2018, In: Nature. 561, p. 363-367 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Flashlight: A novel monitoring path identification schema for securing cloud services

    Zhang, H., Luna, J., Suri, N. & Trapero, R., 27/08/2018, ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, 10 p. 5

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Giving a voice through design: adapting design methods to enhance the participation of people with communication difficulties

    McNaney , R., Wilson, C., Wallace, J., Brereton, M., Roper, A., Wilson, S. & Sturdee, M., 20/08/2018, PDC '18 Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2. New York: ACM, Vol. 2. 3 p. 40

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 511-514 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Quantum Key Distribution Random Access Network

    Zhang, Y. & Ni, Q., 16/08/2018, IEEE/CIC International Conference on Communications in China (ICCC). IEEE/CIC, p. 174-178 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top