Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2018
  2. Published

    Design and vertical tests of double-quarter wave cavity prototypes for the high-luminosity LHC crab cavity system

    Verdú-Andrés, S., Burt, G. C. & Shipman, N., 13/08/2018, In: Physical Review Accelerators and Beams. 21, 8, 14 p., 082002.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

    Ismail, H., Roos, S. & Suri, N., 1/08/2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, p. 456-464 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Autonomous learning multi-model systems from data streams

    Angelov, P. P., Gu, X. & Principe, J., 1/08/2018, In: IEEE Transactions on Fuzzy Systems. 26, 4, p. 2213-2224 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A Fuel-Payload Ratio Based Flight-Segmentation Benchmark

    Kaivanto, K. K. & Zhang, P., 08/2018, In: Transportation Research Part D: Transport and Environment. 63, p. 548–559 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Computationally Intelligent Techniques for Resource Management in MmWave Small Cell Networks

    Munir, H., Pervaiz, H., Hassan, S. A., Musavian, L., Ni, Q., Imran, M. A. & Tafazolli, R., 08/2018, In: IEEE Wireless Communications. 25, 4, p. 32-39 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Horn-Rewritability vs PTime Query Evaluation in Ontology-Mediated Querying

    Hernich, A., Papacchini, F., Lutz, C. & Wolter, F., 13/07/2018, Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI 2018, July 13-19, 2018, Stockholm, Sweden. IJCAI, p. 1861-1867 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    The influence of social reciprocity in the investigative interview

    Weiher, L., Winters, C., Taylor, P. J. & Luther, K., 11/07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  9. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  10. Published

    Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC) 2018

    Weir, C. A. F. (Editor) & Mazurek, M. (Editor), 1/07/2018, Reston, VA: Internet Society.

    Research output: Book/Report/ProceedingsBook

  11. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Back to top