Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2010
  2. Published

    Être sur la même longueur d'onde : la communication interculturelle en contexte de négociation de crise

    Giebels, E. & Taylor, P., 2010, Psychologie de l'intervention policière en situation de crise. St-Yves, M. & Collins, P. (eds.). Editions Yvon Blais

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  3. Published
    No renderer
  4. Published

    Evading virus detection using code obfuscation

    Murad, K., Shirazi, S. N., Bin Zikria, Y. & Ikram, N., 2010, Future Generation Information Technology. Kim, T. H., Lee, Y. H., Kang, B. H. & Slezak, D. (eds.). Springer, p. 394-401 8 p. (Lecture Notes in Computer Science; vol. 6485).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Evaluation of QoS Parameters for Real-time Rich Media Applications Using a Test-bed Implementation

    Panchadcharam, S., Ni, Q. & Taylor, G. A., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 343-348 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Forecasting Time-Series for NN GC1 using Evolving Takagi-Sugeno (eTS) Fuzzy Systems with On-line Inputs Selection

    Andreu, J. & Angelov, P., 2010, 2010 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2010). New York: IEEE, p. 1479-1483 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    FORTEL: Forecasting routing technique using location information for Mobile Ad hoc networks

    Noureddine, H., Hamed, A. & Ni, Q., 2010, Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), 2010 IEEE 21st International Symposium on. IEEE, p. 473-478 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    GesText: Accelerometer-Based Gestural Text-Entry Systems

    Jones, E., Alexander, J., Andreou, A., Irani, P. & Subramanian, S., 2010, Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI'10). New York, NY, USA: ACM, p. 2173-2182 10 p. (CHI '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    High-speed, in-band performance measurement instrumentation for next generation IP networks

    Pezaros, D. P., Georgopoulos, K. & Hutchison, D., 2010, In: Computer Networks. 54, 18, p. 3246-3263 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Human Activity Recognition in Intelligent Home Environments: An Evolving Approach

    Antonio Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 2010, ECAI 2010 - 19th European Conference on Artificial Intelligence. Coelho, H., Studer, R. & Wooldridge, M. (eds.). Amsterdam: IOS Press, p. 1047-1048 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Improving the precision of corpus methods: The standardized version of Early Modern English Medical Texts

    Lehto, A., Baron, A., Ratia, M. & Rayson, P., 2010, Early Modern English Medical Texts: Corpus description and studies. Taavitsainen, I. & Pahta, P. (eds.). Amsterdam: John Benjamins, p. 279-289 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  12. Published

    Incorporating mobile sensor networks into the internet: an all IP approach

    McCarthy, B., Edwards, C., Varakliotis, S. & Kirstein, P., 2010, MobiArch '10: Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture. New York, NY, USA: ACM, p. 15-20 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Increasing the resilience of critical SCADA systems using peer-to-peer overlays

    Germanus, D., Khelil, A. & Suri, N., 2010, Architecting Critical Systems: First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings. Springer, Vol. 6150 LNCS. p. 161-178 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  14. Published

    INDEXYS, a logical step beyond GENESYS

    Eckel, A., Milbredt, P., Al-Ars, Z., Schneele, S., Vermeulen, B., Csertán, G., Scheerer, C., Suri, N., Khelil, A., Fohler, G., Obermaisser, R. & Fidi, C., 2010, Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010. Proceedings. Springer, Vol. 6351 LNCS. p. 431-451 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  15. Published

    Intelligent Autonomous Handover in iMANETs

    McCarthy, B., Georgopoulos, P. & Edwards, C., 2010, MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking. New York: ACM, p. 86-92 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Interaction patterns of social influence in crisis negotiation

    Giebels, E. & Taylor, P., 2010, Contemporary theory, research, and practice of crisis and hostage negotiation. Rogan, R. & Lanceley, F. (eds.). Cresskill, NJ: Hampton Press, p. 59-76 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  17. Published

    Joint Channel Parameter Estimation Using Evolutionary Algorithm

    Li, W. & Ni, Q., 2010, Communications (ICC), 2010 IEEE International Conference on. New York: IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Linkage analysis in cases of serial burglary: comparing the performance of university students, police professionals, and a logistic regression model

    Bennell, C., Bloomfield, S., Snook, B., Taylor, P. & Barnes, C., 2010, In: Psychology, Crime and Law. 16, 6, p. 507-524 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Location Awareness Rescue System : Support for Mountain Rescue Teams

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, 9th IEEE International Symposium on Network Computing and Applications (NCA), 2010 . IEEE, p. 243-246 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Low energy RF accelerator for various applications

    Ambattu, P., Burt, G., Tahir, I., Corlett, P., Moss, A. & McIntosh, P. A., 2010, Proceedings of Linear Accelerator Conference LINAC2010. p. 127-129 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    MeshUp: reliably evolving a living lab

    Ishmael, J., Hugelshofer, F., Smith, P. & Race, N. J. P., 2010, Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization. New York, NY, USA: ACM, p. 23-30 8 p. (WiNTECH '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    MIMO-UWB channel modelling using a 3D ray tracing simulator

    Asif, H., Zeng, Y., Honary, B. & Ahmed, H., 2010, Wireless, Mobile and Multimedia Networks (ICWMNN 2010), IET 3rd International Conference on. IEEE, p. 90-94 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    MPLS unleashed: remedy using IPSEC over MPLS VPN

    Shirazi, S. N., Asim, M., Irfan, M. & Ikram, N., 2010, Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Bandyopadhyay, S. K., Adi, W., Kim, T.-H. & Xiao, Y. (eds.). Berlin: Springer-Verlag, p. 241-248 8 p. (Communications in Computer and Information Science; vol. 76).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    MPM: Map based Predictive Monitoring for Wireless Sensor Networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2010, Autonomic Computing and Communications Systems: Third International ICST Conference, Autonomics 2009, Limassol, Cyprus, September 9-11, 2009, Revised Selected Papers. Springer, Vol. 23 LNICST. p. 79-95 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    On efficient models for model checking message-passing distributed protocols

    Bokor, P., Serafini, M. & Suri, N., 2010, Formal Techniques for Distributed Systems: Joint 12th IFIP WG 6.1 International Conference, FMOODS 2010 and 30th IFIP WG 6.1 International Conference, FORTE 2010, Amsterdam, The Netherlands, June 7-9, 2010. Proceedings. Springer, Vol. 6117 LNCS. p. 216-223 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  26. Published

    Pervasive technologies, risk and accountability

    Kinder, K. E., Boos, D., Grote, G. & Busby, J. S., 2010, Annual SRA-Europe Meeting, Society for Risk Analysis Europe (London) - 2010. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top