Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2017
  2. Published

    How to Improve the Security Skills of Mobile App Developers: An Analysis of Expert Knowledge

    Weir, C., 2017, Lancaster University. 135 p.

    Research output: ThesisMaster's Thesis

  3. Published

    Resource Allocation for Weighted Sum-Rate Maximization in Multi-User Full-Duplex Deviceto-Device Communications: Approaches for Perfect and Statistical CSIs

    Li, S., Ni, Q., Sun, Y. & Min, G., 2017, In: IEEE Access. 5, p. 27229-27241 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    The relationship between risk control imperative and perceived causation: the case of product counterfeiting in China

    Ding, B., Stevenson, M. & Busby, J. S., 2017, In: Journal of Risk Research. 20, 6, p. 800-826 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Towards Interactive Multidimensional Visualisations for Corpus Linguistics

    Rayson, P. E., Mariani, J. A., Anderson-Cooper, B., Baron, A., Gullick, D. S., Moore, A. & Wattam, S., 2017, In: Journal for Language Technology and Computational Linguistics. 31, 1, p. 27-49 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. 2016
  7. Published

    On the security of machine learning in malware C & C detection: a survey

    Gardiner, J. & Nagaraja, S., 18/12/2016, In: ACM Computing Surveys. 49, 3, 39 p., 59.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A Distributed Caching Approach for Improved Data Availability in Rural Wireless Mesh Networks

    Ajayi, A. O., Edwards, C. J. & Roedig, U., 16/12/2016, Computational Science and Computational Intelligence (CSCI), 2016 International Conference on. 16772962: IEEE, p. 904 - 910 7 p. 16772962

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Baguette: towards end-to-end service orchestration in heterogeneous networks

    Rotsos, C., Farshad, A., Hart, N. P., Aguado, A., Bidkar, S., Sideris, K., King, D., Fawcett, L., Bird, J., Mauthe, A. U., Race, N. J. P. & Hutchison, D., 15/12/2016, International Conference on Ubiquitous Computing and Communications (IUCC'16). IEEE, p. 196-203 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    GazeArchers: playing with individual and shared attention in a two-player look&shoot tabletop game

    Pfeuffer, K., Alexander, J. & Gellersen, H., 12/12/2016, MUM '16 : Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM, p. 213-216 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Local modes-based free-shape data partitioning

    Angelov, P. P. & Gu, X., 9/12/2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Quantum Physical Unclonable Function

    Young, R. J. (Inventor), Roberts, J. (Inventor) & Roedig, U. (Inventor), 9/12/2016, IPC No. G09C1/00; H04L9/32, Patent No. GB1611554.5 KR20160141813 (A) CN106537484 (A) EP3108470 (A1) GB2537543 (A) GB2537543 (B) JP2017519350 (A) WO2015150739 (A1), Priority date 3/04/2014, Priority No. GB20140006002 20140403

    Research output: Patent

Back to top