Browse by UCL Departments and Centres
Group by: Author | Type
Number of items: 93.
A
Ash, M;
Ritchie, M;
Chetty, K;
(2018)
On the Application of Digital Moving Target Indication Techniques to Short-Range FMCW Radar Data.
IEEE Sensors Journal
, 18
(10)
pp. 4167-4175.
10.1109/JSEN.2018.2823588.
|
Ashby, MPJ;
(2018)
Comparing Methods for Measuring Crime Harm/Severity.
Policing: A Journal of Policy and Practice
, 12
(4)
pp. 439-454.
10.1093/police/pax049.
|
B
Becker, I;
Parkin, S;
Sasse, MA;
(2018)
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength.
In:
27th USENIX Security Symposium.
(pp. pp. 239-253).
USENIX Association
|
Belmonte-Sánchez, JR;
Gherghel, S;
Arrebola-Liébanas, J;
Romero González, R;
Martínez Vidal, JL;
Parkin, I;
Garrido Frenich, A;
(2018)
Rum classification using fingerprinting analysis of volatile fraction by headspace solid phase microextraction coupled to gas chromatography-mass spectrometry.
Talanta
, 187
pp. 348-356.
10.1016/j.talanta.2018.05.025.
|
Bermudez Villalva, D;
Onaolapo, J;
Stringhini, G;
Musolesi, M;
(2018)
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web.
Crime Science
, 7
, Article 17. 10.1186/s40163-018-0092-6.
|
Blythe, JM;
Johnson, SD;
(2018)
The consumer security index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices.
In:
Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT - 2018.
IEEE: London, UK.
|
Borda, C;
Tong, K;
Chetty, K;
(2018)
A low-cost mechanism to reconfigure the operating frequency band of a Vivaldi antenna for cognitive radio and spectrum monitoring applications.
IET Microwaves Antennas and Propagation
, 12
(5)
pp. 779-782.
10.1049/iet-map.2017.0731.
|
Borrion, H;
(2018)
Engineering.
In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.)
Routledge Handbook of Crime Science.
Routledge: London, UK.
|
Borrion, H;
Koch, D;
(2018)
Architecture.
In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.)
Routledge Handbook of Crime Science.
Routledge: London, UK.
|
Bouhana, N;
Corner, E;
Gill, P;
Schuurman, BW;
(2018)
Background and Preparatory Behaviours of Right-Wing Extremist Lone Actors: A Comparative Study.
Perspectives on Terrorism
, 12
(6)
pp. 150-163.
|
Bradford, B;
Creutzfeldt, N;
(2018)
Procedural Justice in Alternative Dispute Resolution: Fairness judgments among users of Financial Ombudsman services in Germany and the United Kingdom.
Journal of European Consumer and Market Law
, 7
(5)
pp. 188-200.
|
Brown, J;
Belur, JS;
Tompson, L;
McDowall, A;
Hunter, G;
May, T;
(2018)
Extending the remit of evidence-based policing.
International Journal of Police Science & Management
, 20
(1)
pp. 38-51.
10.1177/1461355717750173.
|
C
Chainey, S;
Curtis-Ham, S;
Evans, RM;
Burns, G;
(2018)
Examining the extent to which repeat and near repeat patterns can prevent crime.
Policing: An International Journal of Police Strategies and Management
, 41
(5)
pp. 608-622.
10.1108/PIJPSM-12-2016-0172.
|
Chainey, S;
Serrano-Berthet, R;
Veneri, F;
(2018)
Evaluando el impacto del Programa de Alta Dedicación Operativa (PADO) en la reducción de robos violentos en Montevideo, Uruguay.
In:
¿Cómo evitar el delito urbano?: el Programa de Alta Dedicación Operativa en la nueva Policía uruguaya.
(pp. 155-179).
Inter-American Development Bank and Uruguay Ministry of Justice: Washington DC, USA.
|
Chen, Q;
Tan, B;
Woodbridge, K;
Chetty, K;
(2018)
Doppler based detection of multiple targets in passive WiFi radar using undetermined blind source separation.
In:
Proceedings of the International Conference on Radar 2018.
International Conference on Radar 2018: Brisbane, Australia.
|
Chen, Q;
Yang, L;
Zhaowen, W;
Wassell, I;
Chetty, K;
(2018)
Re-Weighted Adversarial Adaptation Network for Unsupervised Domain Adaptation.
In:
CVPR 2018, IEEE Conference on Computer Vision and Pattern Recognition.
(pp. pp. 7976-7985).
IEEE
(In press).
|
Cockbain, EP;
Bowers, K;
Dimitrova, G;
(2018)
Human trafficking for labour exploitation: the results of a two-phase systematic review mapping the European evidence base and synthesising key scientific research evidence.
Journal of Experimental Criminology
, 14
(3)
pp. 319-360.
10.1007/s11292-017-9321-3.
|
Cockbain, EP;
Brayley-Morris, H;
(2018)
Human trafficking and labour exploitation in the casual construction industry: An analysis of three major investigations in the United Kingdom involving Irish Traveller offending groups.
Policing: A Journal Of Policy And Practice
, 12
(2)
pp. 129-149.
10.1093/police/pax032.
|
Cook, A;
Reynald, DM;
Leclerc, B;
Wortley, R;
(2018)
Learning About Situational Crime Prevention From Offenders: Using a Script Framework to Compare the Commission of Completed and Disrupted Sexual Offenses.
Criminal Justice Review
10.1177/0734016818812149.
(In press).
|
Corner, E;
Bouhana, N;
Gill, P;
(2018)
The multifinality of vulnerability indicators in lone-actor terrorism.
Psychology, Crime and Law
, 25
(2)
pp. 111-132.
10.1080/1068316X.2018.1503664.
|
Corner, E;
Gill, P;
(2018)
The nascent empirical literature on psychopathology and terrorism.
World Psychiatry
, 17
(2)
pp. 147-148.
10.1002/wps.20547.
|
Corner, E;
Gill, P;
Schouten, R;
Farnham, F;
(2018)
Mental Disorders, Personality Traits, and Grievance-Fueled Targeted Violence: The Evidence Base and Implications for Research and Practice.
Journal of Personality Assessment
, 100
(5)
pp. 459-470.
10.1080/00223891.2018.1475392.
|
D
Demjaha, A;
Spring, J;
Becker, IF;
Parkin, S;
Sasse, MA;
(2018)
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption.
[Dataset].
UCL Jill Dando Institute of Security and Crime Science: London, UK.
|
Demjaha, A;
Spring, JM;
Becker, I;
Parkin, S;
Sasse, MA;
(2018)
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption.
In: Acar, Y and Patil, S, (eds.)
Proceedings of the NDSS Symposium 2018.
Internet Society: San Diego, CA, USA.
|
DuBois, Erin Kathleen;
(2018)
Validation of experimental approaches in Forensic Science: a case study of the tissue fragments created during an explosive event.
Doctoral thesis (Ph.D), UCL (University College London).
|
E
Ekblom, P;
Gill, P;
(2018)
Evolution, Crime Science and Terrorism: The Case of Provisional IRA Weaponry.
In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.)
Routledge Handbook of Crime Science.
(pp. 252-270).
Routledge: London, UK.
|
Eriksson, L;
Mazerolle, P;
Wortley, RK;
Johnson, H;
McPhedran, S;
(2018)
The offending histories of homicide offenders: Are men who kill intimate partners distinct from men who kill other men?
Psychology of Violence
10.1037/vio0000214.
(In press).
|
Eriksson, L;
McPhedran, S;
Caman, S;
Mazerolle, P;
Wortley, RK;
Johnson, H;
(2018)
Criminal Careers Among Female Perpetrators of Family and Non-family Homicide in Australia.
Journal of Interpersonal Violence
10.1177/0886260518760007.
(In press).
|
Evans, GP;
(2018)
Single-walled carbon nanotube networks and related composite materials for gas sensing applications.
Doctoral thesis (Ph.D), UCL (University College London).
|
G
Gash, T;
(2018)
Policing 4.0: Deciding the Future of Policing in the UK.
Deloitte: London UK.
|
Gherghel, S;
Morgan, RM;
Arrebola-Liébanas, J;
Romero-González, R;
Blackman, CS;
Garrido-Frenich, A;
Parkin, IP;
(2018)
Development of a HS-SPME/GC-MS method for the analysis of volatile organic compounds from fabrics for forensic reconstruction applications.
Forensic Sci Int
, 290
pp. 207-218.
10.1016/j.forsciint.2018.07.015.
|
Gill, P;
Salman, NL;
Clemmow, C;
(2018)
Prescient, inconsistent, and ignorant: Commentary on the Dispensation of dynamite.
Journal of Threat Assessment and Management
, 5
(4)
pp. 242-244.
10.1037/tam0000111.
|
Glasner, P;
Johnson, SD;
Leitner, M;
(2018)
A comparative analysis to forecast apartment burglaries in Vienna, Austria, based on repeat and near repeat victimization.
Crime Science
, 7
, Article 9. 10.1186/s40163-018-0083-7.
|
Groff, ER;
Johnson, SD;
Thornton, A;
(2018)
State of the Art in Agent-Based Modeling of Urban Crime: An Overview.
Journal of Quantitative Criminology
10.1007/s10940-018-9376-y.
(In press).
|
H
Hamirani, M;
Dror, I;
Morgan, RM;
(2018)
Examining the Role of Science in the Courtroom: Admissibility and Reliability of Forensic Science in the Courtroom.
Albany Law Review
, 81
(3)
pp. 975-994.
|
Hutt, OK;
Bowers, K;
Johnson, S;
Davies, T;
(2018)
Data and evidence challenges facing place-based policing.
Policing: An International Journal of Police Strategies & Management
, 41
(3)
pp. 339-351.
10.1108/PIJPSM-09-2017-0117.
|
J
Johnson, S;
Ekblom, P;
Laycock, G;
Frith, M;
Sombatruang, N;
Rosas Valdez, E;
(2018)
Future Crime.
In: Wortley, R and Sidebottom, A and Tilley, N and Laycock, G, (eds.)
Routledge Handbook of Crime Science.
Routledge: Abingdon, UK.
|
Johnson, SD;
Davies, T;
Murray, A;
Ditta, P;
Belur, J;
Bowers, KJ;
(2018)
Evaluation of Operation Swordfish- a Near Repeat Target Hardening Strategy.
Journal of Experimental Criminology
, 13
(4)
pp. 505-525.
10.1007/s11292-017-9301-7.
|
Jurcic, M;
(2018)
Metal-organic frameworks for the trace detection of explosive substances and related compounds.
Doctoral thesis (Ph.D), UCL (University College London).
|
K
Kamps, J;
Kleinberg, B;
(2018)
To the moon: defining and detecting cryptocurrency pump-and-dumps.
Crime Science
, 7
, Article 18. 10.1186/s40163-018-0093-5.
|
Kleinberg, B;
van der Toolen, Y;
Vrij, A;
Arntz, A;
Verschuere, B;
(2018)
Automated verbal credibility assessment of intentions: The model statement technique and predictive modeling.
Applied Cognitive Psychology
, 32
(3)
pp. 354-366.
10.1002/acp.3407.
|
Kleinberg, B;
Warmelink, L;
Arntz, A;
Verschuere, B;
(2018)
The first direct replication on using verbal credibility assessment for the detection of deceptive intentions.
Applied Cognitive Psychology
, 32
(5)
pp. 592-599.
10.1002/acp.3439.
|
L
Levin, EA;
Morgan, RM;
Griffin, LD;
Jones, VJ;
(2018)
A Comparison of Thresholding Methods for Forensic Reconstruction Studies Using Fluorescent Powder Proxies for Trace Materials.
Journal of Forensic Sciences
10.1111/1556-4029.13938.
|
Li, W;
Tan, B;
Piechocki, R;
(2018)
Passive Radar for Opportunistic Monitoring in E-Health Applications.
IEEE Journal of Translational Engineering in Health and Medicine
, 6
, Article 2800210. 10.1109/JTEHM.2018.2791609.
|
Li, W;
Tan, B;
Xu, Y;
Piechocki, RJ;
(2018)
Log-Likelihood Clustering-Enabled Passive RF Sensing for Residential Activity Recognition.
IEEE Sensors Journal
, 18
(13)
pp. 5413-5421.
10.1109/JSEN.2018.2834739.
|
M
Manning, M;
Wong, G;
Graham, T;
Ranbaduge, T;
Cristen, P;
Taylor, K;
Wortley, RK;
... Skorich, P; + view all
(2018)
Towards a ‘smart’ cost–benefit tool: using machine learning to predict the costs of criminal justice policy interventions.
Crime Science
, 7
, Article 12. 10.1186/s40163-018-0086-4.
|
Manning, M;
Wong, GTW;
Graham, T;
Ranbaduge, T;
Christen, P;
Taylor, K;
Wortley, R;
... Skorich, P; + view all
(2018)
Correction to: Towards a ‘smart’ cost–benefit tool: using machine learning to predict the costs of criminal justice policy interventions.
[Corrigendum].
Crime Science
, 7
, Article 20. 10.1186/s40163-018-0091-7.
|
Mariconti, E;
Suarez-Tangil, G;
Blackburn, J;
Cristofaro, ED;
Kourtellis, N;
Leontiadis, I;
Serrano, JL;
(2018)
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
In: Gilbert, Eric and Karahalios, Karrie, (eds.)
Proceedings of the 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW’19).
(pp. p. 207).
ACM (Association for Computing Machinery): New York, NY, USA.
|
McCulloch, G;
Dawson, LA;
Ross, JM;
Morgan, RM;
(2018)
The discrimination of geoforensic trace material from close proximity locations by organic profiling using HPLC and plant wax marker analysis by GC.
Forensic Science International
, 288
pp. 310-326.
10.1016/j.forsciint.2018.02.009.
|
Morgan, RM;
(2018)
Forensic science needs both the 'hedgehog' and the 'fox'.
Forensic Science International
, 292
e10-e12.
10.1016/j.forsciint.2018.08.026.
|
Morgan, RM;
Nakhaeizadeh, S;
Rando, C;
Dror, IE;
(2018)
Authors' Response on research into contextual influences and forensic decision making.
[Letter].
Journal of Forensic Sciences
, 63
(5)
pp. 1598-1600.
10.1111/1556-4029.13836.
|
Morgan, RM;
Oldfield, C;
French, J;
Miles, H;
(2018)
The efficacy of luminol in detecting bloodstains that have been washed with sodium percarbonate and exposed to environmental conditions.
Australian Journal of Forensic Sciences
, 50
(4)
pp. 345-354.
10.1080/00450618.2016.1264478.
|
Morgan, RM;
Scott, KR;
Ainley, J;
Bull, PA;
(2018)
Journey history reconstruction from the soils and sediments on footwear: An empirical approach.
Science and Justice
10.1016/j.scijus.2018.11.002.
(In press).
|
N
Nakhaeizadeh, S;
Morgan, RM;
Rando, C;
Dror, IE;
(2018)
Cascading Bias of Initial Exposure to Information at the Crime Scene to the Subsequent Evaluation of Skeletal Remains.
Journal of Forensic Sciences
, 63
(2)
pp. 403-411.
10.1111/1556-4029.13569.
|
Newman, E;
Quayle, E;
Cariola, L;
Cooper, K;
Koukopoulos, N;
Beier, K;
Squire, T;
(2018)
Deterrents to Viewing Indecent Images of Children Online: A Protocol for a Meta-Narrative Review.
Social Science Protocols
, 1
(2018)
10.7565/ssp.2018.2648.
|
O
Onwuzurike, L;
Almeida, M;
Mariconti, E;
Blackburn, J;
Stringhini, G;
De Cristofaro, E;
(2018)
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
In:
2018 16th Annual Conference on Privacy, Security and Trust (PST).
IEEE
|
Ozan, W;
Haigh, PA;
Tan, B;
Darwazeh, I;
(2018)
Experimental SEFDM Pipelined Iterative Detection Architecture with Improved Throughput.
In:
Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
IEEE: Porto, Portugal.
|
P
Polaschek, DLL;
Yesberg, JA;
(2018)
High-Risk Violent Prisoners' Patterns of Change on Parole on the DRAOR's Dynamic Risk and Protective Factors.
Criminal Justice and Behavior
, 45
(3)
pp. 340-363.
10.1177/0093854817739928.
|
Polaschek, DLL;
Yesberg, JA;
Chauhan, P;
(2018)
A Year Without a Conviction: An Integrated Examination of Potential Mechanisms for Successful Reentry in High-Risk Violent Prisoners.
Criminal Justice and Behavior
, 45
(4)
pp. 425-446.
10.1177/0093854817752757.
|
Pugh, DC;
(2018)
Modified Metal Oxide Gas Sensors for the Detection of Clandestine Chemistry Locations.
Doctoral thesis (Ph.D), UCL (University College London).
|
R
Radburn, M;
Stott, C;
Bradford, B;
Robinson, M;
(2018)
When is policing fair? Groups, identity and judgements of the procedural justice of coercive crowd policing.
Policing and Society
, 28
(6)
pp. 647-664.
10.1080/10439463.2016.1234470.
|
Ribéreau-Gayon, A;
Carter, DO;
Regan, S;
(2018)
New evidence of predation on humans by cookiecutter sharks in Kauai, Hawaii.
International Journal of Legal Medicine
, 132
(5)
pp. 1381-1387.
10.1007/s00414-018-1786-8.
|
Ribéreau-Gayon, A;
Rando, C;
Morgan, RM;
Carter, DO;
(2018)
The suitability of visual taphonomic methods for digital photographs: An experimental approach with pig carcasses in a tropical climate.
Science and Justice
, 58
(3)
pp. 167-176.
10.1016/j.scijus.2017.12.001.
|
S
Schucan Bird, K;
Tompson, LA;
(2018)
Writing Narratives for the Crime Reduction Toolkit.
UCL, IOE Department of Social Science: London, UK.
|
Schuurman, B;
Bakker, E;
Gill, P;
Bouhana, N;
(2018)
Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.
Journal of Forensic Sciences
, 63
(4)
pp. 1191-1200.
10.1111/1556-4029.13676.
|
Shen, Y;
Mariconti, E;
Vervier, P-A;
Stringhini, G;
(2018)
Tiresias: Predicting Security Events Through Deep Learning.
In:
CCS '18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 592-605).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Sidebottom, A;
Kuo, T;
Mori, T;
Li, J;
Farrell, G;
(2018)
The East Asian crime drop?
Crime Science
, 7
, Article 6. 10.1186/s40163-018-0080-x.
|
Sidebottom, AL;
Tilley, N;
Johnson, S;
Bowers, K;
Tompson, L;
Thornton, A;
Bullock, K;
(2018)
Gating Alleys to Reduce Crime: A Meta-Analysis and Realist Synthesis.
Justice Quarterly
, 35
(1)
pp. 55-86.
10.1080/07418825.2017.1293135.
|
Silver, J;
Horgan, J;
Gill, P;
(2018)
Foreshadowing targeted violence: Assessing leakage of intent by public mass murderers.
Aggression and Violent Behavior
, 38
pp. 94-100.
10.1016/j.avb.2017.12.002.
|
Simon, M;
Schwartz, C;
Hudson, D;
Johnson, SD;
(2018)
A data-driven computational model on the effects of immigration policies.
Proceedings of the National Academy of Sciences of the United States of America
, 115
(34)
E7914-E7923.
10.1073/pnas.1800373115.
|
Smit, NM;
Morgan, RM;
Lagnado, DA;
(2018)
A systematic analysis of misleading evidence in unsafe rulings in England and Wales.
Science & Justice
, 58
(2)
pp. 128-137.
10.1016/j.scijus.2017.09.005.
|
Solymosi, R;
Bowers, KJ;
Fujiyama, T;
(2018)
Crowdsourcing Subjective Perceptions of Neighbourhood Disorder: Interpreting Bias in Open Data.
British Journal Of Criminology
, 58
(4)
pp. 944-967.
10.1093/bjc/azx048.
|
Sombatruang, N;
Kadobayashi, Y;
Sasse, MA;
Baddeley, M;
Miyamoto, D;
(2018)
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan.
In:
2018 16th Annual Conference on Privacy, Security and Trust (PST) proceedings.
IEEE: Belfast, UK.
|
Suchotzki, K;
De Houwer, J;
Kleinberg, B;
Verschuere, B;
(2018)
Using more different and more familiar targets improves the detection of concealed information.
Acta Psychologica
, 185
pp. 65-71.
10.1016/j.actpsy.2018.01.010.
|
T
Tan, B;
Chen, Q;
Chetty, K;
Woodbridge, K;
(2018)
Monitoring Health Using Wifi Sensing and Machine Learning.
EngineerIT
, 2018
(March)
|
Tan, B;
Chen, Q;
Chetty, K;
Woodbridge, K;
Li, W;
Piechocki, R;
(2018)
Exploiting WiFi Channel State Information for Residential Healthcare Informatics.
IEEE Communications Magazine
, 56
(5)
pp. 130-137.
10.1109/MCOM.2018.1700064.
|
Tanczer, LM;
Blythe, JM;
Yahya, F;
Brass, I;
Elsden, M;
Blackstock, J;
Carr, M;
(2018)
Review of International Developments on the Security of the Internet of Things.
PETRAS IoT Hub: London, UK.
|
Thornton, A;
(2018)
Flipped learning for first years: The key to successful engagement or disaster waiting to happen?
Presented at: UCL Education Conference 2018, London, UK.
|
Thornton, A;
Borrion, H;
(2018)
The Design of a Professional Practice Module for Security and Crime Science.
Presented at: ISEE 2018: The 7th International Symposium of Engineering Education, London, UK.
|
Tilley, N;
(2018)
Privatizing Crime Control.
Annals of the American Academy of Political and Social Science
, 679
(1)
pp. 55-71.
10.1177/0002716218775045.
|
Tilley, N;
Laycock, G;
(2018)
Developing a Knowledge Base for Crime Prevention: Lessons Learned From the British Experience.
Crime Prevention and Community Safety
, 20
(4)
pp. 228-242.
10.1057/s41300-018-0053-8.
|
Tiratelli, M;
Quinton, P;
Bradford, B;
(2018)
Does Stop and Search Deter Crime? Evidence from Ten Years of London-Wide Data.
The British Journal of Criminology
, 58
(5)
pp. 1212-1231.
10.1093/bjc/azx085.
|
Tompson, LA;
Schucan Bird, K;
(2018)
Updating the Crime Reduction Toolkit: A report and manual.
UCL, Department of Security and Crime Science: London, UK.
|
Tripathi, Kartikeya;
(2018)
Study of deviation from security procedures by train drivers: a mixed-methods approach.
Doctoral thesis (Ph.D), UCL (University College London).
|
Tseloni, A;
Tilley, N;
Farrell, G;
(2018)
Victimization Surveys in Environmental Criminology.
In: Bruinsma, GJN and Johnson, SD, (eds.)
The Oxford Handbook of Environmental Criminology.
(pp. 273-292).
Oxford University Press: Oxford, UK.
|
Tuptuk, N;
Hailes, S;
(2018)
Security of smart manufacturing systems.
Journal of Manufacturing Systems
, 47
pp. 93-106.
10.1016/j.jmsy.2018.04.007.
|
U
Umar, F;
Johnson, SD;
Cheshire, JA;
(2018)
Testing theories of social disorganization in Nigeria.
In: Bruinsma, GJN and Johnson, SD, (eds.)
The Oxford Handbook of Environmental Criminology.
Oxford University Press: Oxford, UK.
|
W
Weir, CAF;
Blair, L;
Noble, J;
Becker, I;
Sasse, MA;
(2018)
Light-Touch Interventions to Improve Software Development Security.
In: Doyle, Dinara and Lerner, Lee W, (eds.)
Proceedings of the IEEE Cybersec Developmental Conference (SecDev '18).
IEEE Xplore: Piscataway, NJ, USA.
|
White, S;
Hirst, C;
Smith, SE;
(2018)
The Suitability of 3D Data: 3D Digitisation of Human Remains.
Archaeologies
, 14
(2)
pp. 250-271.
10.1007/s11759-018-9347-9.
|
Wortley, RK;
(2018)
Psychology.
In:
Routledge Handbook of Crime Science.
Routledge: London, UK.
|
Wortley, RK;
Sidebottom, A;
Tilley, N;
Laycock, G;
(2018)
Future Directions for Crime Science.
In:
Routledge Handbook of Crime Science.
Routledge: London, UK.
|
Wortley, RK;
Sidebottom, A;
Tilley, N;
Laycock, G;
(2018)
What is Crime Science?
In:
Routledge Handbook of Crime Science.
Routledge: London, UK.
|
Z
Zolghadriha, Sanaz;
(2018)
The Investigation of Organised Crime Networks.
Doctoral thesis (Ph.D), UCL (University College London).
|