Volgen
Ali Abdallah
Ali Abdallah
Professor of Information Security
Geverifieerd e-mailadres voor bcu.ac.uk
Titel
Geciteerd door
Geciteerd door
Jaar
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big data analytics 1 (1), 1-29, 2016
1102016
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
1052019
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
712010
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah
Springer Science & Business Media, 2005
582005
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
452010
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
IFIP World Computer Congress, TC 1, 233-246, 2004
422004
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
International Conference on Mathematics of Program Construction, 67-96, 1995
331995
Securing microservices
A Nehme, V Jesus, K Mahbub, A Abdallah
IT Professional 21 (1), 42-49, 2019
282019
Formal Z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
272006
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
252017
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
252003
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
232009
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003
232003
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018, 2018
212018
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
European Conference on Parallel Processing, 911-920, 1996
201996
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
191999
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
182010
A user-friendly approach to computational grid security
B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ...
Proceedings of the UK e-Science All Hands Meeting 2006, 2006
162006
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
152017
On the use of fingernail images as transient biometric identifiers
I Barros Barbosa, T Theoharis, AE Abdallah
Machine Vision and Applications 27 (1), 65-76, 2016
142016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20