Volgen
Noor Shirazi
Titel
Geciteerd door
Geciteerd door
Jaar
The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective
SN Shirazi, A Gouglidis, A Farshad, D Hutchison
IEEE Journal on Selected Areas in Communications 35 (11), 2586-2595, 2017
2512017
Malware Detection in Cloud Computing Infrastructures
M Watson, S Noorulhassan, A Marnerides, A Mauthe, D Hutchison
IEEE Transaction on Dependable and Secure Computing, 1, 2015
1762015
Evaluation of anomaly detection techniques for scada communication resilience
SN Shirazi, A Gouglidis, KN Syeda, S Simpson, A Mauthe, ...
2016 Resilience Week (RWS), 140-145, 2016
532016
Assessing the impact of intra-cloud live migration on anomaly detection
NH Shirazi, S Simpson, AK Marnerides, M Watson, A Mauthe, ...
Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, 52-57, 2014
482014
An inter-domain collaboration scheme to remedy DDoS attacks in computer networks
S Simpson, SN Shirazi, A Marnerides, S Jouet, D Pezaros, D Hutchison
IEEE Transactions on Network and Service Management 15 (3), 879-893, 2018
402018
Malware analysis in cloud computing: Network and system characteristics
AK Marnerides, MR Watson, N Shirazi, A Mauthe, D Hutchison
2013 IEEE globecom workshops (GC Wkshps), 482-487, 2013
392013
Evading virus detection using code obfuscation
K Murad, SNH Shirazi, YB Zikria, N Ikram
Future Generation Information Technology: Second International Conference …, 2010
282010
Towards a distributed, self-organising approach to malware detection in cloud computing
MR Watson, S Noorulhassan, AK Marnerides, A Mauthe, D Hutchison
Self-Organizing Systems, 182-185, 2014
212014
A framework for resilience management in the cloud
S Noorulhassan, S Simpson, S Oechsner, A Mauthe, D Hutchison
e & i Elektrotechnik und Informationstechnik 132 (2), 122-132, 2015
14*2015
Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics
IM Stephanakis, IP Chochliouros, E Sfakianakis, SN Shirazi, D Hutchison
Information Sciences 494, 247-277, 2019
132019
Anomaly detection in the cloud using data density
SN Shirazi, S Simpson, A Gouglidis, A Mauthe, D Hutchison
2016 IEEE 9th international conference on cloud computing (CLOUD), 616-623, 2016
112016
A multi-level approach to resilience of critical infrastructures and services
A Gouglidis, SN Shirazi, S Simpson, P Smith, D Hutchison
2016 23rd International Conference on Telecommunications (ICT), 1-5, 2016
102016
A multi-level approach to resilience of critical infrastructures and services
A Gouglidis, SN Shirazi, S Simpson, P Smith, D Hutchison
2016 23rd International Conference on Telecommunications (ICT), 1-5, 2016
102016
Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks
S Shirazi, A Schaeffer-Filho, D Hutchison
Cyberpatterns, 125-134, 2014
62014
Big data and natural language processing for analysing railway safety: Analysis of railway incident reports
KN Syeda, SN Shirazi, SAA Naqvi, HJ Parkinson, G Bamford
Human Performance Technology: Concepts, Methodologies, Tools, and …, 2019
52019
Exploiting Natural Language Processing for Analysing Railway Incident Reports
KN Syeda, SN Shirazi, SAA Naqvi, HJ Parkinson
IGI Glob. Publ., 1-18, 2017
52017
Syed Noor ul Hassan Shirazi, Steven Simpson, and Paul Smith. Whitepaper “AF 1.0” SECCRIT Architectural Framework
R Bless, M Flittner, J Horneber, D Hutchison, C Jung, F Pallas, M Schöller
52014
SECCRIT Deliverable D3. 1 Methodology for Risk Assessment and Management
P Smith, J Busby, L Langer, M Schöller, N Shirazi
52013
Service level agreement monitoring for resilience in computer networks
SNUH Shirazi, A Schaeffer-Filho, D Hutchison
Liverpool John Moores University, 2012
52012
Towards resilience metrics for future cloud applications
M Novak, SNUH Shirazi, A Hudic, T Hecht, M Tauber, D Hutchison, ...
SCITEPRESS–Science and Technology Publications, 2016
42016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20