Follow
Dr Nawfal Fadhel
Dr Nawfal Fadhel
Verified email at soton.ac.uk - Homepage
Title
Cited by
Cited by
Year
Component for 3d printing provenance framework: Security properties components for provenance framework
NF Fadhel, RM Crowder, F Akeel, GB Wills
World Congress on Internet Security (WorldCIS-2014), 91-96, 2014
92014
Provenance in the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
IFAC-PapersOnLine 48 (3), 2345-2350, 2015
82015
Transparent authentication in e-learning
NF Fadhel, GB Wills, D Argles
International Conference on Information Society (i-Society 2011), 336-342, 2011
82011
Approaches to maintaining provenance throughout the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
World Congress on Internet Security (WorldCIS-2013), 82-87, 2013
72013
Towards a semantic modelling for threat analysis of IoT applications: A case study on transactive energy
N Fadhel, F Lombardi, L Aniello, A Margheri, V Sassone
IET Digital Library, 2019
52019
Towards a framework for securing a document outside an organisational firewall
ZS Aaber, RM Crowder, VI Chang, NF Fadhel, GB Wills
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
42014
Preventing document leakage through active document
ZS Aaber, RM Crowder, NF Fadhel, GB Wills
World Congress on Internet Security (WorldCIS-2014), 53-58, 2014
42014
Anomaly detection system: Towards a framework for enterprise log management of security services
O Ozulku, NF Fadhel, D Argles, GB Wills
World Congress on Internet Security (WorldCIS-2014), 97-102, 2014
42014
Maintaining provenance throughout the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
Int. J. Inf. Secur 3, 466-475, 2013
42013
Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model
HF Atlam, MA Azad, NF Fadhel
Sensors 22 (5), 2005, 2022
22022
Identifying Food Fraud using Blockchain.
HW Leung, A Chapman, NF Fadhel
IoTBDS, 185-192, 2021
12021
Role of Blockchain and AI in Security and Privacy of 6G
HF Atlam, MA Azad, M Altamimi, N Fadhel
AI and Blockchain Technology in 6G Wireless Network, 93-115, 2022
2022
Malicious activity detection using smart contracts in IoT.
N Fadhel, H F Atlam, E Mwangi
2021
Malicious Activity Detection using Smart Contracts in IoT.
M Eric, HF Atlam, NF Fadhel
IoTBDS, 286-295, 2021
2021
Investigating trusted records for employment and education
R Ghamri, S Mohamed, N Fadhel, G Wills
2020
Provenance Framework for Additive Manufacturing
NF Fadhel
Original typescript, 2018
2018
Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data
ME Ali, FY Akeel, NF Fadhel, GB Wills
The 9th International Conference for Internet Technology and Secured …, 2014
2014
Transparent Authentication Methodology in Electronic Education
N Fadhel, D Argles, RM Crowder, GB Wills
Engineering Management Reviews 3, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–18