Ali Abdallah
Ali Abdallah
Professor of Information Security
Bestätigte E-Mail-Adresse bei bcu.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
662010
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big Data Analytics 1 (1), 6, 2016
622016
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah, CB Jones
Springer Science & Business Media, 2005
49*2005
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
412010
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
IFIP World Computer Congress, TC 1, 233-246, 2004
392004
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
International Conference on Mathematics of Program Construction, 67-96, 1995
311995
Formal z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
242006
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
ACS/IEEE International Conference on Computer Systems and Applications …, 2003
232003
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
232003
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
191999
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
European Conference on Parallel Processing, 911-920, 1996
191996
A round-based data replication strategy
M Bsoul, AE Abdallah, K Almakadmeh, N Tahat
IEEE Transactions on Parallel and Distributed Systems 27 (1), 31-39, 2015
182015
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
182010
A user-friendly approach to computational grid security
B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ...
Proceedings of the UK e-Science All Hands Meeting 2006, 2006
172006
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
162017
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
162009
Mapping high-level algorithms onto massively parallel reconfigurable hardware
I Damaj, J Hawkins, A Abdallah
IEEE international conference of computer systems and applications, 14-22, 2003
132003
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
122017
On the use of fingernail images as transient biometric identifiers
IB Barbosa, T Theoharis, AE Abdallah
Machine Vision and Applications 27 (1), 65-76, 2016
112016
Abstractions of web services
AN Haidar, AE Abdallah
2009 14th IEEE International Conference on Engineering of Complex Computer …, 2009
112009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20