Ali Abdallah
Ali Abdallah
Professor of Information Security
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big Data Analytics 1 (1), 6, 2016
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah, CB Jones
Springer Science & Business Media, 2005
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
IFIP World Computer Congress, TC 1, 233-246, 2004
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
International Conference on Mathematics of Program Construction, 67-96, 1995
Formal z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
ACS/IEEE International Conference on Computer Systems and Applications …, 2003
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
European Conference on Parallel Processing, 911-920, 1996
A round-based data replication strategy
M Bsoul, AE Abdallah, K Almakadmeh, N Tahat
IEEE Transactions on Parallel and Distributed Systems 27 (1), 31-39, 2015
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
A user-friendly approach to computational grid security
B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ...
Proceedings of the UK e-Science All Hands Meeting 2006, 2006
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
Mapping high-level algorithms onto massively parallel reconfigurable hardware
I Damaj, J Hawkins, A Abdallah
IEEE international conference of computer systems and applications, 14-22, 2003
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
On the use of fingernail images as transient biometric identifiers
IB Barbosa, T Theoharis, AE Abdallah
Machine Vision and Applications 27 (1), 65-76, 2016
Abstractions of web services
AN Haidar, AE Abdallah
2009 14th IEEE International Conference on Engineering of Complex Computer …, 2009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20