Follow
Ali Abdallah
Ali Abdallah
Professor of Information Security
Verified email at bcu.ac.uk
Title
Cited by
Cited by
Year
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
1252019
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big data analytics 1 (1), 1-29, 2016
1162016
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
702010
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah
Springer Science & Business Media, 2005
602005
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
462010
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005
422005
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
Mathematics of Program Construction: Third International Conference, MPC'95 …, 2005
362005
Securing microservices
A Nehme, V Jesus, K Mahbub, A Abdallah
IT Professional 21 (1), 42-49, 2019
312019
Formal Z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
262006
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003
252003
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
252003
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018, 2018
242018
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
242017
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
232009
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
Euro-Par'96 Parallel Processing: Second International Euro-Par Conference …, 1996
211996
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
191999
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
172010
A user-friendly approach to computational grid security
B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ...
Proceedings of the UK e-Science All Hands Meeting 2006, 2006
162006
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
152017
On the use of fingernail images as transient biometric identifiers: Biometric recognition using fingernail images
I Barros Barbosa, T Theoharis, AE Abdallah
Machine Vision and Applications 27, 65-76, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20