Follow
Ali Abdallah
Ali Abdallah
Professor of Information Security
Verified email at bcu.ac.uk
Title
Cited by
Cited by
Year
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
2752019
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big data analytics 1 (1), 6, 2016
1792016
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
742010
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah
Springer Science & Business Media, 2005
622005
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
512010
Securing microservices
A Nehme, V Jesus, K Mahbub, A Abdallah
IT Professional 21 (1), 42-49, 2019
492019
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
IFIP World Computer Congress, TC 1, 233-246, 2004
442004
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018 (1), 9634507, 2018
402018
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
International Conference on Mathematics of Program Construction, 67-96, 1995
351995
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
312017
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
282017
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
272009
Formal Z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
272006
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003
252003
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
252003
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
Euro-Par'96 Parallel Processing: Second International Euro-Par Conference …, 1996
221996
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
211999
On the use of fingernail images as transient biometric identifiers: Biometric recognition using fingernail images
I Barros Barbosa, T Theoharis, AE Abdallah
Machine Vision and Applications 27, 65-76, 2016
192016
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
182010
Fine-grained access control for microservices
A Nehme, V Jesus, K Mahbub, A Abdallah
Foundations and Practice of Security: 11th International Symposium, FPS 2018 …, 2019
172019
The system can't perform the operation now. Try again later.
Articles 1–20