Ali Abdallah
Ali Abdallah
Professor of Information Security
Verified email at
Cited by
Cited by
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big data analytics 1 (1), 6, 2016
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah
Springer Science & Business Media, 2005
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
Securing microservices
A Nehme, V Jesus, K Mahbub, A Abdallah
IT Professional 21 (1), 42-49, 2019
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
IFIP World Computer Congress, TC 1, 233-246, 2004
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018, 2018
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
International Conference on Mathematics of Program Construction, 67-96, 1995
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
Formal z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
Euro-Par'96 Parallel Processing: Second International Euro-Par Conference …, 1996
On the use of fingernail images as transient biometric identifiers: Biometric recognition using fingernail images
I Barros Barbosa, T Theoharis, AE Abdallah
Machine Vision and Applications 27, 65-76, 2016
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
A user-friendly approach to computational grid security
B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ...
Proceedings of the UK e-Science All Hands Meeting 2006, 2006
The system can't perform the operation now. Try again later.
Articles 1–20