An exploration of the current state of information assurance education S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ... ACM SIGCSE Bulletin 41 (4), 109-125, 2010 | 67 | 2010 |
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis IA Gheyas, AE Abdallah Big Data Analytics 1 (1), 1-29, 2016 | 66 | 2016 |
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers AE Abdallah, CB Jones Springer Science & Business Media, 2005 | 50 | 2005 |
Threat modeling approaches and tools for securing architectural designs of an e-banking application C Möckel, AE Abdallah 2010 Sixth International Conference on Information Assurance and Security …, 2010 | 41 | 2010 |
A formal model for parameterized role-based access control AE Abdallah, EJ Khayat IFIP World Computer Congress, TC 1, 233-246, 2004 | 40 | 2004 |
Derivation of parallel algorithms from functional specifications to CSP processes AE Abdallah International Conference on Mathematics of Program Construction, 67-96, 1995 | 31 | 1995 |
Formal z specifications of several flat role-based access control models AE Abdallah, EJ Khayat 2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006 | 25 | 2006 |
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications AE Abdallah, J Hawkins 36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003 | 25 | 2003 |
A formal model for flat role-based access control EJ Khayat, AE Abdallah Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003 | 22 | 2003 |
Cyber threat intelligence sharing: Survey and research directions TD Wagner, K Mahbub, E Palomar, AE Abdallah Computers & Security 87, 101589, 2019 | 20 | 2019 |
A round-based data replication strategy M Bsoul, AE Abdallah, K Almakadmeh, N Tahat IEEE Transactions on Parallel and Distributed Systems 27 (1), 31-39, 2015 | 19 | 2015 |
Formal modelling of pki based authentication AN Haidar, AE Abdallah Electronic Notes in Theoretical Computer Science 235, 55-70, 2009 | 19 | 2009 |
Functional process modelling A Abdallah Research Directions in Parallel Functional Programming, 339-360, 1999 | 19 | 1999 |
Formal modelling of a usable identity management solution for virtual organisations AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ... arXiv preprint arXiv:1001.5050, 2010 | 18 | 2010 |
Synthesis of massively pipelined algorithms for list manipulation AE Abdallah European Conference on Parallel Processing, 911-920, 1996 | 18 | 1996 |
A trust management framework for network applications within an SDN environment AL Aliyu, P Bull, A Abdallah 2017 31st International Conference on Advanced Information Networking and …, 2017 | 17 | 2017 |
A user-friendly approach to computational grid security B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ... Proceedings of the UK e-Science All Hands Meeting 2006, 2006 | 17 | 2006 |
Performance implication and analysis of the OpenFlow SDN protocol AL Aliyu, P Bull, A Abdallah 2017 31st International Conference on Advanced Information Networking and …, 2017 | 13 | 2017 |
Mapping high-level algorithms onto massively parallel reconfigurable hardware I Damaj, J Hawkins, A Abdallah IEEE international conference of computer systems and applications, 14-22, 2003 | 13 | 2003 |
A novel trust taxonomy for shared cyber threat intelligence TD Wagner, E Palomar, K Mahbub, AE Abdallah Security and Communication Networks 2018, 2018 | 12 | 2018 |