Ali Abdallah
Ali Abdallah
Professor of Information Security
Verified email at bcu.ac.uk
Title
Cited by
Cited by
Year
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big Data Analytics 1 (1), 1-29, 2016
852016
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
672010
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah, CB Jones
Springer Science & Business Media, 2005
542005
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
442019
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
422010
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
IFIP World Computer Congress, TC 1, 233-246, 2004
412004
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
International Conference on Mathematics of Program Construction, 67-96, 1995
321995
Formal Z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
252006
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
252003
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
232009
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003
232003
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
192017
A round-based data replication strategy
M Bsoul, AE Abdallah, K Almakadmeh, N Tahat
IEEE Transactions on Parallel and Distributed Systems 27 (1), 31-39, 2015
192015
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
191999
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
European Conference on Parallel Processing, 911-920, 1996
191996
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018, 2018
172018
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
172010
A user-friendly approach to computational grid security
B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ...
Proceedings of the UK e-Science All Hands Meeting 2006, 2006
162006
Securing microservices
A Nehme, V Jesus, K Mahbub, A Abdallah
IT Professional 21 (1), 42-49, 2019
152019
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
142017
The system can't perform the operation now. Try again later.
Articles 1–20