Ali Abdallah
Ali Abdallah
Professor of Information Security
Verified email at bcu.ac.uk
Title
Cited by
Cited by
Year
An exploration of the current state of information assurance education
S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ...
ACM SIGCSE Bulletin 41 (4), 109-125, 2010
672010
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah
Big Data Analytics 1 (1), 1-29, 2016
662016
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers
AE Abdallah, CB Jones
Springer Science & Business Media, 2005
502005
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah
2010 Sixth International Conference on Information Assurance and Security …, 2010
412010
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat
IFIP World Computer Congress, TC 1, 233-246, 2004
402004
Derivation of parallel algorithms from functional specifications to CSP processes
AE Abdallah
International Conference on Mathematics of Program Construction, 67-96, 1995
311995
Formal z specifications of several flat role-based access control models
AE Abdallah, EJ Khayat
2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006
252006
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications
AE Abdallah, J Hawkins
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
252003
A formal model for flat role-based access control
EJ Khayat, AE Abdallah
Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003
222003
Cyber threat intelligence sharing: Survey and research directions
TD Wagner, K Mahbub, E Palomar, AE Abdallah
Computers & Security 87, 101589, 2019
202019
A round-based data replication strategy
M Bsoul, AE Abdallah, K Almakadmeh, N Tahat
IEEE Transactions on Parallel and Distributed Systems 27 (1), 31-39, 2015
192015
Formal modelling of pki based authentication
AN Haidar, AE Abdallah
Electronic Notes in Theoretical Computer Science 235, 55-70, 2009
192009
Functional process modelling
A Abdallah
Research Directions in Parallel Functional Programming, 339-360, 1999
191999
Formal modelling of a usable identity management solution for virtual organisations
AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ...
arXiv preprint arXiv:1001.5050, 2010
182010
Synthesis of massively pipelined algorithms for list manipulation
AE Abdallah
European Conference on Parallel Processing, 911-920, 1996
181996
A trust management framework for network applications within an SDN environment
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
172017
A user-friendly approach to computational grid security
B Beckles, PV Coveney, PYA Ryan, AE Abdallah, SM Pickles, JM Brooke, ...
Proceedings of the UK e-Science All Hands Meeting 2006, 2006
172006
Performance implication and analysis of the OpenFlow SDN protocol
AL Aliyu, P Bull, A Abdallah
2017 31st International Conference on Advanced Information Networking and …, 2017
132017
Mapping high-level algorithms onto massively parallel reconfigurable hardware
I Damaj, J Hawkins, A Abdallah
IEEE international conference of computer systems and applications, 14-22, 2003
132003
A novel trust taxonomy for shared cyber threat intelligence
TD Wagner, E Palomar, K Mahbub, AE Abdallah
Security and Communication Networks 2018, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20