Cyber threat intelligence sharing: Survey and research directions TD Wagner, K Mahbub, E Palomar, AE Abdallah Computers & Security 87, 101589, 2019 | 316 | 2019 |
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis IA Gheyas, AE Abdallah Big data analytics 1 (1), 6, 2016 | 192 | 2016 |
An exploration of the current state of information assurance education S Cooper, C Nickell, V Piotrowski, B Oldfield, A Abdallah, M Bishop, ... ACM SIGCSE Bulletin 41 (4), 109-125, 2010 | 75 | 2010 |
Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers AE Abdallah Springer Science & Business Media, 2005 | 62 | 2005 |
Securing microservices A Nehme, V Jesus, K Mahbub, A Abdallah IT Professional 21 (1), 42-49, 2019 | 51 | 2019 |
Threat modeling approaches and tools for securing architectural designs of an e-banking application C Möckel, AE Abdallah 2010 Sixth International Conference on Information Assurance and Security …, 2010 | 51 | 2010 |
A formal model for parameterized role-based access control AE Abdallah, EJ Khayat IFIP World Computer Congress, TC 1, 233-246, 2004 | 46 | 2004 |
A novel trust taxonomy for shared cyber threat intelligence TD Wagner, E Palomar, K Mahbub, AE Abdallah Security and Communication Networks 2018 (1), 9634507, 2018 | 45 | 2018 |
Derivation of parallel algorithms from functional specifications to CSP processes AE Abdallah International Conference on Mathematics of Program Construction, 67-96, 1995 | 35 | 1995 |
A trust management framework for network applications within an SDN environment AL Aliyu, P Bull, A Abdallah 2017 31st International Conference on Advanced Information Networking and …, 2017 | 31 | 2017 |
Performance implication and analysis of the OpenFlow SDN protocol AL Aliyu, P Bull, A Abdallah 2017 31st International Conference on Advanced Information Networking and …, 2017 | 30 | 2017 |
Formal modelling of pki based authentication AN Haidar, AE Abdallah Electronic Notes in Theoretical Computer Science 235, 55-70, 2009 | 28 | 2009 |
Formal Z specifications of several flat role-based access control models AE Abdallah, EJ Khayat 2006 30th Annual IEEE/NASA Software Engineering Workshop, 282-292, 2006 | 27 | 2006 |
A formal model for flat role-based access control EJ Khayat, AE Abdallah Proceedings of the ACS/IEEE Conference on Computer Systems Applications …, 2003 | 25 | 2003 |
Formal behavioural synthesis of Handel-C parallel hardware implementations from functional specifications AE Abdallah, J Hawkins 36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003 | 25 | 2003 |
Synthesis of massively pipelined algorithms for list manipulation AE Abdallah Euro-Par'96 Parallel Processing: Second International Euro-Par Conference …, 1996 | 22 | 1996 |
On the use of fingernail images as transient biometric identifiers: Biometric recognition using fingernail images I Barros Barbosa, T Theoharis, AE Abdallah Machine Vision and Applications 27, 65-76, 2016 | 21 | 2016 |
Functional process modelling A Abdallah Research Directions in Parallel Functional Programming, 339-360, 1999 | 21 | 1999 |
Fine-grained access control for microservices A Nehme, V Jesus, K Mahbub, A Abdallah Foundations and Practice of Security: 11th International Symposium, FPS 2018 …, 2019 | 20 | 2019 |
Formal modelling of a usable identity management solution for virtual organisations AN Haidar, PV Coveney, AE Abdallah, PY Ryan, B Beckles, JM Brooke, ... arXiv preprint arXiv:1001.5050, 2010 | 18 | 2010 |