default search action
Thomas Welsh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Thomas Welsh, Faeq Alrimawi, Ali Farahani, Diane Hassett, Andrea Zisman, Bashar Nuseibeh:
Topology-Aware Adaptive Inspection for Fraud in I4.0 Supply Chains. IEEE Trans. Ind. Informatics 19(4): 5656-5666 (2023) - 2021
- [j8]Thomas Welsh, Elhadj Benkhelifa:
On Resilience in Cloud Computing: A Survey of Techniques across the Cloud Domain. ACM Comput. Surv. 53(3): 59:1-59:36 (2021) - [c16]Cristiano Storni, Damyanka Tsvyatkova, Ita Richardson, Jim Buckley, Manzar Abbas, Sarah Beecham, Muslim Chochlov, Brian Fitzgerald, Liam Glynn, Kevin Johnson, John Laffey, Bairbre McNicholas, Bashar Nuseibeh, James O'Connell, Derek T. O'Keeffe, Ian R. O'Keeffe, Mike O'Callaghan, Abdul Razzaq, Kaavya Rekanar, Andrew J. Simpkin, Jane Walsh, Thomas Welsh:
Toward a Compare and Contrast Framework for COVID-19 Contact Tracing Mobile Applications: A Look at Usability. HEALTHINF 2021: 557-565 - [c15]Thomas Welsh, Faeq Alrimawi, Ali Farahani, Diane Hassett, Andrea Zisman, Bashar Nuseibeh:
Towards Adaptive Inspection for Fraud in I4.0 Supply Chains. ETFA 2021: 1-8 - [c14]Thomas Welsh, Elhadj Benkhelifa:
The Resilient Edge: Evaluating Graph-based Metrics for Decentralised Service Delivery. FMEC 2021: 1-7 - [c13]Ali Farahani, Liliana Pasquale, Amel Bennaceur, Thomas Welsh, Bashar Nuseibeh:
On Adaptive Fairness in Software Systems. SEAMS@ICSE 2021: 97-103 - [i1]Ali Farahani, Liliana Pasquale, Amel Bennaceur, Thomas Welsh, Bashar Nuseibeh:
On Adaptive Fairness in Software Systems. CoRR abs/2104.02414 (2021) - 2020
- [b1]Thomas Welsh:
An embryonics inspired architecture for resilient decentralised cloud service delivery. Staffordshire University, UK, 2020 - [j7]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh:
Automated negotiated user profiling across distributed social mobile clouds for resource optimisation. Concurr. Comput. Pract. Exp. 32(1) (2020) - [c12]Thomas Welsh, Kaavya Rekanar, Manzar Abbas, Muslim Chochlov, Brian Fitzgerald, Liam Glynn, Kevin Johnson, John Laffey, Bairbre McNicholas, Bashar Nuseibeh, James O'Connell, Derek T. O'Keeffe, Ian R. O'Keeffe, Mike O'Callaghan, Abdul Razzaq, Ita Richardson, Andrew J. Simpkin, Cristiano Storni, Damyanka Tsvyatkova, Jane Walsh, Jim Buckley:
Towards a Taxonomy for Evaluating Societal Concerns of Contact Tracing Apps. BESC 2020: 1-6
2010 – 2019
- 2019
- [j6]Elhadj Benkhelifa, Anoud Bani-Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guégan:
Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures. IEEE Access 7: 108660-108676 (2019) - [j5]Thomas Welsh, Elhadj Benkhelifa:
Bioinspired Multiagent Embryonic Architecture for Resilient Edge Networks. IEEE Trans. Ind. Informatics 15(12): 6344-6353 (2019) - [c11]Thomas Welsh:
A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment. ICGS3 2019 - 2018
- [j4]Elhadj Benkhelifa, Thomas Welsh, Walaa Hamouda:
A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems. IEEE Commun. Surv. Tutorials 20(4): 3496-3509 (2018) - [c10]Thomas Welsh, Elhadj Benkhelifa:
Embyronic model for highly resilient PaaS. SDS 2018: 197-204 - 2017
- [c9]Thomas Welsh, Elhadj Benkhelifa:
Perspectives on Resilience in Cloud Computing: Review and Trends. AICCSA 2017: 696-703 - [c8]Adeyinka Odebade, Thomas Welsh, Siyakha Mthunzi, Elhadj Benkhelifa:
Mitigating anti-forensics in the Cloud via resource-based privacy preserving activity attribution. SDS 2017: 143-149 - 2016
- [j3]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh, Anas Basalamah:
Energy Optimisation for Mobile Device Power Consumption: A Survey and a Unified View of Modelling for a Comprehensive Network Simulation. Mob. Networks Appl. 21(4): 575-588 (2016) - [c7]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh, Mahmoud Al-Ayyoub:
Leveraging Software-Defined-Networking for Energy Optimisation in Mobile-Cloud-Computing. FNC/MobiSPC 2016: 479-484 - [c6]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Ali Tawalbeh, Abdallah Khreishah, Yaser Jararweh, Mahmoud Al-Ayyoub:
GA-Based Resource Augmentation Negotation for Energy-Optimised Mobile Ad-hoc Cloud. MobileCloud 2016: 110-116 - 2015
- [c5]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Ali Tawalbeh, Yaser Jararweh, Anas Basalamah:
User Profiling for Energy Optimisation in Mobile Cloud Computing. ANT/SEIT 2015: 1159-1165 - 2014
- [c4]Elhadj Benkhelifa, Elliott Rowe, Robert Kinmond, Oluwasegun A. Adedugbe, Thomas Welsh:
Exploiting Social Networks for the Prediction of Social and Civil Unrest: A Cloud Based Framework. FiCloud 2014: 565-572 - [c3]Elhadj Benkhelifa, Thomas Welsh:
Towards Malware Inspired Cloud Self-Protection. ICCAC 2014: 1-2 - 2013
- [j2]Elhadj Benkhelifa, Dayan Abishek Fernando, Thomas Welsh:
A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization. Int. J. Cloud Appl. Comput. 3(3): 34-49 (2013) - [c2]Elhadj Benkhelifa, Thomas Welsh:
Security testing in the cloud by means of ethical worm. GLOBECOM Workshops 2013: 500-505 - [c1]Elhadj Benkhelifa, Thomas Welsh:
A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction. ICITST 2013: 142-148
1990 – 1999
- 1996
- [j1]Thomas Welsh, Roger Smith, Haruo Azami, Raymond Chrisner:
The FLAG cable system. IEEE Commun. Mag. 34(2): 30-35 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint