User profiles for Ali E. Abdallah
Ali AbdallahProfessor of Information Security Verified email at bcu.ac.uk Cited by 1486 |
Cyber threat intelligence sharing: Survey and research directions
… The stakeholders were able to promptly mitigate the risk by blocking the e-mail and link. …
The relation between SPAM and CTI is that stakeholders do not want to receive SPAM e-mails, …
The relation between SPAM and CTI is that stakeholders do not want to receive SPAM e-mails, …
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis
IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
Cyber security is vital to the success of today’s digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …
are coming from within, as opposed to outside forces. Insider threat detection and prediction …
A novel trust taxonomy for shared cyber threat intelligence
Cyber threat intelligence sharing has become a focal point for many organizations to improve
resilience against cyberattacks. The objective lies in sharing relevant information achieved …
resilience against cyberattacks. The objective lies in sharing relevant information achieved …
Threat modeling approaches and tools for securing architectural designs of an e-banking application
C Möckel, AE Abdallah - 2010 Sixth International Conference …, 2010 - ieeexplore.ieee.org
Software is the most important line of defense for protecting critical information assets such
as in e-banking. The continuous increase in sophistication and in volume of cyber security …
as in e-banking. The continuous increase in sophistication and in volume of cyber security …
[BOOK][B] Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited …
AE Abdallah - 2005 - books.google.com
This volume, like the symposium CSP25 which gave rise to it, commemorates the semi-jubilee
of Communicating Sequential Processes. 1 Tony Hoare’s paper “Communicating …
of Communicating Sequential Processes. 1 Tony Hoare’s paper “Communicating …
A formal model for parameterized role-based access control
AE Abdallah, EJ Khayat - IFIP World Computer Congress, TC 1, 2004 - Springer
Role-Based Access Control (RBAC) usually enables a higher level view of authorization. In
this model, access permissions are assigned to roles and, in turn, roles are allocated to …
this model, access permissions are assigned to roles and, in turn, roles are allocated to …
Formal modelling of pki based authentication
AN Haidar, AE Abdallah - Electronic Notes in Theoretical Computer Science, 2009 - Elsevier
One of the main aims of certificate based Public Key Infrastructure (PKI) is to provide authentication
in distributed systems. Through its functions, PKI authentication can be viewed as a re…
in distributed systems. Through its functions, PKI authentication can be viewed as a re…
On the use of fingernail images as transient biometric identifiers: Biometric recognition using fingernail images
The significant advantages that biometric recognition technologies offer are in danger of
being left aside in everyday life due to concerns over the misuse of such data. The biometric …
being left aside in everyday life due to concerns over the misuse of such data. The biometric …
Towards an anonymity supported platform for shared cyber threat intelligence
Over the last few years, cyber defense strategies in large organizations have gradually
shifted from being reactive to being increasingly pro-active. In the latter mode threats are …
shifted from being reactive to being increasingly pro-active. In the latter mode threats are …
Relevance filtering for shared cyber threat intelligence (short paper)
Cyber threat intelligence sharing is an imperative process to survive current and future
attacks. The received information may protect stakeholders from being attacked by utilizing the …
attacks. The received information may protect stakeholders from being attacked by utilizing the …