User profiles for Ali E. Abdallah

Ali Abdallah

Professor of Information Security
Verified email at bcu.ac.uk
Cited by 1486

Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
… The stakeholders were able to promptly mitigate the risk by blocking the e-mail and link. …
The relation between SPAM and CTI is that stakeholders do not want to receive SPAM e-mails, …

Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis

IA Gheyas, AE Abdallah - Big data analytics, 2016 - Springer
Cyber security is vital to the success of today’s digital economy. The major security threats
are coming from within, as opposed to outside forces. Insider threat detection and prediction …

A novel trust taxonomy for shared cyber threat intelligence

…, E Palomar, K Mahbub, AE Abdallah - Security and …, 2018 - Wiley Online Library
Cyber threat intelligence sharing has become a focal point for many organizations to improve
resilience against cyberattacks. The objective lies in sharing relevant information achieved …

Threat modeling approaches and tools for securing architectural designs of an e-banking application

C Möckel, AE Abdallah - 2010 Sixth International Conference …, 2010 - ieeexplore.ieee.org
Software is the most important line of defense for protecting critical information assets such
as in e-banking. The continuous increase in sophistication and in volume of cyber security …

[BOOK][B] Communicating Sequential Processes. The First 25 Years: Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited …

AE Abdallah - 2005 - books.google.com
This volume, like the symposium CSP25 which gave rise to it, commemorates the semi-jubilee
of Communicating Sequential Processes. 1 Tony Hoare’s paper “Communicating …

A formal model for parameterized role-based access control

AE Abdallah, EJ Khayat - IFIP World Computer Congress, TC 1, 2004 - Springer
Role-Based Access Control (RBAC) usually enables a higher level view of authorization. In
this model, access permissions are assigned to roles and, in turn, roles are allocated to …

Formal modelling of pki based authentication

AN Haidar, AE Abdallah - Electronic Notes in Theoretical Computer Science, 2009 - Elsevier
One of the main aims of certificate based Public Key Infrastructure (PKI) is to provide authentication
in distributed systems. Through its functions, PKI authentication can be viewed as a re…

On the use of fingernail images as transient biometric identifiers: Biometric recognition using fingernail images

I Barros Barbosa, T Theoharis, AE Abdallah - Machine Vision and …, 2016 - Springer
The significant advantages that biometric recognition technologies offer are in danger of
being left aside in everyday life due to concerns over the misuse of such data. The biometric …

Towards an anonymity supported platform for shared cyber threat intelligence

…, E Palomar, K Mahbub, AE Abdallah - Risks and Security of …, 2018 - Springer
Over the last few years, cyber defense strategies in large organizations have gradually
shifted from being reactive to being increasingly pro-active. In the latter mode threats are …

Relevance filtering for shared cyber threat intelligence (short paper)

…, E Palomar, K Mahbub, AE Abdallah - … Security Practice and …, 2017 - Springer
Cyber threat intelligence sharing is an imperative process to survive current and future
attacks. The received information may protect stakeholders from being attacked by utilizing the …