Browse by Aston Author

Up a level
Export as [feed] Atom [feed] RSS
Group by: Item Type | Date | No Grouping
Jump to: Article
Number of items: 8.


Ersotelos, Nikolaos, Bottarelli, Mirko, Al-Khateeb, Haider, Epiphaniou, Gregory, Alhaboby, Zhraa A., Pillai, Prashant and Aggoun, Amar (2020). Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study. Journal of Sensor and Actuator Networks, 10 (1),

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Epiphaniou, Gregory and Maple, Carsten (2020). Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities, 3 (3), pp. 894-927.

Walshe, Marcus, Epiphaniou, Gregory, Al-Khateeb, Haider, Hammoudeh, Mohammed, Katos, Vasilios and Dehghantanha, Ali (2019). Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks, 95 ,

Frommholz, Ingo, Al-Khateeb, Haider, Potthast, Martin, Ghasem, Zinnar, Shukla, Mitul and Short, Emma (2016). On Textual Analysis and Machine Learning for Cyberstalking Detection. Datenbank-Spektrum, 16 , 127–135.

Ahmadi-Assalemi, Gabriela, Al-Khateeb, Haider, Maple, Carsten, Epiphaniou, Gregory, Hammoudeh, Mohammad, Jahankhani, Hamid and Pillai, Prashant (2021). Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Computers and Electrical Engineering, 91 ,

Bottarelli, Mirko, Epiphaniou, Gregory, Ismail, Dhouha Kbaier Ben, Karadimas, Petros and Al-Khateeb, Haider (2018). Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. Computers & Security, 78 , pp. 454-476.

Mackintosh, Mike, Epiphaniou, Gregory, Al-Khateeb, Haider, Burnham, Keith, Pillai, Prashant and Hammoudeh, Mohammad (2019). Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems. Journal of Sensor and Actuator Networks, 8 (1),

Bold, Robert, Al-Khateeb, Haider and Ersotelos, Nikolaos (2022). Reducing False Negatives in Ransomware Detection: A Critical Evaluation of Machine Learning Algorithms. Applied Sciences, 12 (24),

This list was generated on Sat Jan 28 03:22:02 2023 GMT.