If you made any changes in Pure these will be visible here soon.

Research Output 1997 2017

Filter
Other
2013

A defense security approach for infrastructures against hacking

Alsunbul, S., Xiang, Y. (ed.), Le, P. D., Thuraisingham, B. (ed.), Tan, J. & Martinez, G. (ed.), 2013, p. 1600 - 1606. 7 p.

Research output: Contribution to conferenceOtherOther

2010

An new holistic security approach for government critical systems: Flooding prevention

Alhabeeb, M., Bandyopadhyay, S. K. (ed.), Almuhaideb, A., Adi, W. (ed.), Le, P. D., Kim, T. (ed.), Srinivasan, B. & Xiao, Y. (ed.), 2010, p. 249 - 264. 16 p.

Research output: Contribution to conferenceOtherOther

A novel security approach for critical information systems: Preventing flooding in the non-authenticated client area using a new service from local network service providers

Alhabeeb, M., Ma, J. (ed.), Alsunbul, S., Bacon, L. (ed.), Almuhaideb, A., Du, W. (ed.), Le, P. D., Petridis, M. (ed.) & Srinivasan, B., 2010, p. 49 - 54. 6 p.

Research output: Contribution to conferenceOtherOther

Toward a ubiquitous mobile access model: A roaming agreement-less approach

Almuhaideb, A., Ma, J. (ed.), Alharbi, T., Bacon, L. (ed.), Alhabeeb, M., Du, W. (ed.), Le, P. D., Petridis, M. (ed.) & Srinivasan, B., 2010, p. 143 - 148. 6 p.

Research output: Contribution to conferenceOtherOther