The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective SN Shirazi, A Gouglidis, A Farshad, D Hutchison IEEE Journal on Selected Areas in Communications 35 (11), 2586-2595, 2017 | 305 | 2017 |
Malware Detection in Cloud Computing Infrastructures M Watson, S Noorulhassan, A Marnerides, A Mauthe, D Hutchison IEEE Transaction on Dependable and Secure Computing, 1, 2015 | 202 | 2015 |
Evaluation of anomaly detection techniques for scada communication resilience SN Shirazi, A Gouglidis, KN Syeda, S Simpson, A Mauthe, ... 2016 Resilience Week (RWS), 140-145, 2016 | 61 | 2016 |
Assessing the impact of intra-cloud live migration on anomaly detection NH Shirazi, S Simpson, AK Marnerides, M Watson, A Mauthe, ... Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, 52-57, 2014 | 51 | 2014 |
An inter-domain collaboration scheme to remedy DDoS attacks in computer networks S Simpson, SN Shirazi, A Marnerides, S Jouet, D Pezaros, D Hutchison IEEE Transactions on Network and Service Management 15 (3), 879-893, 2018 | 45 | 2018 |
Malware analysis in cloud computing: Network and system characteristics AK Marnerides, MR Watson, N Shirazi, A Mauthe, D Hutchison 2013 IEEE globecom workshops (GC Wkshps), 482-487, 2013 | 41 | 2013 |
Evading virus detection using code obfuscation K Murad, SNH Shirazi, YB Zikria, N Ikram Future Generation Information Technology: Second International Conference …, 2010 | 30 | 2010 |
Towards a distributed, self-organising approach to malware detection in cloud computing MR Watson, S Noorulhassan, AK Marnerides, A Mauthe, D Hutchison Self-Organizing Systems, 182-185, 2014 | 22 | 2014 |
Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics IM Stephanakis, IP Chochliouros, E Sfakianakis, SN Shirazi, D Hutchison Information Sciences 494, 247-277, 2019 | 18 | 2019 |
Big data and natural language processing for analysing railway safety: Analysis of railway incident reports KN Syeda, SN Shirazi, SAA Naqvi, HJ Parkinson, G Bamford Human Performance Technology: Concepts, Methodologies, Tools, and …, 2019 | 15 | 2019 |
A framework for resilience management in the cloud S Noorulhassan, S Simpson, S Oechsner, A Mauthe, D Hutchison e & i Elektrotechnik und Informationstechnik 132 (2), 122-132, 2015 | 14* | 2015 |
Anomaly detection in the cloud using data density SN Shirazi, S Simpson, A Gouglidis, A Mauthe, D Hutchison 2016 IEEE 9th international conference on cloud computing (CLOUD), 616-623, 2016 | 12 | 2016 |
A multi-level approach to resilience of critical infrastructures and services A Gouglidis, SN Shirazi, S Simpson, P Smith, D Hutchison 2016 23rd International Conference on Telecommunications (ICT), 1-5, 2016 | 10 | 2016 |
A multi-level approach to resilience of critical infrastructures and services A Gouglidis, SN Shirazi, S Simpson, P Smith, D Hutchison 2016 23rd International Conference on Telecommunications (ICT), 1-5, 2016 | 10 | 2016 |
Exploiting natural language processing for analysing railway incident reports KN Syeda, SN Shirazi, SAA Naqvi, HJ Parkinson IGI Glob. Publ., 1-18, 2017 | 9 | 2017 |
Towards resilience metrics for future cloud applications M Novak, SN Shirazi, A Hudic, T Hecht, M Tauber, D Hutchison, S Maksuti, ... 6th International Conference on Cloud Computing and Services Science, Rome …, 2016 | 6 | 2016 |
Towards resilience metrics for future cloud applications M Novak, SN Shirazi, A Hudic, T Hecht, M Tauber, D Hutchison, S Maksuti, ... 6th International Conference on Cloud Computing and Services Science, Rome …, 2016 | 6 | 2016 |
Syed Noor ul Hassan Shirazi, Steven Simpson, and Paul Smith. Whitepaper “AF 1.0” SECCRIT Architectural Framework R Bless, M Flittner, J Horneber, D Hutchison, C Jung, F Pallas, M Schöller | 5 | 2014 |
Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks S Shirazi, A Schaeffer-Filho, D Hutchison Cyberpatterns, 125-134, 2014 | 5 | 2014 |
SECCRIT Deliverable D3. 1 Methodology for Risk Assessment and Management P Smith, J Busby, L Langer, M Schöller, N Shirazi | 5 | 2013 |