Ali Sajjad
Ali Sajjad
BT Applied Research
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
International Workshop on Recent Advances in Intrusion Detection, 351-371, 2008
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
European Grid Conference, 932-941, 2005
Security-as-a-service in multi-cloud and federated cloud environments
PS Pawar, A Sajjad, T Dimitrakos, DW Chadwick
IFIP international conference on trust management, 251-261, 2015
Automagi-an autonomic middleware for enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, SM Han, YK Lee, S Lee
Joint International Conference on Autonomic and Autonomous Systems and …, 2005
A cloud-edge based data security architecture for sharing and analysing cyber threat information
DW Chadwick, W Fan, G Costantino, R De Lemos, F Di Cerbo, I Herwono, ...
Future Generation Computer Systems 102, 710-722, 2020
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communications …, 2009
A component-based architecture for an autonomic middleware enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, YK Lee, S Lee
International Conference on Embedded and Ubiquitous Computing, 1225-1234, 2005
Mobile-to-grid middleware: An approach for breaching the divide between mobile and grid environments
U Kalim, H Jameel, A Sajjad, S Lee
International Conference on Networking, 1-8, 2005
Impact of internal corporate social responsibility on employee engagement: a study of moderated mediation model
HQ Yousaf, I Ali, A Sajjad, M Ilyas
International Journal of Sciences: Basic and Applied Research (IJSBAR) 30 (5 …, 2016
Seamless enablement of intelligent protection for enterprise cloud applications through service store
J Daniel, T Dimitrakos, F El-Moussa, G Ducatel, P Pawar, A Sajjad
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
Secure cloud storage: a framework for data protection as a service in the multi-cloud environment
QH Vu, M Colombo, R Asal, A Sajjad, FA El-Moussa, T Dimitrakos
2015 IEEE Conference on Communications and Network Security (CNS), 638-642, 2015
A parallelized disjunctive query based searchable encryption scheme for big data
S Tahir, L Steponkus, S Ruj, M Rajarajan, A Sajjad
Future Generation Computer Systems 109, 583-592, 2020
Secure virtualized data volumes
T Dimitrakos, A Sajjad
US Patent 10,505,721, 2019
Integrating security services in cloud service stores
J Daniel, F El-Moussa, G Ducatel, P Pawar, A Sajjad, R Rowlingson, ...
IFIP International Conference on Trust Management, 226-239, 2015
MAGI-Mobile access to grid infrastructure: Bringing the gifts of grid to mobile computing
A Sajjad, H Jameel, U Kalim, YK Lee, S Lee
NODe 2005–GSEM 2005, 2005
Dynamic wireless network access point selection
F El-Moussa, A Sajjad
US Patent 10,728,841, 2020
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment
S Tahir, S Ruj, A Sajjad, M Rajarajan
Computer Communications 133, 102-114, 2019
Requirements and architecture of a cloud broker
SK Nair, P Pawar, A Sajjad, M Kiran, M Jiang, J Tordsson
OPTIMIS Consortium, 2011
A scalable and dynamic application-level secure communication framework for inter-cloud services
A Sajjad, M Rajarajan, A Zisman, T Dimitrakos
Future Generation Computer Systems 48, 19-27, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20