Follow
Dr Nawfal Fadhel
Dr Nawfal Fadhel
Verified email at soton.ac.uk - Homepage
Title
Cited by
Cited by
Year
Component for 3d printing provenance framework: Security properties components for provenance framework
NF Fadhel, RM Crowder, F Akeel, GB Wills
World Congress on Internet Security (WorldCIS-2014), 91-96, 2014
122014
Provenance in the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
IFAC-PapersOnLine 48 (3), 2345-2350, 2015
102015
Towards a semantic modelling for threat analysis of IoT applications: A case study on transactive energy
N Fadhel, F Lombardi, L Aniello, A Margheri, V Sassone
IET Digital Library, 2019
92019
Approaches to maintaining provenance throughout the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
World Congress on Internet Security (WorldCIS-2013), 82-87, 2013
92013
Transparent authentication in E-learning
NF Fadhel, GB Wills, D Argles
International Conference on Information Society (i-Society 2011), 336-342, 2011
92011
Identifying Food Fraud using Blockchain.
HW Leung, A Chapman, NF Fadhel
IoTBDS, 185-192, 2021
72021
Maintaining provenance throughout the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
IJISR 3 (3), 466-475, 2013
52013
Efficient NFS model for risk estimation in a risk-based access control model
HF Atlam, MA Azad, NF Fadhel
Sensors 22 (5), 2005, 2022
42022
Towards a framework for securing a document outside an organisational firewall
ZS Aaber, RM Crowder, VI Chang, NF Fadhel, GB Wills
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
42014
Preventing document leakage through active document
ZS Aaber, RM Crowder, NF Fadhel, GB Wills
World Congress on Internet Security (WorldCIS-2014), 53-58, 2014
42014
Anomaly detection system: Towards a framework for enterprise log management of security services
O Ozulku, NF Fadhel, D Argles, GB Wills
World Congress on Internet Security (WorldCIS-2014), 97-102, 2014
42014
The Effectiveness of Transformer-Based Models for BEC Attack Detection
A Almutairi, BJ Kang, N Fadhel
International Conference on Network and System Security, 77-90, 2023
22023
Role of Blockchain and AI in Security and Privacy of 6G
HF Atlam, MA Azad, M Altamimi, N Fadhel
AI and Blockchain Technology in 6G Wireless Network, 93-115, 2022
22022
Malicious Activity Detection using Smart Contracts in IoT.
M Eric, HF Atlam, NF Fadhel
IoTBDS, 286-295, 2021
2021
Investigating trusted records for employment and education
R Ghamri, S Mohamed, N Fadhel, G Wills
2020
Provenance Framework for Additive Manufacturing
NF Fadhel
Original typescript, 2018
2018
Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data
ME Ali, FY Akeel, NF Fadhel, GB Wills
The 9th International Conference for Internet Technology and Secured …, 2014
2014
Transparent authentication methodology in electronic education
N Fadhel, D Argles, RM Crowder, GB Wills
Engineering Management Reviews 3, P23-32, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–18