Æȷοì
Dr Nawfal Fadhel
Dr Nawfal Fadhel
soton.ac.ukÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Component for 3d printing provenance framework: Security properties components for provenance framework
NF Fadhel, RM Crowder, F Akeel, GB Wills
World Congress on Internet Security (WorldCIS-2014), 91-96, 2014
122014
Provenance in the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
IFAC-PapersOnLine 48 (3), 2345-2350, 2015
102015
Towards a semantic modelling for threat analysis of IoT applications: A case study on transactive energy
N Fadhel, F Lombardi, L Aniello, A Margheri, V Sassone
IET Digital Library, 2019
92019
Approaches to maintaining provenance throughout the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
World Congress on Internet Security (WorldCIS-2013), 82-87, 2013
92013
Transparent authentication in E-learning
NF Fadhel, GB Wills, D Argles
International Conference on Information Society (i-Society 2011), 336-342, 2011
92011
Identifying Food Fraud using Blockchain.
HW Leung, A Chapman, NF Fadhel
IoTBDS, 185-192, 2021
72021
Maintaining provenance throughout the additive manufacturing process
NF Fadhel, RM Crowder, GB Wills
IJISR 3 (3), 466-475, 2013
52013
Efficient NFS model for risk estimation in a risk-based access control model
HF Atlam, MA Azad, NF Fadhel
Sensors 22 (5), 2005, 2022
42022
Towards a framework for securing a document outside an organisational firewall
ZS Aaber, RM Crowder, VI Chang, NF Fadhel, GB Wills
2014 IEEE 6th International Conference on Cloud Computing Technology and ¡¦, 2014
42014
Preventing document leakage through active document
ZS Aaber, RM Crowder, NF Fadhel, GB Wills
World Congress on Internet Security (WorldCIS-2014), 53-58, 2014
42014
Anomaly detection system: Towards a framework for enterprise log management of security services
O Ozulku, NF Fadhel, D Argles, GB Wills
World Congress on Internet Security (WorldCIS-2014), 97-102, 2014
42014
The Effectiveness of Transformer-Based Models for BEC Attack Detection
A Almutairi, BJ Kang, N Fadhel
International Conference on Network and System Security, 77-90, 2023
32023
Role of Blockchain and AI in Security and Privacy of 6G
HF Atlam, MA Azad, M Altamimi, N Fadhel
AI and Blockchain Technology in 6G Wireless Network, 93-115, 2022
32022
Malicious Activity Detection using Smart Contracts in IoT.
M Eric, HF Atlam, NF Fadhel
IoTBDS, 286-295, 2021
2021
Investigating trusted records for employment and education
R Ghamri, S Mohamed, N Fadhel, G Wills
2020
Provenance Framework for Additive Manufacturing
NF Fadhel
Original typescript, 2018
2018
Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data
ME Ali, FY Akeel, NF Fadhel, GB Wills
The 9th International Conference for Internet Technology and Secured ¡¦, 2014
2014
Transparent authentication methodology in electronic education
N Fadhel, D Argles, RM Crowder, GB Wills
Engineering Management Reviews 3, P23-32, 2014
2014
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–18