Andrea J. Cullen

According to our database1, Andrea J. Cullen authored at least 35 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Novel Approach to Measure and Predict Digital Health Data Protection Compliant (DPC).
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

2021
Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures.
ACM Trans. Manag. Inf. Syst., 2021

2020
Decentralised Compliant Data Trading for Banks.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

A Security and Privacy Focused KYC Data Sharing Platform.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
Standardising smart contracts: Automatically inferring ERC standards.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2018
Visual emulation for Ethereum's virtual machine.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

IPFS for Reduction of Chain Size in Ethereum.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Integrating Behavioural Security Factors for Enhanced Protection of Organisational Information Technology Assets.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

The World of Malware: An Overview.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

A Human Vulnerability Assessment Methodology.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

Cyber Threat Intelligence from Honeypot Data Using Elasticsearch.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
A framework for dynamic selection of backoff stages during initial ranging process in wireless networks.
J. Syst. Softw., 2017

Automated Labeling of Unknown Contracts in Ethereum.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

An Empirical Study of Cultural Dimensions and Cybersecurity Development.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

An Approach to Failure Prediction in a Cloud Based Environment.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

Empirical study of the impact of e-government services on cybersecurity development.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

A preliminary radicalisation framework based on social engineering techniques.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Clustering synchronisation of wireless sensor network based on intersection schedules.
Simul. Model. Pract. Theory, 2016

Cyber-Attack Modeling Analysis Techniques: An Overview.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

The social engineering attack spiral (SEAS).
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2014
Performance Evaluation of Cognitive Radio Networks under Licensed and Unlicensed Spectrum Bands.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Analytical modeling for spectrum handoff decision in cognitive radio networks.
Simul. Model. Pract. Theory, 2013

2011
Implementation and Evaluation of Network Intrusion Detection Systems.
Proceedings of the Network Performance Engineering, 2011

Assessing information quality of e-learning systems: a web mining approach.
Comput. Hum. Behav., 2011

Event-Based Alert Correlation System to Detect SQLI Activities.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
MARS: Multi-stage Attack Recognition System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
STAKCERT Framework in Eradicating Worms Attack.
Proceedings of the 2009 International Conference on CyberWorlds, 2009

Social Engineering Detection Using Neural Networks.
Proceedings of the 2009 International Conference on CyberWorlds, 2009

Overview of Factors for Internet Banking Adoption.
Proceedings of the 2009 International Conference on CyberWorlds, 2009

Virtualization in Network Intrusion Detection Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009

Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems.
Proceedings of the Information Security and Digital Forensics, 2009

Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment.
Proceedings of the Information Security and Digital Forensics, 2009

Evaluating Intrusion Detection Systems in High Speed Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Reverse Engineering: EDOWA Worm Analysis and Classification.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

2007
Factors mediating the routinisation of e-learning within a traditional university education environment.
Int. J. Electron. Bus., 2007


  Loading...