Jimmy McGibney

Orcid: 0000-0003-4541-1420

According to our database1, Jimmy McGibney authored at least 20 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

2022
Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions.
IEEE Access, 2022

Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

2017
Attack surface-based security metric framework for service selection and composition.
Int. J. Auton. Adapt. Commun. Syst., 2017

2014
Aggregation and Optimisation of Trustworthiness of Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

2012
Profitability and Cost Management of Trustworthy Composite Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Trustworthiness monitoring and prediction of composite services.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Trust and Privacy.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
Enhancement of Critical Financial Infrastructure Protection Using Trust Management.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Trustworthiness monitoring of dynamic service compositions.
Proceedings of the 6th Workshop on Emerging Web Services Technology, 2011

2010
Implementing a Trust Overlay Framework for Digital Ecosystems.
Proceedings of the Digital Ecosystems - Third International Conference, 2010

Integrating players, reputation and ranking to manage cheating in MMOGs.
Proceedings of the International Conference on the Foundations of Digital Games, 2010

2008
A Trust Based System for Enhanced Spam Filtering.
J. Softw., 2008

2007
A Combined Biologically and Socially Inspired Approach to Mitigating Ad Hoc Network Threats.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Collaborative Strategies for Reducing Attacks on Ad Hoc Network Nodes.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Distributed Dynamic Protection of Services on Ad Hoc and Peer to Peer Networks.
Proceedings of the IP Operations and Management, 7th IEEE International Workshop, 2007

A service-centric approach to access control and monitoring based on distributed trust.
Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, 2007

Establishing Trust Between Mail Servers to Improve Spam Filtering.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam.
Proceedings of the The Second International Conference on Availability, 2007

2005
A service-centric model for intrusion detection in next-generation networks.
Comput. Stand. Interfaces, 2005


  Loading...