Paul Kearney

Orcid: 0000-0002-6484-3344

According to our database1, Paul Kearney authored at least 25 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Network intrusion detection using feature fusion with deep learning.
J. Big Data, December, 2023

2022
A machine learning approach for detecting fast flux phishing hostnames.
J. Inf. Secur. Appl., 2022

2021
RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

An Indicators-of-Risk Library for Industrial Network Security.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in V2V Communications.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
A Survey of Open Data Platforms in Six UK Smart City Initiatives.
Comput. J., 2019

ERAMIS: A Reference Architecture-Based Methodology for IoT Systems.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Analysis of Security Overhead in Broadcast V2V Communications.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Continuous Risk Management for Industrial IoT: A Methodological View.
Proceedings of the Risks and Security of Internet and Systems, 2019

2018
Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment.
Proceedings of the Information Security - 21st International Conference, 2018

Collective Responsibility and Mutual Coercion in IoT Botnets - A Tragedy of the Commons Problem.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2014
Modeling Trust Relationships for Developing Trustworthy Information Systems.
Int. J. Inf. Syst. Model. Des., 2014

2012
Towards a C2I Platform for Combating the Cyber-Threat.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

2008
Glosser: Enhanced Feedback for Student Writing Tasks.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

2007
Games for Learning and Learning from Games.
Informatica (Slovenia), 2007

Sex, lies and video games.
Br. J. Educ. Technol., 2007

Cognitive assessment of game-based learning.
Br. J. Educ. Technol., 2007

2006
The Use of Functional Domains to Improve Transmembrane Protein Topology Prediction.
J. Bioinform. Comput. Biol., 2006

2005
Message level security for web services.
Inf. Secur. Tech. Rep., 2005

Playing in the Sandbox: Developing games for children with disabilities..
Proceedings of the Digital Games Research Conference 2005, 2005

Cognitive Callisthenics: Do FPS computer games enhance the player's cognitive abilities?.
Proceedings of the Digital Games Research Conference 2005, 2005

2002
Integrating AI planning techniques with workflow management system.
Knowl. Based Syst., 2002

2000
Integrating economics and genetics models in information ecosystems.
Proceedings of the 2000 Congress on Evolutionary Computation, 2000


  Loading...