Thomas Welsh

Orcid: 0000-0003-3134-5469

According to our database1, Thomas Welsh authored at least 26 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Topology-Aware Adaptive Inspection for Fraud in I4.0 Supply Chains.
IEEE Trans. Ind. Informatics, April, 2023

2021
On Resilience in Cloud Computing: A Survey of Techniques across the Cloud Domain.
ACM Comput. Surv., 2021

On Adaptive Fairness in Software Systems.
Proceedings of the 16th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2021

The Resilient Edge: Evaluating Graph-based Metrics for Decentralised Service Delivery.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

Towards Adaptive Inspection for Fraud in I4.0 Supply Chains.
Proceedings of the 26th IEEE International Conference on Emerging Technologies and Factory Automation, 2021

Toward a Compare and Contrast Framework for COVID-19 Contact Tracing Mobile Applications: A Look at Usability.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

2020
An embryonics inspired architecture for resilient decentralised cloud service delivery
PhD thesis, 2020

Automated negotiated user profiling across distributed social mobile clouds for resource optimisation.
Concurr. Comput. Pract. Exp., 2020

Towards a Taxonomy for Evaluating Societal Concerns of Contact Tracing Apps.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

2019
Bioinspired Multiagent Embryonic Architecture for Resilient Edge Networks.
IEEE Trans. Ind. Informatics, 2019

Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures.
IEEE Access, 2019

A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2018
A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems.
IEEE Commun. Surv. Tutorials, 2018

Embyronic model for highly resilient PaaS.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

2017
Mitigating anti-forensics in the Cloud via resource-based privacy preserving activity attribution.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Perspectives on Resilience in Cloud Computing: Review and Trends.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Energy Optimisation for Mobile Device Power Consumption: A Survey and a Unified View of Modelling for a Comprehensive Network Simulation.
Mob. Networks Appl., 2016

GA-Based Resource Augmentation Negotation for Energy-Optimised Mobile Ad-hoc Cloud.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

Leveraging Software-Defined-Networking for Energy Optimisation in Mobile-Cloud-Computing.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

2015
User Profiling for Energy Optimisation in Mobile Cloud Computing.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
Towards Malware Inspired Cloud Self-Protection.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

Exploiting Social Networks for the Prediction of Social and Civil Unrest: A Cloud Based Framework.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization.
Int. J. Cloud Appl. Comput., 2013

A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Security testing in the cloud by means of ethical worm.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

1996
The FLAG cable system.
IEEE Commun. Mag., 1996


  Loading...