![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Andrea J. Cullen
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c28]Davies C. Ogbodo, Irfan-Ullah Awan, Andrea J. Cullen:
A Novel Approach to Measure and Predict Digital Health Data Protection Compliant (DPC). FiCloud 2023: 33-39 - 2021
- [j6]Aristotle Onumo, Irfan-Ullah Awan, Andrea J. Cullen:
Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures. ACM Trans. Manag. Inf. Syst. 12(2): 11:1-11:29 (2021) - 2020
- [c27]Robert Norvill, Cyril Cassanges, Wazen M. Shbair
, Jean Hilger, Andrea J. Cullen, Radu State:
A Security and Privacy Focused KYC Data Sharing Platform. BSCI 2020: 151-160 - [c26]Robert Norvill, Jean Hilger, Irfan Awan, Andrea J. Cullen, Radu State:
Decentralised Compliant Data Trading for Banks. IECC 2020: 121-128
2010 – 2019
- 2019
- [c25]Robert Norvill, Beltran Fiz
, Radu State, Andrea J. Cullen:
Standardising smart contracts: Automatically inferring ERC standards. IEEE ICBC 2019: 192-195 - 2018
- [c24]Hamad Al-Mohannadi, Irfan Awan, Jassim Al Hamar, Andrea J. Cullen, Jules Pagna Disso, Lorna Armitage:
Cyber Threat Intelligence from Honeypot Data Using Elasticsearch. AINA 2018: 900-906 - [c23]Andrea J. Cullen, Lorna Armitage:
A Human Vulnerability Assessment Methodology. CyberSA 2018: 1-2 - [c22]Aristotle Onumo, Andrea J. Cullen, Irfan Awan:
Integrating Behavioural Security Factors for Enhanced Protection of Organisational Information Technology Assets. FiCloud 2018: 128-135 - [c21]Anitta Patience Namanya, Andrea J. Cullen, Irfan-Ullah Awan, Jules Pagna Disso:
The World of Malware: An Overview. FiCloud 2018: 420-427 - [c20]Robert Norvill, Beltran Borja Fiz Pontiveros
, Radu State, Andrea J. Cullen:
IPFS for Reduction of Chain Size in Ethereum. iThings/GreenCom/CPSCom/SmartData 2018: 1121-1128 - [c19]Robert Norvill, Beltran Borja Fiz Pontiveros
, Radu State, Andrea J. Cullen:
Visual emulation for Ethereum's virtual machine. NOMS 2018: 1-4 - 2017
- [j5]Muhammad Rafiq Mufti, Humaira Afzal, Irfan Awan, Andrea J. Cullen:
A framework for dynamic selection of backoff stages during initial ranging process in wireless networks. J. Syst. Softw. 133: 17-27 (2017) - [c18]Sumaia Sabouni, Andrea J. Cullen, Lorna Armitage:
A preliminary radicalisation framework based on social engineering techniques. CyberSA 2017: 1-5 - [c17]Aristotle Onumo, Andrea J. Cullen, Irfan-Ullah Awan:
Empirical study of the impact of e-government services on cybersecurity development. EST 2017: 85-90 - [c16]Aristotle Onumo, Andrea J. Cullen, Irfan-Ullah Awan:
An Empirical Study of Cultural Dimensions and Cybersecurity Development. FiCloud 2017: 70-76 - [c15]Adamu Hussaini
, Bashir Mohammed, Ali Maina Bukar, Andrea J. Cullen, Hassan Ugail, Irfan Awan:
An Approach to Failure Prediction in a Cloud Based Environment. FiCloud 2017: 191-197 - [c14]Robert Norvill, Beltran Borja Fiz Pontiveros
, Radu State, Irfan Awan, Andrea J. Cullen:
Automated Labeling of Unknown Contracts in Ethereum. ICCCN 2017: 1-6 - 2016
- [j4]Ibrahim Ammar, Irfan Awan, Andrea J. Cullen:
Clustering synchronisation of wireless sensor network based on intersection schedules. Simul. Model. Pract. Theory 60: 69-89 (2016) - [c13]Andrea J. Cullen, Lorna Armitage:
The social engineering attack spiral (SEAS). Cyber Security And Protection Of Digital Services 2016: 1-6 - [c12]Hamad Al-Mohannadi, Qublai Khan Ali Mirza
, Anitta Patience Namanya, Irfan Awan, Andrea J. Cullen, Jules Pagna Disso:
Cyber-Attack Modeling Analysis Techniques: An Overview. FiCloud Workshops 2016: 69-76 - 2014
- [c11]Salah Zahed, Irfan Awan, Andrea J. Cullen, Muhammad Younas:
Performance Evaluation of Cognitive Radio Networks under Licensed and Unlicensed Spectrum Bands. AINA 2014: 329-336 - 2013
- [j3]Salah Zahed, Irfan Awan, Andrea J. Cullen:
Analytical modeling for spectrum handoff decision in cognitive radio networks. Simul. Model. Pract. Theory 38: 98-114 (2013) - 2011
- [j2]Mona Awad Alkhattabi
, Daniel Neagu
, Andrea J. Cullen:
Assessing information quality of e-learning systems: a web mining approach. Comput. Hum. Behav. 27(2): 862-873 (2011) - [c10]Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen:
Event-Based Alert Correlation System to Detect SQLI Activities. AINA 2011: 175-182 - [p1]Monis Akhlaq, Faeiz Alserhani, Irfan Awan, John Mellor, Andrea J. Cullen, Abdullah Al-Dhelaan:
Implementation and Evaluation of Network Intrusion Detection Systems. Network Performance Engineering 2011: 988-1016 - 2010
- [c9]Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen, Pravin Mirchandani:
MARS: Multi-stage Attack Recognition System. AINA 2010: 753-759
2000 – 2009
- 2009
- [c8]Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Evaluating Intrusion Detection Systems in High Speed Networks. IAS 2009: 454-459 - [c7]Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment. ISDF 2009: 26-41 - [c6]Ahsan Subhan, Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems. ISDF 2009: 57-65 - [c5]Monis Akhlaq, Faeiz Alserhani, Irfan-Ullah Awan, Andrea J. Cullen, John Mellor, Pravin Mirchandani:
Virtualization in Network Intrusion Detection Systems. OTM Workshops 2009: 6-8 - [c4]Rita E. Ochuko, Andrea J. Cullen, Daniel Neagu
:
Overview of Factors for Internet Banking Adoption. CW 2009: 163-170 - [c3]Madihah Mohd Saudi
, Andrea J. Cullen, Mike E. Woodward:
STAKCERT Framework in Eradicating Worms Attack. CW 2009: 257-264 - [c2]Hanan Sandouka, Andrea J. Cullen, Ian Mann:
Social Engineering Detection Using Neural Networks. CW 2009: 273-278 - 2008
- [c1]Madihah Mohd Saudi
, Emran Mohd Tamil
, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris:
Reverse Engineering: EDOWA Worm Analysis and Classification. World Congress on Engineering (Selected Papers) 2008: 277-288 - 2007
- [j1]Shafqat Hameed, John Mellor, Atta Badii, Niyati Patel, Andrea J. Cullen:
Factors mediating the routinisation of e-learning within a traditional university education environment. Int. J. Electron. Bus. 5(2): 160-175 (2007)
Coauthor Index
aka: Irfan-Ullah Awan
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint