Showing 1 - 20 results of 26 for search 'Adetoye, A', query time: 0.04s
Refine Results
-
1
-
2
Design and Implementation of a Network Intrusion Detection and Active−Response System by Adetoye, A
Published 2003Thesis -
3
High−Efficiency FPGA Regular Expression Pattern Matching by Badii, A, Adetoye, A
Published 2015Conference item -
4
Static Analysis of Information Release in Interactive Programs by Adetoye, A, Papanikolaou, N
Published 2010Journal article -
5
-
6
From Qualitative to Quantitative Information Erasure by Adetoye, A, Goldsmith, M
Published 2012Conference item -
7
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment by Adetoye, A, Creese, S, Goldsmith, M
Published 2013Conference item -
8
Analysis of Dependencies in Critical Infrastructures by Adetoye, A, Creese, S, Goldsmith, M
Published 2011Conference item -
9
Reasoning about Vulnerabilities in Dependent Information Infrastructures: A Cyber Range Experiment by Adetoye, A, Creese, S, Goldsmith, M
Published 2012Conference item -
10
Analysis of Dependencies in Critical Infrastructures by Adetoye, A, Creese, S, Goldsmith, M
Published 2011Conference item -
11
A Logical High−Level Framework for Critical Infrastructure Resilience and Risk Assessment by Creese, S, Goldsmith, M, Adetoye, A
Published 2011Conference item -
12
A logical high−level framework for Critical Infrastructure resilience and risk assessment by Creese, S, Goldsmith, M, Adetoye, A
Published 2011Conference item -
13
A Framework for Probabilistic QoS Guarantee in Mobile Ad Hoc Networks by Aderounmu, G, Ogwu, F, Adetoye, A
Published 2015Conference item -
14
Agent−Based Approach to Selecting Views and Indexes in a Data Warehouse by Aderounmu, G, Awoyelu, I, Adetoye, A
Published 2003Journal article -
15
A Modelling Approach for Interdependency in Digital Systems−of−Systems Security − Extended Abstract by Adetoye, A, Creese, S, Goldsmith, M, Hopkins, P
Published 2010Conference item -
16
A Modelling Approach for Interdependency in Digital Systems−of−Systems Security by Adetoye, A, Creese, S, Goldsmith, M, Hopkins, P
Published 2011Conference item -
17
Efficient FPGA−Based Regular Expression Pattern Matching by Badii, A, Adetoye, A, Patel, D, Hameed, K
Published 2015Conference item -
18
An Agent−based Approach to Water Distribution System Control by Aderounmu, G, Adagunodo, E, Akintola, A, Adetoye, A
Published 1998Journal article -
19
A Framework Architecture for Semantic Resolution of Security in Ambient Environments by Badii, A, Adetoye, A, Thiemert, D, Hoffmann, M
Published 2015Conference item -
20
High Resolution Digital Media Personalisation for All Delivery Context Device Agents by Badii, A, Khan, A, Adetoye, A, Fuschi, D
Published 2008Conference item