Security policy monitoring of BPMN‐based service compositions M Asim, A Yautsiukhin, AD Brucker, T Baker, Q Shi, B Lempereur Journal of Software: Evolution and Process 30 (9), e1944, 2018 | 30 | 2018 |
An access control management protocol for internet of things devices M Taylor, D Reilly, B Lempereur Network Security 2017 (7), 11-17, 2017 | 19 | 2017 |
Event driven monitoring of composite services M Asim, D Llewellyn-Jones, B Lempereur, B Zhou, Q Shi, M Merabti 2013 International conference on social computing, 550-557, 2013 | 11 | 2013 |
Pypette: A framework for the automated evaluation of live digital forensic techniques B Lempereur, M Merabti, Q Shi Proceedings of the 11th Annual PostGraduate Symposium on The Convergence of …, 2010 | 8 | 2010 |
Pypette: A platform for the evaluation of live digital forensics B Lempereur, M Merabti, Q Shi International Journal of Digital Crime and Forensics (IJDCF) 4 (4), 31-46, 2012 | 5 | 2012 |
Using aspect oriented programming to enforce privacy preserving communication in distributed systems AA Thulnoon, B Lempereur, Q Shi, D Al-Jumeily Proceedings of the Second International Conference on Internet of things …, 2017 | 3 | 2017 |
Information flow monitoring: model, policy, and analysis B Lempereur, M Merabti, Q Shi 2011 Developments in E-systems Engineering, 227-232, 2011 | 3 | 2011 |
Automating evidence extraction and analysis for digital forensics B Lempereur, M Merabti, Q Shi Academic Press, 2009 | 3 | 2009 |
Security and trustworthiness threats to composite services: Taxonomy, countermeasures, and research directions PH Meland, M Asim, D Ayed, F Dalpiaz, E Félix, P Giorgini, S Gonzáles, ... Secure and Trustworthy Service Composition: The Aniketos Approach, 10-35, 2014 | 2 | 2014 |
Security policy monitoring of composite services M Asim, A Yautsiukhin, AD Brucker, B Lempereur, Q Shi Secure and Trustworthy Service Composition: The Aniketos Approach, 192-202, 2014 | 2 | 2014 |
Predictive Analytics as a Security Management Tool in Virtualised Environment RM Kapasa, H Forsyth, A Laws, B Lempereur 2015 International Conference on Developments of E-Systems Engineering (DeSE …, 2015 | 1 | 2015 |
Pypette: A Platform for the Evaluation of Live Digital Forensics B Lempereur, M Merabti Emerging Digital Forensics Applications for Crime Detection, Prevention, and …, 2013 | 1 | 2013 |
System Monitoring for Digital Forensic Investigation B Lempereur, M Merabti, Q Shi Proceedings of the 12th Annual Postgraduate Symposium on the Convergence of …, 0 | 1 | |
Monitoring Threats to Composite Services within the Aniketos Run-Time Framework B Lempereur, D Ayed, M Asim, M Merabti, Q Shi Secure and Trustworthy Service Composition: The Aniketos Approach, 173-191, 2014 | | 2014 |
Pypette: A Platform for the Investigation of Live Digital Forensics B Lempereur Liverpool John Moores University, 2013 | | 2013 |
Pypette B Lempereur, M Merabti, Q Shi Emerging Digital Forensics Applications for Crime Detection, Prevention, and …, 2013 | | 2013 |
Pypette: A Framework for the Evaluation of Live Digital Forensic Acquisition Techniques B Lempereur, M Merabti, Q Shi Seventh International Workshop on Digital Forensics & Incident Analysis, 2012 | | 2012 |