Follow
J H Hamlyn-Harris
Title
Cited by
Cited by
Year
Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model
AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
2011 5th International Conference on Network and System Security, 113-120, 2011
1462011
Emerging security challenges of cloud virtual infrastructure
AS Ibrahim, J Hamlyn-Harris, J Grundy
arXiv preprint arXiv:1612.09059, 2016
1172016
Emerging security challenges of cloud virtual infrastructure
AS Ibrahim, J Hamlyn-Harris, J Grundy
arXiv preprint arXiv:1612.09059, 2016
1172016
Predictors of team work satisfaction
JH Hamlyn-Harris, BJ Hurst, K Von Baggo, AJ Bayley
Journal of Information Technology Education: Research 5 (1), 299-315, 2006
542006
The thermal stability of Ni-11 wt% P metallic glass
JH Hamlyn-Harris, DH StJohn, DK Sood
Journal of materials science 25, 3008-3016, 1990
161990
Dynamic test reconfigurationfor composite web services
MB Cooray, JH Hamlyn-Harris, RG Merkel
IEEE Transactions on Services Computing 8 (4), 576-585, 2014
142014
Supporting virtualization-aware security solutions using a systematic approach to overcome the semantic gap
AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
2012 IEEE Fifth International Conference on Cloud Computing, 836-843, 2012
112012
Web-based teaching: communicating technical diagrams with the vision impaired
C Baillie, OK Burmeister, JH Hamlyn-Harris
Presentation at the Australian Web Accessibility Conference, OZeWAI, 2003
112003
Three reasons why pacemakers are vulnerable to hacking
JH Hamlyn-Harris
The Conversation, 2017
102017
Amorphization of nickel and Ni P alloys by ion implantation
JH Hamlyn-Harris, DHS John, DK Sood
Materials Science and Engineering: A 147 (2), 201-210, 1991
71991
Supporting operating system kernel data disambiguation using points-to analysis
AS Ibrahim, J Grundy, J Hamlyn-Harris, M Almorsy
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
62012
Operating system kernel data disambiguation to support security analysis
AS Ibrahim, J Grundy, J Hamlyn-Harris, M Almorsy
Network and System Security: 6th International Conference, NSS 2012 …, 2012
52012
DIGGER: Identifying OS Kernel Objects for Run-time Security Analysis
AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
International Journal on Internet and Distributed Computing Systems 3 (1 …, 2013
42013
An Investigation of Ternary Mg-Ce-PSZ
JH Hamlyn-Harris, DH StJohn
Materials Science Forum 34, 141-145, 1988
41988
A Comparative Study of The Crystallization of Ni-P Amorphous Alloys Produced By Ion-Implantation And Melt Spinning
J Hamlyn-Harris, DHS John, DK Sood
MRS Online Proceedings Library 51, 497-502, 1985
41985
Identifying OS kernel objects for run-time security analysis
AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
Network and System Security: 6th International Conference, NSS 2012 …, 2012
12012
Hackers' kit bag: the tools that terrorise the internet
JH Hamlyn-Harris
The Conversation, 2015
2015
A password you can swallow? Don't hold your breath
JH Hamlyn-Harris
The Conversation, 2013
2013
DIGGER: identifying OS dynamic kernel objects for run-time security analysis
A Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy
Deakin University, 2013
2013
10 ways to dodge spies
J Hamlyn-Harris
Independent Newspapers, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20