Forensic virtual machines: dynamic defence in the cloud via introspection AL Shaw, B Bordbar, J Saxon, K Harrison, CI Dalton 2014 IEEE International Conference on Cloud Engineering, 303-310, 2014 | 27 | 2014 |
Efficient retrieval of key material for inspecting potentially malicious traffic in the cloud JT Saxon, B Bordbar, K Harrison 2015 IEEE International Conference on Cloud Engineering, 155-164, 2015 | 10 | 2015 |
Introspecting for rsa key material to assist intrusion detection J Saxon, B Bordbar, K Harrison IEEE Cloud Computing 2 (5), 30-38, 2015 | 4 | 2015 |
Opening the black-box of model transformation JT Saxon, B Bordbar, DH Akehurst European Conference on Modelling Foundations and Applications, 171-186, 2015 | 4 | 2015 |
Using traceability in model-to-model transformation to quantify confidence based on previous history JT Saxon University of Birmingham, 2018 | | 2018 |