![]() | Up a level |
Mahmood, A, Al-Yasiri, A and Alani, OYK ![]() |
Mahmood, A, Al-Yasiri, A and Alani, OYK ![]() |
Majeed, AA and Al-Yasiri, A 2017, 'Formulating a global identifier based on actor relationship for the Internet of Things' , Interoperability, Safety and Security in IoT, 190 , pp. 79-91. |
Khan, N and Al-Yasiri, A 2016, 'Identifying cloud security threats to strengthen cloud computing adoption framework' , Procedia Computer Science, 94 , pp. 485-490. |
Khan, NA and Al-Yasiri, A 2016, 'Cloud security threats and techniques to strengthen cloud computing adoption framework' , International Journal of Information Technology and Web Engineering, 11 (3) , pp. 50-64. Item not available from this repository. |
Al-Yasiri, A 2015, 'GECAF: a framework for developing context-aware pervasive systems' , Computer Science - Research and Development, 30 (1) , pp. 87-103. |
Khan, NA and Al-Yasiri, A 2015, 'Framework for cloud computing adoption : a roadmap for SMEs to cloud migration' , International Journal on Cloud Computing: Services and Architecture, 5 (5/6) , 01-15. Item not available from this repository. |
Al-Karkhi, A, Al-Yasiri, A and Linge, N ![]() |
Mackay, M, Baker, T and Al-Yasiri, A 2012, 'Security-oriented cloud computing platform for critical infrastructures' , Computer Law and Security Review, 28 (6) , pp. 679-686. |
Al-Yasiri, A 2011, 'An extensible framework for context-aware smart environments' , Lecture Notes in Computer Science, 6566 , pp. 98-109. |
Al-Yasiri, A and Sunley, A 2007, 'Data aggregation in wireless sensor networks using the SOAP protocol' , Journal of Physics: Conference Series, 76 , 012039. |
Majeed, AA and Al-Yasiri, A 2018, Consolidate the identity management systems to identify the effective actor based on the actors relationship for the Internet of Things , in: Third International Congress on Information and Communication Technology, 27-28 February 2018, London, UK. |
Salman, A ![]() |
Salman, Aymen ![]() |
Al-Shammari, S and Al-Yasiri, A 2015, MonSLAR : a middleware for monitoring SLA for RESTFUL services in cloud computing , in: IEEE 9th International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Environments (MESOCA), 2015, 2nd October 2015, Bremen, Germany. Item not available from this repository. |
Al-Karkhi, AAS, Al-Yasiri, A and Jaseemuddin, M 2014, Non-intrusive user identity provisioning in the internet of things , in: MobiWac '14 Proceedings of the 12th ACM international symposium on Mobility management and wireless access, September 2014, Montreal, Canada. |
Al-Yasiri, A 2013, An approach for energy efficient service oriented architecture for sensor networks , in: 4th Annual International Conference on Energy Aware Computing Systems and Applications (ICEAC), 16-18 Dec. 2013, Istanbul, Turkey. |
Al-Bayati, ZJF 2019, Coupling ontology with reference architectures to facilitate the instantiation process of software system architectures , PhD thesis, University of Salford. |
Salman, A ![]() |
Sabagh, A 2011, GECAF : a generic and extensible framework for developing context-aware smart environments , PhD thesis, Salford : University of Salford. |
Ezentani, AM 2010, Factors that affect the implementation of G2G E-government in countries with non-traditional governance : Libya as a case study , PhD thesis, Salford : University of Salford. |