Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy 2011 5th International Conference on Network and System Security, 113-120, 2011 | 146 | 2011 |
Emerging security challenges of cloud virtual infrastructure AS Ibrahim, J Hamlyn-Harris, J Grundy arXiv preprint arXiv:1612.09059, 2016 | 117 | 2016 |
Predictors of team work satisfaction JH Hamlyn-Harris, BJ Hurst, K Von Baggo, AJ Bayley Journal of Information Technology Education: Research 5 (1), 299-315, 2006 | 55 | 2006 |
The thermal stability of Ni-11 wt% P metallic glass JH Hamlyn-Harris, DH StJohn, DK Sood Journal of materials science 25, 3008-3016, 1990 | 16 | 1990 |
Dynamic test reconfigurationfor composite web services MB Cooray, JH Hamlyn-Harris, RG Merkel IEEE Transactions on Services Computing 8 (4), 576-585, 2014 | 14 | 2014 |
Supporting virtualization-aware security solutions using a systematic approach to overcome the semantic gap AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy 2012 IEEE Fifth International Conference on Cloud Computing, 836-843, 2012 | 11 | 2012 |
Web-based teaching: communicating technical diagrams with the vision impaired C Baillie, OK Burmeister, JH Hamlyn-Harris Presentation at the Australian Web Accessibility Conference, OZeWAI, 2003 | 11 | 2003 |
Three reasons why pacemakers are vulnerable to hacking JH Hamlyn-Harris The Conversation, 2017 | 10 | 2017 |
Amorphization of nickel and Ni P alloys by ion implantation JH Hamlyn-Harris, DHS John, DK Sood Materials Science and Engineering: A 147 (2), 201-210, 1991 | 7 | 1991 |
Supporting operating system kernel data disambiguation using points-to analysis AS Ibrahim, J Grundy, J Hamlyn-Harris, M Almorsy Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012 | 6 | 2012 |
Operating system kernel data disambiguation to support security analysis AS Ibrahim, J Grundy, J Hamlyn-Harris, M Almorsy Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 5 | 2012 |
DIGGER: Identifying OS Kernel Objects for Run-time Security Analysis AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy International Journal on Internet and Distributed Computing Systems 3 (1 …, 2013 | 4 | 2013 |
An Investigation of Ternary Mg-Ce-PSZ JH Hamlyn-Harris, DH StJohn Materials Science Forum 34, 141-145, 1988 | 4 | 1988 |
A Comparative Study of The Crystallization of Ni-P Amorphous Alloys Produced By Ion-Implantation And Melt Spinning J Hamlyn-Harris, DHS John, DK Sood MRS Online Proceedings Library 51, 497-502, 1985 | 4 | 1985 |
Identifying OS kernel objects for run-time security analysis AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 1 | 2012 |
Hackers' kit bag: the tools that terrorise the internet JH Hamlyn-Harris The Conversation, 2015 | | 2015 |
A password you can swallow? Don't hold your breath JH Hamlyn-Harris The Conversation, 2013 | | 2013 |
DIGGER: identifying OS dynamic kernel objects for run-time security analysis A Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy Deakin University, 2013 | | 2013 |
10 ways to dodge spies J Hamlyn-Harris Independent Newspapers, 2013 | | 2013 |
Digger: Identifying os kernel objects for runtime security analysis AS Ibrahim, J Hamlyn-Harris, J Grundy, M Almorsy International Journal on Internet and Distributed Computing Systems 3 (1 …, 2013 | | 2013 |