Applied machine learning predictive analytics to SQL injection attack detection and prevention SO Uwagbole, WJ Buchanan, L Fan 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017 | 206 | 2017 |
DACAR platform for eHealth services cloud L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ... 2011 IEEE 4th international conference on cloud computing, 219-226, 2011 | 102 | 2011 |
Design issues for peer-to-peer massively multiplayer online games L Fan, P Trinder, H Taylor International Journal of Advanced Media and Communication 4 (2), 108-125, 2010 | 82 | 2010 |
Mediator: a design framework for P2P MMOGs L Fan, H Taylor, P Trinder Proceedings of the 6th ACM SIGCOMM workshop on Network and system support …, 2007 | 81 | 2007 |
An integrated cloud-based healthcare infrastructure E Ekonomou, L Fan, W Buchanan, C Thuemmler 2011 IEEE third international conference on cloud computing technology and …, 2011 | 64 | 2011 |
Resilient secret sharing cloud based architecture for data vault D Lanc, L Fan, L Mackinnon, B Buchanan US Patent App. 15/216,176, 2017 | 63 | 2017 |
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack SO Uwagbole, WJ Buchanan, L Fan 2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017 | 38 | 2017 |
SPoC: protecting patient privacy for e-health services in the cloud L Fan, WJ Buchanan, O Lo, C Thümmler, A Lawson, O Uthmani, ... | 23 | 2012 |
Numerical encoding to tame SQL injection attacks SO Uwagbole, WJ Buchanan, L Fan NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1253-1256, 2016 | 21 | 2016 |
The future internet: A world of secret shares WJ Buchanan, D Lanc, E Ukwandu, L Fan, G Russell, O Lo Future Internet 7 (4), 445-464, 2015 | 21 | 2015 |
Formal security policy implementations in network firewalls R Macfarlane, W Buchanan, E Ekonomou, O Uthmani, L Fan, O Lo Computers & Security 31 (2), 253-270, 2012 | 20 | 2012 |
Solving key design issues for massively multiplayer online games on peer-to-peer architectures L Fan Heriot-Watt University, 2009 | 19 | 2009 |
E-health: Chances and challenges of distributed, service oriented architectures C Thuemmler, L Fan, WJ Buchanan, O Lo, E Ekonomou, AS Khedim | 13 | 2012 |
Technical evaluation of an e-health platform. O Lo, L Fan, WJ Buchanan, C Thuemmler | 9 | 2012 |
Crime risk evaluation within information sharing between the police and community partners O Uthmani, W Buchanan, A Lawson, R Scott, B Schafer, L Fan, S Uthmani Information & Communications Technology Law 20 (2), 57-81, 2011 | 9 | 2011 |
Novel information sharing syntax for data sharing between police and community partners, using role-based security O Uthmani, W Buchanan, A Lawson, C Thuemmler, L Fan, R Scott, ... Proceedings of the 9th European Conference on Information Warfare and …, 2010 | 9 | 2010 |
Resilient secret sharing cloud based architecture for data vault D Lanc, L Fan, L Mackinnon, B Buchanan US Patent 10,979,222, 2021 | 6 | 2021 |
Applied web traffic analysis for numerical encoding of SQL injection attack features SO Uwagbole, W Buchanan, L Fan European Conference on Cyber Warfare and Security, 393, 2016 | 6 | 2016 |
Patient simulator: Towards testing and validation of e-Health infrastructures O Lo, L Fan, W Buchanan, C Thümmler, A Khedim, A Lawson, O Uthmani, ... Proceedings of the Pervasive Health, 29-30, 2011 | 6 | 2011 |
Interagency data exchange protocols as computational data protection law W Buchanan, L Fan, A Lawson, B Schafer, R Scott, C Thuemmler, ... Legal Knowledge and Information Systems, 143-146, 2010 | 6 | 2010 |