default search action
Paul Kearney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Abiodun Ayantayo, Amrit Kaur, Anit Kour, Xavier Schmoor, Fayyaz Shah, Ian Vickers, Paul Kearney, Mohammed M. Abdelsamea:
Network intrusion detection using feature fusion with deep learning. J. Big Data 10(1): 167 (2023) - 2022
- [j9]Thomas Nagunwa, Paul Kearney, Shereen Fouad:
A machine learning approach for detecting fast flux phishing hostnames. J. Inf. Secur. Appl. 65: 103125 (2022) - 2021
- [c16]Carolina Adaros Boye, Paul Kearney, Mark B. Josephs, Hans Ulmer:
An Indicators-of-Risk Library for Industrial Network Security. ARES 2021: 134:1-134:9 - [c15]Mujahid Muhammad, Paul Kearney, Adel Aneiba, Junaid Arshad, Andreas Kunz:
RMCCS: RSSI-based Message Consistency Checking Scheme for V2V Communications. SECRYPT 2021: 722-727 - 2020
- [c14]Mujahid Muhammad, Paul Kearney, Adel Aneiba, Andreas Kunz:
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in V2V Communications. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j8]Lida Ghahremanlou, Abdel-Rahman H. Tawil, Paul Kearney, Hossein Nevisi, Xia Zhao, Ali Abdallah:
A Survey of Open Data Platforms in Six UK Smart City Initiatives. Comput. J. 62(7): 961-976 (2019) - [c13]Carolina Adaros Boye, Paul Kearney, Mark B. Josephs:
Continuous Risk Management for Industrial IoT: A Methodological View. CRiSIS 2019: 34-49 - [c12]Mujahid Muhammad, Paul Kearney, Adel Aneiba, Andreas Kunz:
Analysis of Security Overhead in Broadcast V2V Communications. SAFECOMP Workshops 2019: 251-263 - [c11]Paul Kearney, Rasool Asal:
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems. SERVICES 2019: 366-367 - 2018
- [c10]Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton:
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services. CNS 2018: 1-7 - [c9]Carolina Adaros Boye, Paul Kearney, Mark B. Josephs:
Collective Responsibility and Mutual Coercion in IoT Botnets - A Tragedy of the Commons Problem. ICETE (1) 2018: 636-646 - [c8]Carolina Adaros Boye, Paul Kearney, Mark B. Josephs:
Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment. ISC 2018: 502-519 - 2014
- [j7]Michalis Pavlidis, Shareeful Islam, Haralambos Mouratidis, Paul Kearney:
Modeling Trust Relationships for Developing Trustworthy Information Systems. Int. J. Inf. Syst. Model. Des. 5(1): 25-48 (2014) - 2012
- [c7]Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam, Paul Kearney:
Dealing with trust and control: A meta-model for trustworthy information systems development. RCIS 2012: 1-9 - [c6]Paul Kearney:
Towards a C2I Platform for Combating the Cyber-Threat. WISTP 2012: 17-19
2000 – 2009
- 2008
- [c5]Jorge J. Villalón, Paul Kearney, Rafael A. Calvo, Peter Reimann:
Glosser: Enhanced Feedback for Student Writing Tasks. ICALT 2008: 454-458 - 2007
- [j6]Paul Kearney, Maja Pivec:
Sex, lies and video games. Br. J. Educ. Technol. 38(3): 489-501 (2007) - [j5]Paul Kearney:
Cognitive assessment of game-based learning. Br. J. Educ. Technol. 38(3): 529-531 (2007) - [j4]Maja Pivec, Paul Kearney:
Games for Learning and Learning from Games. Informatica (Slovenia) 31(4): 419-423 (2007) - 2006
- [j3]Emily W. Xu, Paul Kearney, Daniel G. Brown:
The Use of Functional Domains to Improve Transmembrane Protein Topology Prediction. J. Bioinform. Comput. Biol. 4(1): 109-124 (2006) - 2005
- [j2]Paul Kearney:
Message level security for web services. Inf. Secur. Tech. Rep. 10(1): 41-50 (2005) - [c4]Emily W. Xu, Daniel G. Brown, Paul Kearney:
The use of functional domains to improve transmembrane protein topology prediction. APBC 2005: 105-116 - [c3]Paul Kearney:
Cognitive Callisthenics: Do FPS computer games enhance the player's cognitive abilities?. DiGRA Conference 2005 - [c2]Paul Kearney:
Playing in the Sandbox: Developing games for children with disabilities.. DiGRA Conference 2005 - 2002
- [j1]María Dolores Rodríguez-Moreno, Paul Kearney:
Integrating AI planning techniques with workflow management system. Knowl. Based Syst. 15(5-6): 285-291 (2002) - 2000
- [c1]R. E. Smith, Claudio Bonacine, Paul Kearney, Torsten Eymann:
Integrating economics and genetics models in information ecosystems. CEC 2000: 959-966
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint