Остановите войну!
for scientists:
default search action
David Llewellyn-Jones
- > Home > Persons > David Llewellyn-Jones
Publications
- 2020
- [j11]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
A community-based social P2P network for sharing human life digital memories. Trans. Emerg. Telecommun. Technol. 31(4) (2020) - [j10]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring communities for sharing human digital memories in a social P2P network. Peer-to-Peer Netw. Appl. 13(5): 1629-1642 (2020) - [i1]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring Communities for Sharing Human Digital Memories in a Social P2P Network. CoRR abs/2004.08441 (2020) - 2015
- [j8]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. Secur. Commun. Networks 8(18): 4041-4052 (2015) - 2014
- [j7]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Creating human digital memories with the aid of pervasive mobile devices. Pervasive Mob. Comput. 12: 160-178 (2014) - [c34]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
The Big Data Obstacle of Lifelogging. AINA Workshops 2014: 922-926 - [p5]David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. Cyberpatterns 2014: 73-84 - [p4]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p3]Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - 2013
- [j6]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones, Faycal Bouhafs:
Exploiting linked data to create rich human digital memories. Comput. Commun. 36(15-16): 1639-1656 (2013) - [j5]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. IEEE Syst. J. 7(2): 236-248 (2013) - [c33]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c31]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Creating human digital memories for a richer recall of life experiences. ICNSC 2013: 246-251 - [c30]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. PST 2013: 82-87 - [c29]Muhammad Asim, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - 2012
- [j4]Miguel García, David Llewellyn-Jones, Francisco Ortin, Madjid Merabti:
Applying dynamic separation of aspects to distributed systems security: A case study. IET Softw. 6(3): 231-248 (2012) - [c28]Chelsea Dobbins, Paul Fergus, Madjid Merabti, David Llewellyn-Jones:
Monitoring and measuring sedentary behaviour with the aid of human digital memories. CCNC 2012: 395-398 - [c27]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - [c26]Chelsea Dobbins, Paul Fergus, Madjid Merabti, David Llewellyn-Jones:
Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories. ICC 2012: 6101-6105 - [c25]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Augmenting human digital memories with physiological data. NESEA 2012: 1-7 - [c24]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services. PerCom Workshops 2012: 64-69 - [c23]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - 2011
- [c22]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
The effect of direct interactions on reputation based schemes in mobile ad hoc networks. CCNC 2011: 297-302 - [c21]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - 2010
- [c18]Chunlin Song, Sud Sudirman, Madjid Merabti, David Llewellyn-Jones:
Analysis of Digital Image Watermark Attacks. CCNC 2010: 1-5 - [c17]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [c16]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks. Wireless Days 2010: 1-6 - [p2]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552 - 2009
- [c15]Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, David Llewellyn-Jones:
Monitoring connectivity in wireless sensor networks. ISCC 2009: 507-512 - 2008
- [c13]Paul Fergus, David Llewellyn-Jones, Amjad Shaheed, Madjid Merabti, Abdennour El Rhalibi:
Networked Appliances: Manipulation of 3D Multimedia Streams. CCNC 2008: 1117-1122 - 2007
- [c11]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49 - [c10]Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi:
Bridging the Gap between Networked Appliances and Virtual Worlds. AINA Workshops (1) 2007: 935-940 - [c9]Djamel Djenouri, Othmane Mahmoudi, Mohamed Bouamama, David Llewellyn-Jones, Madjid Merabti:
On Securing MANET Routing Protocol Against Control Packet Dropping. ICPS 2007: 100-108 - [c8]Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon:
Networked Appliances for Home Healthcare and Lifestyle Management. IHN 2007: 313-328 - 2006
- [j1]Madjid Merabti, David Llewellyn-Jones:
Digital Rights Management in Ubiquitous Computing. IEEE Multim. 13(2): 32-42 (2006) - 2005
- [c5]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Buffer Overrun Prevention Through Component Composition Analysis. COMPSAC (1) 2005: 156-163 - [c4]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. SecureComm 2005: 243-248 - 2004
- [c3]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
A security framework for executables in a ubiquitous computing environment. GLOBECOM 2004: 2158-2163 - [c2]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. ITCC (1) 2004: 112-117
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint