Publications
Key Publications


- Book Chapter: Rabih Bashroush et al, “An Extensible ADL for Service-Oriented Architectures”, In: Information Systems Development - Towards a Service-Provision Society, ISBN: 978-0-387-84809-9, Publisher: Springer-Verlag, New York, September 2009.
More Publications
- Peter, S.A., Bacon, E., Dastbaz, M. (2009) ‘Learning styles, personalisation and adaptable e-learning.’ Fourteenth International Conference on Software Process Improvement Research, Education and Training, (INSPIRE 2009). Swindon: The British Computer Society. pp.77-87.
- Ali, L., Jahankhani, H., Jahankhani, H. (2008) ‘A look at online banking accessibility in the EU and the USA’ Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 3rd Annual Conference, University of East London, pp.137-147
- Shareef, S., Arreymbi, J., Jahankhani, H. and Pimenidis, E. (2010) ‘Multichannel delivery of services – initial pace towards M-Government: the case of Kurdistan region of Iraq’, Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 5th Annual Conference, University of East London, pp.54-63.
- Jahankhani, H.; Beqiri, E. (2008) ‘Memory-Based antiforensic tools and techniques’ International Journal of Information Security and Privacy, 2 (2) pp.1-13
- Shareef, S., Pimenidis, E., Arreymbi, J., Jahankhani, H. (2010) ‘Vision of Electronic Government implementation in Kurdistan region of Iraq’ 10th European Conference on e-Government ECEG 2010, National Centre for Taxation Studies, University of Limerick, Ireland 17-18 June 2010. Reading: Academic Conferences Limited. pp. 575-584.
- Mousavi, S. A.A., Pimenidis, E. & Jahankhani, H. (2010) ‘Five stage development framework for electronic government.’10th European Conference on e-Government. University of Limerick in the National Centre for Taxation Studies, Limerick, Ireland, 17-18 June 2010. Academic Conferences International (ACI).
- Jahankhani, H. (2009) ‘The Behaviour and Perceptions Of On-line Consumers: Risk, Risk Perception And Trust’, International Journal of Information Science and Technology’, International Journal of Information Science and Management, 7 (1) 79-90
- Mousavi, S.A.A, Pimenidis, E. & Jahankhani, H. (2008) ‘Using a Best Practice Case in Evaluating e-Government Potential in Iranian Cities.’ 8th European Conference on e-Government, Lausanne, Switzerland, Ecole Polytechnique 10-11 July 2008. Academic Conferences International (ACI).
- Chakrabarty, N., Preston, J. (2008) ‘Posturing fear in a world of performed evil: Terrorists, teachers, and evil neo-liberals’ in Fisher, R (Ed) (2008) ‘Perspectives on Evil and Human Wickedness’, Oxford Inter-Disciplinary Press. pp 227- 238
- Kala Sethupathy, D.S., Preston, D. and Imafidon, C.O. (2010) ‘Impact of corporate governance on information security practices in (UK) financial industry.’, Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 5th Annual Conference, University of East London, pp.135-142.
- Omosule, S., Preston, D., Shoniregun, C. (2008) ‘Towards Culture Influenced Virtual Learning Environment Trust (CIVLET) Framework’ Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 3rd Annual Conference, University of East London, pp.57-63
- Athif, A. and Pimenidis, E. (2009) ‘Ecrime threats on Egovernment – the case of Maldives’ Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 4th Annual Conference, University of East London, pp.16-25
- Okolo, S.N., Pimenidis, E., McDonald, A. (2008) ‘The Library Game – using creative games technology to develop the library, learning and information skills of our students – the story so far ' SCONUL Focus 43 (Spring) 33-36
- Savvas, I., Pimenidis, E., Sideridis, A. (2008) ‘Translating stakeholders needs to application requirements for e-government development projects’ Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 3rd Annual Conference, University of East London, pp.79-90
- Walcott, T.H; Palmer-Brown, D and Lee, S.W. (2008). "Early SME Market Prediction using USDNN",In Proceedings of the International Conference of Computational Intelligence and Intelligent Systems (ICCIIS'2008), London,United Kingdom, July 2-4,2008.
- Beqiri, E.; Lee. S. W.; Draganova, C. and Palmer-Brown, D. (2010) ‘A Neural Network Approach for Intrusion Detection Systems’, 5th Conference in Advances in Computing and Technology (London, United Kingdom, 27th Jan), pp. 209 -217.
- Palmer-Brown, D; Draganova, C; Lee, S.W. (2009) ‘Snap-Drift Neural Network for Selecting Student Feedback’ International Joint Conference on Neural Networks (IJCNN 09) pp.391-398
- Lee, S.W. et al. (2009) ‘Question response grouping for online diagnostic feedback’ Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 4th Annual Conference, University of East London, pp.68-76
- Palmer-Brown, D. et al (2009), ‘Modal Learning Neural Networks’ WSEAS Transactions on Computers 8 (2) 222-236
- Matieni, X., Dodds, S.J. and Lee, S.W. (2010) ‘Closed-loop control using a backpropagation algorithm: a practicable approach for energy loss minimisation in electrical drives.’, Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 5th Annual Conference, University of East London, pp.72-78.
- Fritzsche, M. et al. (2008) "Towards Performance Related Decision Support for Model Driven Engineering of Enterprise SOA Applications." Proceedings of the 15th IEEE International Conference on Engineering of Computer-Based Systems (ECBS), Belfast, Northern Ireland, April 2008. pp. 57-65
- S. Islam and S. H. Houmb, Towards a Framework for Offshore Outsource Software Development Risk
Management Model, to appear: Journal of Software (JSW), Special Issue on ICCIT 09, Academy Publisher.
- S. Islam, H. Mouratidis and J. Jürjens, A Framework to Support Alignment of Secure Software Engineering
with Legal Regulations, Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-
Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML), 2010, DOI:
10.1007/s10270-010-0154-z, Springer-Verlag.
- S. H. Houmb, S. Islam, E. Knauss, J. Jürjens and K. Schneider, Eliciting Security Requirements and Tracing
them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, Requirements Engineering
Journal (REJ), Vol 15, No 1, 2010, PP 63-93., March 2010, Special Issue on Security Requirements Engineering,
Springer-Verlag.
Navigation menus:
Site-wide menu
Local menu