Follow
Lu Fan
Title
Cited by
Cited by
Year
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
2002017
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 IEEE 4th international conference on cloud computing, 219-226, 2011
1032011
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
832010
Mediator: a design framework for P2P MMOGs
L Fan, H Taylor, P Trinder
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support …, 2007
812007
An integrated cloud-based healthcare infrastructure
E Ekonomou, L Fan, W Buchanan, C Thuemmler
2011 IEEE third international conference on cloud computing technology and …, 2011
642011
Resilient secret sharing cloud based architecture for data vault
D Lanc, L Fan, L Mackinnon, B Buchanan
US Patent App. 15/216,176, 2017
572017
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
SO Uwagbole, WJ Buchanan, L Fan
2017 Seventh International Conference on Emerging Security Technologies (EST …, 2017
382017
SPoC: protecting patient privacy for e-health services in the cloud
L Fan, WJ Buchanan, O Lo, C Thümmler, A Lawson, O Uthmani, ...
232012
Numerical encoding to tame SQL injection attacks
SO Uwagbole, WJ Buchanan, L Fan
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 1253-1256, 2016
212016
The future internet: A world of secret shares
WJ Buchanan, D Lanc, E Ukwandu, L Fan, G Russell, O Lo
Future Internet 7 (4), 445-464, 2015
202015
Solving key design issues for massively multiplayer online games on peer-to-peer architectures
L Fan
Heriot-Watt University, 2009
192009
Formal security policy implementations in network firewalls
R Macfarlane, W Buchanan, E Ekonomou, O Uthmani, L Fan, O Lo
Computers & Security 31 (2), 253-270, 2012
182012
E-health: Chances and challenges of distributed, service oriented architectures
C Thuemmler, L Fan, WJ Buchanan, O Lo, E Ekonomou, AS Khedim
132012
Technical evaluation of an e-health platform.
O Lo, L Fan, WJ Buchanan, C Thuemmler
92012
Novel information sharing syntax for data sharing between police and community partners, using role-based security
O Uthmani, W Buchanan, A Lawson, C Thuemmler, L Fan, R Scott, ...
Proceedings of the 9th European Conference on Information Warfare and …, 2010
92010
Information sharing
O Uthmani, W Buchanan, A Lawson, L Fan
US Patent 9,043,867, 2015
82015
Crime risk evaluation within information sharing between the police and community partners
O Uthmani, W Buchanan, A Lawson, R Scott, B Schafer, L Fan, S Uthmani
Information & Communications Technology Law 20 (2), 57-81, 2011
82011
Resilient secret sharing cloud based architecture for data vault
D Lanc, L Fan, L Mackinnon, B Buchanan
US Patent 10,979,222, 2021
62021
Applied web traffic analysis for numerical encoding of SQL injection attack features
SO Uwagbole, W Buchanan, L Fan
European Conference on Cyber Warfare and Security, 393, 2016
62016
Patient simulator: Towards testing and validation of e-Health infrastructures
O Lo, L Fan, W Buchanan, C Thümmler, A Khedim, A Lawson, O Uthmani, ...
Proceedings of the Pervasive Health, 29-30, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20