Urmăriți
Paul Jenkins
Paul Jenkins
Adresă de e-mail confirmată pe cardiffmet.ac.uk
Titlu
Citat de
Citat de
Anul
uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain
N Naik, P Jenkins
2020 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2020
1342020
Self-sovereign identity specifications: Govern your identity through your digital wallet using blockchain technology
N Naik, P Jenkins
2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020
1282020
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
N Naik, P Jenkins
2017 11th International Conference on Research Challenges in Information …, 2017
1182017
Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems
N Naik, P Jenkins
2020 IEEE International Symposium on Systems Engineering (ISSE), 1-6, 2020
712020
Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity
N Naik, P Jenkins
2020 7th International Conference on Behavioural and Social Computing (BESC …, 2020
552020
Sovrin network for decentralized digital identity: Analysing a self-sovereign identity system based on distributed ledger technology
N Naik, P Jenkins
2021 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2021
532021
Relax, it’sa game: Utilising gamification in learning agile scrum software development
N Naik, P Jenkins
2019 IEEE Conference on Games (CoG), 1-4, 2019
532019
Comparing attack models for it systems: Lockheed martin’s cyber kill chain, mitre att&ck framework and diamond model
N Naik, P Jenkins, P Grace, J Song
2022 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2022
502022
A secure mobile cloud identity: Criteria for effective identity and access management standards
N Naik, P Jenkins
2016 4th IEEE International Conference on Mobile Cloud Computing, Services …, 2016
492016
Web protocols and challenges of web latency in the web of things
N Naik, P Jenkins
2016 Eighth International Conference on ubiquitous and future networks …, 2016
462016
An analysis of open standard identity protocols in cloud computing security paradigm
N Naik, P Jenkins
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
442016
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019
392019
Native web communication protocols and their effects on the performance of web services and systems
N Naik, P Jenkins, P Davies, D Newell
2016 IEEE international conference on computer and information technology …, 2016
372016
Evaluating automatically generated YARA rules and enhancing their effectiveness
N Naik, P Jenkins, R Cooke, J Gillett, Y Jin
2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1146-1153, 2020
362020
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
N Naik, P Grace, P Jenkins, K Naik, J Song
Computers & Security 120, 102808, 2022
342022
Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots
N Naik, P Jenkins, R Cooke, L Yang
2018 IEEE International Conference on fuzzy systems (FUZZ-IEEE), 1-8, 2018
312018
Fuzzy-import hashing: A static analysis technique for malware detection
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On
Forensic Science International: Digital Investigation 37, 301139, 2021
302021
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On, K Naik, ...
Complex & Intelligent Systems 7, 687-702, 2021
292021
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019
292019
Big data security analysis approach using computational intelligence techniques in R for desktop users
N Naik, P Jenkins, N Savage, V Katos
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
292016
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20