uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain N Naik, P Jenkins 2020 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2020 | 134 | 2020 |
Self-sovereign identity specifications: Govern your identity through your digital wallet using blockchain technology N Naik, P Jenkins 2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020 | 128 | 2020 |
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect N Naik, P Jenkins 2017 11th International Conference on Research Challenges in Information …, 2017 | 118 | 2017 |
Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems N Naik, P Jenkins 2020 IEEE International Symposium on Systems Engineering (ISSE), 1-6, 2020 | 71 | 2020 |
Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity N Naik, P Jenkins 2020 7th International Conference on Behavioural and Social Computing (BESC …, 2020 | 55 | 2020 |
Sovrin network for decentralized digital identity: Analysing a self-sovereign identity system based on distributed ledger technology N Naik, P Jenkins 2021 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2021 | 53 | 2021 |
Relax, it’sa game: Utilising gamification in learning agile scrum software development N Naik, P Jenkins 2019 IEEE Conference on Games (CoG), 1-4, 2019 | 53 | 2019 |
Comparing attack models for it systems: Lockheed martin’s cyber kill chain, mitre att&ck framework and diamond model N Naik, P Jenkins, P Grace, J Song 2022 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2022 | 50 | 2022 |
A secure mobile cloud identity: Criteria for effective identity and access management standards N Naik, P Jenkins 2016 4th IEEE International Conference on Mobile Cloud Computing, Services …, 2016 | 49 | 2016 |
Web protocols and challenges of web latency in the web of things N Naik, P Jenkins 2016 Eighth International Conference on ubiquitous and future networks …, 2016 | 46 | 2016 |
An analysis of open standard identity protocols in cloud computing security paradigm N Naik, P Jenkins 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 44 | 2016 |
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules N Naik, P Jenkins, N Savage, L Yang 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019 | 39 | 2019 |
Native web communication protocols and their effects on the performance of web services and systems N Naik, P Jenkins, P Davies, D Newell 2016 IEEE international conference on computer and information technology …, 2016 | 37 | 2016 |
Evaluating automatically generated YARA rules and enhancing their effectiveness N Naik, P Jenkins, R Cooke, J Gillett, Y Jin 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1146-1153, 2020 | 36 | 2020 |
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity N Naik, P Grace, P Jenkins, K Naik, J Song Computers & Security 120, 102808, 2022 | 34 | 2022 |
Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots N Naik, P Jenkins, R Cooke, L Yang 2018 IEEE International Conference on fuzzy systems (FUZZ-IEEE), 1-8, 2018 | 31 | 2018 |
Fuzzy-import hashing: A static analysis technique for malware detection N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On Forensic Science International: Digital Investigation 37, 301139, 2021 | 30 | 2021 |
Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis N Naik, P Jenkins, N Savage, L Yang, T Boongoen, N Iam-On, K Naik, ... Complex & Intelligent Systems 7, 687-702, 2021 | 29 | 2021 |
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering N Naik, P Jenkins, N Savage, L Yang 2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019 | 29 | 2019 |
Big data security analysis approach using computational intelligence techniques in R for desktop users N Naik, P Jenkins, N Savage, V Katos 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016 | 29 | 2016 |