Titre | Auteurs | DOI/URL |
---|---|---|
Bendiab Gueltoum Matthew Swann Joseph R.Rose Konstantinos-Panagiotis Grammatikakis Nicholas Kolokotronis Ioannis Koufos Stavros Shiaeles |
Consulter | |
Bendiab Gueltoum Stavros Shiaeles Frank Akpan Michalis Michaloliakos |
Consulter | |
Bendiab Gueltoum Stavros Shiaeles Nicholas Kolokotronis SotiriosBrotsis Konstantinos Limniotis |
Consulter | |
Bendiab Gueltoum Stavros Shiaeles Samia Boucherkha Bogdan Ghita |
Consulter | |
Bendiab Gueltoum Stavros Shiaeles Bogdan Ghita Muhammad Ali |
Consulter | |
Bendiab Gueltoum Matthew Swann Joseph Rose Stavros Shiaeles Nick Savage |
Consulter |
Titre | DOI/URL | Type |
---|---|---|
CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services | Consulter | Conférence |
CIDS: Collaborative Intrusion Detection System using Blockchain Technology | Consulter | Conférence |
Data Exfiltration: Methods and Detection Countermeasures | Consulter | Conférence |
IPASS: A Novel Open-Source Intelligence Password Scoring System | Consulter | Conférence |
Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study | Consulter | Conférence |
Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural Networks | Consulter | Conférence |
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT | Consulter | Conférence |
Tools for Network Traffic Generation - A Quantitative Comparison | Consulter | Conférence |
On the Security and Privacy of Hyperledger Fabric: Challenges and Open Issues | Consulter | Conférence |
A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning | Consulter | Conférence |
Advanced metering infrastructures: security risks and mitigation | Consulter | Conférence |
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning | Consulter | Conférence |
Detection of Insider Threats using Artificial Intelligence and Visualisation | Consulter | Conférence |
WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management | Consulter | Conférence |
A New Dynamic Trust Model for "On Cloud" Federated Identity Management | Consulter | Conférence |
A Dynamic Federated Identity Management Approach for Cloud-Based Environments | Consulter | Conférence |
A Novel Access Control Model for Securing Cloud API | Consulter | Conférence |
Cloud Computing API Security: Comparative analysis of access control systems | Consulter | Conférence |
XACML based Access Control Model for Securing Cloud Environment | Consulter | Conférence |
Assessment Criteria for Federated identity management in cloud computing | Consulter | Conférence |