Obserwuj
Paul Jenkins
Paul Jenkins
Zweryfikowany adres z cardiffmet.ac.uk
Tytuł
Cytowane przez
Cytowane przez
Rok
Self-sovereign identity specifications: Govern your identity through your digital wallet using blockchain technology
N Naik, P Jenkins
2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020
1042020
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
N Naik, P Jenkins
2017 11th International Conference on Research Challenges in Information …, 2017
992017
uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain
N Naik, P Jenkins
2020 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2020
972020
Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems
N Naik, P Jenkins
2020 IEEE International Symposium on Systems Engineering (ISSE), 1-6, 2020
562020
A secure mobile cloud identity: Criteria for effective identity and access management standards
N Naik, P Jenkins
2016 4th IEEE International Conference on Mobile Cloud Computing, Services …, 2016
462016
An analysis of open standard identity protocols in cloud computing security paradigm
N Naik, P Jenkins
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
442016
Web protocols and challenges of web latency in the web of things
N Naik, P Jenkins
2016 Eighth International Conference on ubiquitous and future networks …, 2016
432016
Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity
N Naik, P Jenkins
2020 7th International Conference on Behavioural and Social Computing (BESC …, 2020
402020
Relax, it’sa game: Utilising gamification in learning agile scrum software development
N Naik, P Jenkins
2019 IEEE Conference on Games (CoG), 1-4, 2019
402019
Sovrin network for decentralized digital identity: Analysing a self-sovereign identity system based on distributed ledger technology
N Naik, P Jenkins
2021 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2021
372021
Native web communication protocols and their effects on the performance of web services and systems
N Naik, P Jenkins, P Davies, D Newell
2016 IEEE international conference on computer and information technology …, 2016
362016
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019
352019
Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots
N Naik, P Jenkins, R Cooke, L Yang
2018 IEEE International Conference on fuzzy systems (FUZZ-IEEE), 1-8, 2018
292018
Big data security analysis approach using computational intelligence techniques in R for desktop users
N Naik, P Jenkins, N Savage, V Katos
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
282016
Enhancing windows firewall security using fuzzy reasoning
N Naik, P Jenkins
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
282016
Evaluating automatically generated YARA rules and enhancing their effectiveness
N Naik, P Jenkins, R Cooke, J Gillett, Y Jin
2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1146-1153, 2020
272020
A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems
N Naik, P Jenkins, N Savage
2019 international symposium on systems engineering (ISSE), 1-6, 2019
242019
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019
242019
Fuzzy reasoning based windows firewall for preventing denial of service attack
N Naik, P Jenkins
2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 759-766, 2016
242016
A fuzzy approach for detecting and defending against spoofing attacks on low interaction honeypots
N Naik, P Jenkins
2018 21st International Conference on Information Fusion (Fusion), 904-910, 2018
232018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20