default search action
12th ICGS3 2019: London, UK
- 12th IEEE International Conference on Global Security, Safety and Sustainability, ICGS3 2019, London, UK, January 16-18, 2019. IEEE 2019, ISBN 978-1-5386-7001-9
- Anh Do, John McCarthy:
Categorization of Threats and their Impacts on Critical National Infrastructure Systems. - David A. E. Haddon, Haider M. Al-Khateeb:
Investigating Data Exfiltration in DNS Over HTTPS Queries. - Jabran Riaz:
Retail Industry Gift Card Hacking Technique Challenges. - Jamie O'Hare, Rich Macfarlane, Owen Lo:
Identifying Vulnerabilities Using Internet-Wide Scanning Data. - Uzma Mustafa, Eckhard Pflügel, Nada Philip:
A Novel Privacy Framework for Secure M-Health Applications: The Case of the GDPR. - Reza Montasari, Richard Hill:
Next-Generation Digital Forensics: Challenges and Future Paradigms. - Nuno Castro, Henrique M. Dinis Santos, Vítor J. Sá, Maria José Magalhães:
Study of the Means of Online Payment in the Portuguese Population. - Uzma Mustafa, Nada Philip:
Group-Based Key Exchange for Medical IoT Device-to-Device Communication (D2D) Combining Secret Sharing and Physical Layer Key Exchange. - Mohan Krishna Kagita:
Security and Privacy Issues for Business Intelligence in lOT. - Sherese Bishop:
The Internet of Things: Implications for Consumer Privacy & Security. - Martin J. Tunnicliffe, Omego Obinna, Eckhard Pflügel:
Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces. - Stefan Kendzierskyj, Hamid Jahankhani:
The Role of Blockchain in Supporting Critical National Infrastructure. - Elias Pimenidis, Nikolaos Polatidis:
Secure Social Media Spaces for Communities of Vulnerable People. - Asifa Shad, Tariq Abdullah, Usman Butt:
Web Accessibility Adoption Framework (WAAF) for Businesses and Web Professionals. - Jaime Ibarra Jimenez, Hamid Jahankhani:
"Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information (PHI) Processed by IoT-based Telemedicine Devices and Applications Within Healthcare Services. - Danisa Nkomo, Ray Brown:
Hybrid Cybersecurity Framework for the Internet of Medical Things (IOMT). - Sergio De Abreu:
A Feasibility Study on Machine Learning Techniques for APT Detection and Protection in VANETs. - Amal Durou, Somaya Al-Máadeed, Ibrahim A. Aref, Ahmed Bouridane, Mosa Elbendak:
A Comparative Study of Machine Learning Approaches for Handwriter Identification. - Anita Collins, Hamid Jahankhani:
Blockchain as a Tool for Financial Transparency in Development Aid. - Jacopo Semeraro:
An Investigatory Project on the Anonymity of Blockchain and Cryptocurrencies. - George Copeland, John McCarthy:
Practical Cybersecurity for Digital Trains. - Binay Dahal, Yoohwan Kim:
AutoEncoded Domains with Mean Activation for DGA Botnet Detection. - Rodrigo Ruiz:
A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity. - Ian Mitchell, Sukhvinder Hara, M. Sheriff:
dAppER: Decentralised Application for Examination Review. - Liam Odell, Hamid Jahankhani:
AI: The Cyber-Physical Project Manager and their Digital Twin. - Stefan Kendzierskyj, Hamid Jahankhani:
Blockchain as an Efficient and Alternative Mechanism for Strengthening and Securing the Privacy of Healthcare Patient and Clinical Research Data. - Ahuokpeme Chibueze Brendan, John McCarthy:
Taxonomy of Threat Categorization and Threat Intelligence Platform. - Bharat Manya:
BRT - (Blockchain Relevance Theory): A Theoretical Framework for Blockchain & DLT in Cyber Security Using CISv7 Controls. - Tariq Abdullah, Andrew Jones:
eHealth: Challenges Far Integrating BlockChain within Healthcare. - Nishan Chelvachandran, Hamid Jahankhani:
Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social Media. - Jake L. Beavers, Michael Faulks, Jims Marchang:
Hacking NHS Pacemakers: A Feasibility Study. - Stephen S. Sampana:
FoRCE (Forensic Recovery of Cloud Evidence): A Digital Cloud Forensics Framework. - Jon Cosson, Haider Alhateeb:
An Approach to Identify Risk Based Human Behaviour Profiling within an Office Environment. - William Jahankhani, Liang Chen:
Email Verification Fake or Genuine? - Grace Adedotun-Ogundeji, Hamid Jahankhani:
Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the Future. - Abeer F. Alkhwaldi, Mumtaz M. Kamala, Rami Qahwaji:
Security Perceptions in Cloud-Based e-Govemment Services. - Bobby L. Tait:
Behavioural Biometrics Authentication Tested Using EyeWriter Technology. - Halima Abdul Halime Shnishah, David Mulvaney:
Encryption of Text File Using a User Controlled Automatically-Generated Key. - Farah Ahmed, Fouad Khelifi, Ashref Lawgaly, Ahmed Bouridane:
Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification. - Sina Pournouri, Shahrzad Zargari, Babak Akhgar:
An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber Attacks. - Yousuf AlBlooshi, Amin Hosseinian Far:
A Novel Framework for Identification of Critical Business Processes. - Rahul Ravindran:
Circle of Trust: A High Volume, Energy Efficient, Stake Blind and High Attack Tolerant Blockchain Consensus Protocol. - Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Gregory Epiphaniou, Jon Cosson, Hamid Jahankhani, Prashant Pillai:
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace. - Jaime Ibarra Jimenez, Usman Javed Butt, Anh Do, Hamid Jahankhani, Arshad Jamal:
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure. - Firas Hazzaa, Sufian Yousef, Nada H. Ali, Erika Sanchez:
The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network. - Joseph Zernik:
Cybersecurity and Law in Israel - A Case Study. - John Goldie, Hamid Jahankhani:
Ethical Considerations of People with Autistic Spectrum Disorder. - Mohamed Shaik Honnurvali, Naren Gupta, Keng Goh, Tariq Umar, Adnan Kabbani, Needa Nazecma:
Can Future Smart Cities Powered by 100% Renewables and Made Cyber Secured-A Analytical Approach. - Usman Javed Butt, Maysam Abbod, Anzor Lors, Hamid Jahankhani, Arshad Jamal, Arvind Kumar:
Ransomware Threat and its Impact on SCADA. - Joseph Waldu Woensdregt, Haider M. Al-Khateeb, Gregory Epiphaniou, Hamid Jahankhani:
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms. - Yvan Da Silva Ramos, John McCarthy:
Management Versus Technical Perspectives on Threats. - Samar Muslah Albladi, George R. S. Weir:
A Conceptual Model to Predict Social Engineering Victims. - Thomas Welsh:
A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment. - Homan Forouzan, Hamid Jahankhani:
An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police Service. - Nishan Chelvachandran, Hamid Jahankhani:
A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social Media.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.