Folgen
Paul Jenkins
Paul Jenkins
Bestätigte E-Mail-Adresse bei cardiffmet.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
Self-sovereign identity specifications: Govern your identity through your digital wallet using blockchain technology
N Naik, P Jenkins
2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020
1052020
uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain
N Naik, P Jenkins
2020 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2020
992020
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
N Naik, P Jenkins
2017 11th International Conference on Research Challenges in Information …, 2017
992017
Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems
N Naik, P Jenkins
2020 IEEE International Symposium on Systems Engineering (ISSE), 1-6, 2020
572020
A secure mobile cloud identity: Criteria for effective identity and access management standards
N Naik, P Jenkins
2016 4th IEEE International Conference on Mobile Cloud Computing, Services …, 2016
462016
An analysis of open standard identity protocols in cloud computing security paradigm
N Naik, P Jenkins
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
442016
Web protocols and challenges of web latency in the web of things
N Naik, P Jenkins
2016 Eighth International Conference on ubiquitous and future networks …, 2016
432016
Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity
N Naik, P Jenkins
2020 7th International Conference on Behavioural and Social Computing (BESC …, 2020
402020
Relax, it’sa game: Utilising gamification in learning agile scrum software development
N Naik, P Jenkins
2019 IEEE Conference on Games (CoG), 1-4, 2019
402019
Sovrin network for decentralized digital identity: Analysing a self-sovereign identity system based on distributed ledger technology
N Naik, P Jenkins
2021 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2021
382021
Native web communication protocols and their effects on the performance of web services and systems
N Naik, P Jenkins, P Davies, D Newell
2016 IEEE international conference on computer and information technology …, 2016
362016
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019
352019
Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots
N Naik, P Jenkins, R Cooke, L Yang
2018 IEEE International Conference on fuzzy systems (FUZZ-IEEE), 1-8, 2018
292018
Big data security analysis approach using computational intelligence techniques in R for desktop users
N Naik, P Jenkins, N Savage, V Katos
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
282016
Enhancing windows firewall security using fuzzy reasoning
N Naik, P Jenkins
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
282016
Evaluating automatically generated YARA rules and enhancing their effectiveness
N Naik, P Jenkins, R Cooke, J Gillett, Y Jin
2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1146-1153, 2020
272020
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering
N Naik, P Jenkins, N Savage, L Yang
2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019
252019
A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems
N Naik, P Jenkins, N Savage
2019 international symposium on systems engineering (ISSE), 1-6, 2019
242019
Fuzzy reasoning based windows firewall for preventing denial of service attack
N Naik, P Jenkins
2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 759-766, 2016
242016
A fuzzy approach for detecting and defending against spoofing attacks on low interaction honeypots
N Naik, P Jenkins
2018 21st International Conference on Information Fusion (Fusion), 904-910, 2018
232018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20