![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
12th ICGS3 2019: London, UK
- 12th IEEE International Conference on Global Security, Safety and Sustainability, ICGS3 2019, London, UK, January 16-18, 2019. IEEE 2019, ISBN 978-1-5386-7001-9
- Anh Do, John McCarthy:
Categorization of Threats and their Impacts on Critical National Infrastructure Systems. - David A. E. Haddon, Haider M. Al-Khateeb:
Investigating Data Exfiltration in DNS Over HTTPS Queries. - Jabran Riaz:
Retail Industry Gift Card Hacking Technique Challenges. - Jamie O'Hare, Rich Macfarlane, Owen Lo:
Identifying Vulnerabilities Using Internet-Wide Scanning Data. - Uzma Mustafa, Eckhard Pflügel, Nada Philip:
A Novel Privacy Framework for Secure M-Health Applications: The Case of the GDPR. - Reza Montasari
, Richard Hill
:
Next-Generation Digital Forensics: Challenges and Future Paradigms. - Nuno Castro, Henrique M. Dinis Santos
, Vítor J. Sá
, Maria José Magalhães:
Study of the Means of Online Payment in the Portuguese Population. - Uzma Mustafa, Nada Philip:
Group-Based Key Exchange for Medical IoT Device-to-Device Communication (D2D) Combining Secret Sharing and Physical Layer Key Exchange. - Mohan Krishna Kagita
:
Security and Privacy Issues for Business Intelligence in lOT. - Sherese Bishop:
The Internet of Things: Implications for Consumer Privacy & Security. - Martin J. Tunnicliffe, Omego Obinna
, Eckhard Pflügel:
Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces. - Stefan Kendzierskyj, Hamid Jahankhani:
The Role of Blockchain in Supporting Critical National Infrastructure. - Elias Pimenidis, Nikolaos Polatidis
:
Secure Social Media Spaces for Communities of Vulnerable People. - Asifa Shad, Tariq Abdullah, Usman Butt
:
Web Accessibility Adoption Framework (WAAF) for Businesses and Web Professionals. - Jaime Ibarra Jimenez
, Hamid Jahankhani:
"Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information (PHI) Processed by IoT-based Telemedicine Devices and Applications Within Healthcare Services. - Danisa Nkomo, Ray Brown:
Hybrid Cybersecurity Framework for the Internet of Medical Things (IOMT). - Sergio De Abreu:
A Feasibility Study on Machine Learning Techniques for APT Detection and Protection in VANETs. - Amal Durou, Somaya Al-Máadeed
, Ibrahim A. Aref
, Ahmed Bouridane, Mosa Elbendak:
A Comparative Study of Machine Learning Approaches for Handwriter Identification. - Anita Collins, Hamid Jahankhani:
Blockchain as a Tool for Financial Transparency in Development Aid. - Jacopo Semeraro:
An Investigatory Project on the Anonymity of Blockchain and Cryptocurrencies. - George Copeland, John McCarthy:
Practical Cybersecurity for Digital Trains. - Binay Dahal, Yoohwan Kim:
AutoEncoded Domains with Mean Activation for DGA Botnet Detection. - Rodrigo Ruiz
:
A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity. - Ian Mitchell, Sukhvinder Hara
, M. Sheriff:
dAppER: Decentralised Application for Examination Review. - Liam Odell, Hamid Jahankhani:
AI: The Cyber-Physical Project Manager and their Digital Twin. - Stefan Kendzierskyj, Hamid Jahankhani:
Blockchain as an Efficient and Alternative Mechanism for Strengthening and Securing the Privacy of Healthcare Patient and Clinical Research Data. - Ahuokpeme Chibueze Brendan, John McCarthy:
Taxonomy of Threat Categorization and Threat Intelligence Platform. - Bharat Manya:
BRT - (Blockchain Relevance Theory): A Theoretical Framework for Blockchain & DLT in Cyber Security Using CISv7 Controls. - Tariq Abdullah, Andrew Jones:
eHealth: Challenges Far Integrating BlockChain within Healthcare. - Nishan Chelvachandran, Hamid Jahankhani:
Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social Media. - Jake L. Beavers, Michael Faulks, Jims Marchang:
Hacking NHS Pacemakers: A Feasibility Study. - Stephen S. Sampana:
FoRCE (Forensic Recovery of Cloud Evidence): A Digital Cloud Forensics Framework. - Jon Cosson, Haider Alhateeb:
An Approach to Identify Risk Based Human Behaviour Profiling within an Office Environment. - William Jahankhani, Liang Chen:
Email Verification Fake or Genuine? - Grace Adedotun-Ogundeji, Hamid Jahankhani:
Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the Future. - Abeer F. Alkhwaldi
, Mumtaz M. Kamala, Rami Qahwaji:
Security Perceptions in Cloud-Based e-Govemment Services. - Bobby L. Tait:
Behavioural Biometrics Authentication Tested Using EyeWriter Technology. - Halima Abdul Halime Shnishah, David Mulvaney:
Encryption of Text File Using a User Controlled Automatically-Generated Key. - Farah Ahmed, Fouad Khelifi, Ashref Lawgaly, Ahmed Bouridane:
Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification. - Sina Pournouri, Shahrzad Zargari, Babak Akhgar:
An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber Attacks. - Yousuf AlBlooshi, Amin Hosseinian Far
:
A Novel Framework for Identification of Critical Business Processes. - Rahul Ravindran:
Circle of Trust: A High Volume, Energy Efficient, Stake Blind and High Attack Tolerant Blockchain Consensus Protocol. - Gabriela Ahmadi-Assalemi
, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Jon Cosson, Hamid Jahankhani, Prashant Pillai:
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace. - Jaime Ibarra Jimenez
, Usman Javed Butt, Anh Do, Hamid Jahankhani, Arshad Jamal:
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure. - Firas Hazzaa
, Sufian Yousef, Nada H. Ali, Erika Sanchez:
The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network. - Joseph Zernik:
Cybersecurity and Law in Israel - A Case Study. - John Goldie, Hamid Jahankhani:
Ethical Considerations of People with Autistic Spectrum Disorder. - Mohamed Shaik Honnurvali, Naren Gupta, Keng Goh, Tariq Umar
, Adnan Kabbani, Needa Nazecma:
Can Future Smart Cities Powered by 100% Renewables and Made Cyber Secured-A Analytical Approach. - Usman Javed Butt, Maysam Abbod
, Anzor Lors, Hamid Jahankhani, Arshad Jamal, Arvind Kumar:
Ransomware Threat and its Impact on SCADA. - Joseph Waldu Woensdregt, Haider M. Al-Khateeb
, Gregory Epiphaniou
, Hamid Jahankhani:
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms. - Yvan Da Silva Ramos, John McCarthy:
Management Versus Technical Perspectives on Threats. - Samar Muslah Albladi, George R. S. Weir:
A Conceptual Model to Predict Social Engineering Victims. - Thomas Welsh:
A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment. - Homan Forouzan, Hamid Jahankhani:
An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police Service. - Nishan Chelvachandran, Hamid Jahankhani:
A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social Media.
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.