Follow
Ron Ruhl
Ron Ruhl
Associate Professor, Concordia University of Edmonton
Verified email at concordia.ab.ca
Title
Cited by
Cited by
Year
Threat modeling for CSRF attacks
X Lin, P Zavarsky, R Ruhl, D Lindskog
2009 International Conference on Computational Science and Engineering 3 …, 2009
712009
Comparative analysis of volatile memory forensics: live response vs. memory imaging
A Aljaedi, D Lindskog, P Zavarsky, R Ruhl, F Almari
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
662011
An analysis of black-box web application security scanners against stored SQL injection
N Khoury, P Zavarsky, D Lindskog, R Ruhl
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
522011
Trend analysis of the cve for software vulnerability management
YY Chang, P Zavarsky, R Ruhl, D Lindskog
2011 IEEE third international conference on privacy, security, risk and …, 2011
362011
An efficient framework for IT controls of bill 198 (Canada Sarbanes-Oxley) compliance by aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002
Z Huang, P Zavarsky, R Ruhl
2009 International Conference on Computational Science and Engineering 3 …, 2009
332009
Testing and assessing web vulnerability scanners for persistent SQL injection attacks
N Khoury, P Zavarsky, D Lindskog, R Ruhl
proceedings of the first international workshop on security and privacy …, 2011
312011
A review and comparative study of digital forensic investigation models
K Kyei, P Zavarsky, D Lindskog, R Ruhl
International conference on digital forensics and cyber crime, 314-327, 2012
302012
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev. 1: 2014 and ISO/IEC 27037: 2012
A Ajijola, P Zavarsky, R Ruhl
World Congress on Internet Security (WorldCIS-2014), 66-73, 2014
292014
Risk mitigation strategies for mobile Wi-Fi robot toys from online pedophiles
S Yong, D Lindskog, R Ruhl, P Zavarsky
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
262011
An analysis of security weaknesses in the evolution of RFID enabled passport
EA Bogari, P Zavarsky, D Lindskog, R Ruhl
World Congress on Internet Security (WorldCIS-2012), 158-166, 2012
252012
A Study of the Effectiveness of CSRF Guard
B Chen, P Zavarsky, R Ruhl, D Lindskog
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
252011
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score
A Ali, P Zavarsky, D Lindskog, R Ruhl
2011 World Congress on Internet Security (WorldCIS-2011), 109-113, 2011
232011
The study of evasion of packed pe from static detection
M Baig, P Zavarsky, R Ruhl, D Lindskog
World Congress on Internet Security (WorldCIS-2012), 99-104, 2012
212012
Enhanced user security and privacy protection in 4G LTE network
OE Ekene, R Ruhl, P Zavarsky
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
182016
An analysis of CVSS v2 environmental scoring
AO Ibidapo, P Zavarsky, D Lindskog, R Ruhl
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
182011
Redesigning secure element access control for NFC enabled Android smartphones using mobile trusted computing
W Anwar, D Lindskog, P Zavarsky, R Ruhl
International Conference on Information Society (i-Society 2013), 27-34, 2013
172013
Fault tree analysis of accidental insider security events
P Patil, P Zavarsky, D Lindskog, R Ruhl
2012 International Conference on Cyber Security, 113-118, 2012
172012
Performance analysis of oracle database in virtual environments
FN Almari, P Zavarsky, R Ruhl, D Lindskog, A Aljaedi
2012 26th International Conference on Advanced Information Networking and …, 2012
172012
The implementation of a full EMV smartcard for a point-of-sale transaction and its impact on the PCI DSS
O Ogundele, P Zavarsky, R Ruhl, D Lindskog
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
142012
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches
H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20