Follow
Dale Lindskog
Dale Lindskog
Concordia University of Edmonton
Verified email at concordia.ab.ca
Title
Cited by
Cited by
Year
Experimental analysis of ransomware on windows and android platforms: Evolution and characterization
P Zavarsky, D Lindskog
Procedia Computer Science 94, 465-472, 2016
1802016
Threat modeling for CSRF attacks
X Lin, P Zavarsky, R Ruhl, D Lindskog
2009 International Conference on Computational Science and Engineering 3 …, 2009
932009
Comparative analysis of volatile memory forensics: live response vs. memory imaging
A Aljaedi, D Lindskog, P Zavarsky, R Ruhl, F Almari
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
792011
Trend analysis of the cve for software vulnerability management
YY Chang, P Zavarsky, R Ruhl, D Lindskog
2011 IEEE third international conference on privacy, security, risk and …, 2011
582011
An analysis of black-box web application security scanners against stored SQL injection
N Khoury, P Zavarsky, D Lindskog, R Ruhl
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
552011
A review and comparative study of digital forensic investigation models
K Kyei, P Zavarsky, D Lindskog, R Ruhl
Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013
412013
Testing and assessing web vulnerability scanners for persistent SQL injection attacks
N Khoury, P Zavarsky, D Lindskog, R Ruhl
proceedings of the first international workshop on security and privacy …, 2011
332011
Experimental analysis of tools used for doxing and proposed new transforms to help organizations protect against doxing attacks
P Khanna, P Zavarsky, D Lindskog
Procedia Computer Science 94, 459-464, 2016
302016
Risk mitigation strategies for mobile Wi-Fi robot toys from online pedophiles
S Yong, D Lindskog, R Ruhl, P Zavarsky
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
302011
A Study of the Effectiveness of CSRF Guard
B Chen, P Zavarsky, R Ruhl, D Lindskog
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
302011
An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
EA Bogari, P Zavarsky, D Lindskog, R Ruhl
International Journal of Internet Technology and Secured Transactions 4 (4 …, 2012
272012
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score
A Ali, P Zavarsky, D Lindskog, R Ruhl
2011 World Congress on Internet Security (WorldCIS-2011), 109-113, 2011
272011
The study of evasion of packed pe from static detection
M Baig, P Zavarsky, R Ruhl, D Lindskog
World Congress on Internet Security (WorldCIS-2012), 99-104, 2012
262012
Redesigning secure element access control for NFC enabled Android smartphones using mobile trusted computing
W Anwar, D Lindskog, P Zavarsky, R Ruhl
International Conference on Information Society (i-Society 2013), 27-34, 2013
232013
An analysis of CVSS v2 environmental scoring
AO Ibidapo, P Zavarsky, D Lindskog, R Ruhl
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
222011
Fault tree analysis of accidental insider security events
P Patil, P Zavarsky, D Lindskog, R Ruhl
2012 International Conference on Cyber Security, 113-118, 2012
202012
The implementation of a full EMV smartcard for a point-of-sale transaction and its impact on the PCI DSS
O Ogundele, P Zavarsky, R Ruhl, D Lindskog
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
172012
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches
H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
162012
Performance analysis of oracle database in virtual environments
FN Almari, P Zavarsky, R Ruhl, D Lindskog, A Aljaedi
2012 26th International Conference on Advanced Information Networking and …, 2012
162012
GSM OTA SIM cloning attack and cloning resistance in EAP-SIM and USIM
J Singh, R Ruhl, D Lindskog
2013 International Conference on Social Computing, 1005-1010, 2013
142013
The system can't perform the operation now. Try again later.
Articles 1–20