Experimental analysis of ransomware on windows and android platforms: Evolution and characterization P Zavarsky, D Lindskog Procedia Computer Science 94, 465-472, 2016 | 180 | 2016 |
Threat modeling for CSRF attacks X Lin, P Zavarsky, R Ruhl, D Lindskog 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 93 | 2009 |
Comparative analysis of volatile memory forensics: live response vs. memory imaging A Aljaedi, D Lindskog, P Zavarsky, R Ruhl, F Almari 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 79 | 2011 |
Trend analysis of the cve for software vulnerability management YY Chang, P Zavarsky, R Ruhl, D Lindskog 2011 IEEE third international conference on privacy, security, risk and …, 2011 | 58 | 2011 |
An analysis of black-box web application security scanners against stored SQL injection N Khoury, P Zavarsky, D Lindskog, R Ruhl 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 55 | 2011 |
A review and comparative study of digital forensic investigation models K Kyei, P Zavarsky, D Lindskog, R Ruhl Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013 | 41 | 2013 |
Testing and assessing web vulnerability scanners for persistent SQL injection attacks N Khoury, P Zavarsky, D Lindskog, R Ruhl proceedings of the first international workshop on security and privacy …, 2011 | 33 | 2011 |
Experimental analysis of tools used for doxing and proposed new transforms to help organizations protect against doxing attacks P Khanna, P Zavarsky, D Lindskog Procedia Computer Science 94, 459-464, 2016 | 30 | 2016 |
Risk mitigation strategies for mobile Wi-Fi robot toys from online pedophiles S Yong, D Lindskog, R Ruhl, P Zavarsky 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 30 | 2011 |
A Study of the Effectiveness of CSRF Guard B Chen, P Zavarsky, R Ruhl, D Lindskog 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 30 | 2011 |
An investigative analysis of the security weaknesses in the evolution of RFID enabled passport EA Bogari, P Zavarsky, D Lindskog, R Ruhl International Journal of Internet Technology and Secured Transactions 4 (4 …, 2012 | 27 | 2012 |
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score A Ali, P Zavarsky, D Lindskog, R Ruhl 2011 World Congress on Internet Security (WorldCIS-2011), 109-113, 2011 | 27 | 2011 |
The study of evasion of packed pe from static detection M Baig, P Zavarsky, R Ruhl, D Lindskog World Congress on Internet Security (WorldCIS-2012), 99-104, 2012 | 26 | 2012 |
Redesigning secure element access control for NFC enabled Android smartphones using mobile trusted computing W Anwar, D Lindskog, P Zavarsky, R Ruhl International Conference on Information Society (i-Society 2013), 27-34, 2013 | 23 | 2013 |
An analysis of CVSS v2 environmental scoring AO Ibidapo, P Zavarsky, D Lindskog, R Ruhl 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 22 | 2011 |
Fault tree analysis of accidental insider security events P Patil, P Zavarsky, D Lindskog, R Ruhl 2012 International Conference on Cyber Security, 113-118, 2012 | 20 | 2012 |
The implementation of a full EMV smartcard for a point-of-sale transaction and its impact on the PCI DSS O Ogundele, P Zavarsky, R Ruhl, D Lindskog 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 17 | 2012 |
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 16 | 2012 |
Performance analysis of oracle database in virtual environments FN Almari, P Zavarsky, R Ruhl, D Lindskog, A Aljaedi 2012 26th International Conference on Advanced Information Networking and …, 2012 | 16 | 2012 |
GSM OTA SIM cloning attack and cloning resistance in EAP-SIM and USIM J Singh, R Ruhl, D Lindskog 2013 International Conference on Social Computing, 1005-1010, 2013 | 14 | 2013 |