Helge Janicke
Helge Janicke
Cyber Security Cooperative Research Centre
Bestätigte E-Mail-Adresse bei cybersecuritycrc.org.au
Zitiert von
Zitiert von
SCADA security in the light of Cyber-Warfare
A Nicholson, S Webber, S Dyer, T Patel, H Janicke
Computers & Security 31 (4), 418-436, 2012
Blockchain technologies for the internet of things: Research issues and challenges
MA Ferrag, M Derdour, M Mukherjee, A Derhab, L Maglaras, H Janicke
IEEE Internet of Things Journal 6 (2), 2188-2204, 2018
A survey of COVID-19 contact tracing apps
N Ahmed, RA Michelin, W Xue, S Ruj, R Malaney, SS Kanhere, ...
IEEE access 8, 134577-134601, 2020
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
MA Ferrag, L Maglaras, S Moschoyiannis, H Janicke
Journal of Information Security and Applications 50, 102419, 2020
Authentication protocols for internet of things: a comprehensive survey
MA Ferrag, LA Maglaras, H Janicke, J Jiang, L Shu
Security and Communication Networks 2017, 2017
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
MA Ferrag, L Maglaras, A Argyriou, D Kosmanos, H Janicke
Journal of Network and Computer Applications 101, 55-82, 2018
Human behaviour as an aspect of cybersecurity assurance
M Evans, LA Maglaras, Y He, H Janicke
Security and Communication Networks 9 (17), 4667-4679, 2016
Cyber warfare: Issues and challenges
M Robinson, K Jones, H Janicke
Computers & security 49, 70-94, 2015
Social internet of vehicles for smart cities
LA Maglaras, AH Al-Bayatti, Y He, I Wagner, H Janicke
Journal of Sensor and Actuator Networks 5 (1), 3, 2016
A systematic review of data protection and privacy preservation schemes for smart grid communications
MA Ferrag, LA Maglaras, H Janicke, J Jiang, L Shu
Sustainable cities and society 38, 806-835, 2018
Cyber security of critical infrastructures
LA Maglaras, KH Kim, H Janicke, MA Ferrag, S Rallis, P Fragkou, ...
Ict Express 4 (1), 42-45, 2018
A novel hierarchical intrusion detection system based on decision tree and rules-based models
A Ahmim, L Maglaras, MA Ferrag, M Derdour, H Janicke
2019 15th International Conference on Distributed Computing in Sensor …, 2019
Route optimization of electric vehicles based on dynamic wireless charging
D Kosmanos, LA Maglaras, M Mavrovouniotis, S Moschoyiannis, ...
IEEE Access 6, 42551-42565, 2018
Vulnerability analysis of network scanning on SCADA systems
K Coffey, R Smith, L Maglaras, H Janicke
Security and Communication Networks 2018, 2018
Semantics-aware detection of targeted attacks: a survey
R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017
Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership
M Vitunskaite, Y He, T Brandstetter, H Janicke
Computers & Security 83, 313-331, 2019
HEART-IS: A novel technique for evaluating human error-related information security incidents
M Evans, Y He, L Maglaras, H Janicke
Computers & Security 80, 74-89, 2019
Internet of cloud: Security and privacy issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
Data confidentiality in mobile ad hoc networks
H Aldabbas, T Alwada'n, H Janicke, A Al-Bayatti
arXiv preprint arXiv:1203.1749, 2012
A note on the formalisation of UCON
H Janicke, A Cau, H Zedan
Proceedings of the 12th ACM symposium on Access control models and …, 2007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20