Self-sovereign identity specifications: Govern your identity through your digital wallet using blockchain technology N Naik, P Jenkins 2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020 | 106 | 2020 |
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect N Naik, P Jenkins 2017 11th International Conference on Research Challenges in Information …, 2017 | 100 | 2017 |
uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain N Naik, P Jenkins 2020 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2020 | 99 | 2020 |
Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems N Naik, P Jenkins 2020 IEEE International Symposium on Systems Engineering (ISSE), 1-6, 2020 | 59 | 2020 |
A secure mobile cloud identity: Criteria for effective identity and access management standards N Naik, P Jenkins 2016 4th IEEE International Conference on Mobile Cloud Computing, Services …, 2016 | 46 | 2016 |
An analysis of open standard identity protocols in cloud computing security paradigm N Naik, P Jenkins 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 44 | 2016 |
Web protocols and challenges of web latency in the web of things N Naik, P Jenkins 2016 Eighth International Conference on ubiquitous and future networks …, 2016 | 43 | 2016 |
Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity N Naik, P Jenkins 2020 7th International Conference on Behavioural and Social Computing (BESC …, 2020 | 40 | 2020 |
Relax, it’sa game: Utilising gamification in learning agile scrum software development N Naik, P Jenkins 2019 IEEE Conference on Games (CoG), 1-4, 2019 | 40 | 2019 |
Sovrin network for decentralized digital identity: Analysing a self-sovereign identity system based on distributed ledger technology N Naik, P Jenkins 2021 IEEE International Symposium on Systems Engineering (ISSE), 1-7, 2021 | 38 | 2021 |
Native web communication protocols and their effects on the performance of web services and systems N Naik, P Jenkins, P Davies, D Newell 2016 IEEE international conference on computer and information technology …, 2016 | 36 | 2016 |
Cyberthreat Hunting-Part 1: triaging ransomware using fuzzy hashing, import hashing and YARA rules N Naik, P Jenkins, N Savage, L Yang 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-6, 2019 | 35 | 2019 |
Honeypots that bite back: A fuzzy technique for identifying and inhibiting fingerprinting attacks on low interaction honeypots N Naik, P Jenkins, R Cooke, L Yang 2018 IEEE International Conference on fuzzy systems (FUZZ-IEEE), 1-8, 2018 | 29 | 2018 |
Big data security analysis approach using computational intelligence techniques in R for desktop users N Naik, P Jenkins, N Savage, V Katos 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016 | 28 | 2016 |
Enhancing windows firewall security using fuzzy reasoning N Naik, P Jenkins 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 28 | 2016 |
Evaluating automatically generated YARA rules and enhancing their effectiveness N Naik, P Jenkins, R Cooke, J Gillett, Y Jin 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 1146-1153, 2020 | 27 | 2020 |
Cyberthreat hunting-part 2: Tracking ransomware threat actors using fuzzy hashing and fuzzy c-means clustering N Naik, P Jenkins, N Savage, L Yang 2019 IEEE international conference on fuzzy systems (FUZZ-IEEE), 1-6, 2019 | 25 | 2019 |
A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems N Naik, P Jenkins, N Savage 2019 international symposium on systems engineering (ISSE), 1-6, 2019 | 24 | 2019 |
Fuzzy reasoning based windows firewall for preventing denial of service attack N Naik, P Jenkins 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 759-766, 2016 | 24 | 2016 |
A fuzzy approach for detecting and defending against spoofing attacks on low interaction honeypots N Naik, P Jenkins 2018 21st International Conference on Information Fusion (Fusion), 904-910, 2018 | 23 | 2018 |