Threat modeling for CSRF attacks X Lin, P Zavarsky, R Ruhl, D Lindskog 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 87 | 2009 |
Comparative analysis of volatile memory forensics: live response vs. memory imaging A Aljaedi, D Lindskog, P Zavarsky, R Ruhl, F Almari 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 77 | 2011 |
An analysis of black-box web application security scanners against stored SQL injection N Khoury, P Zavarsky, D Lindskog, R Ruhl 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 52 | 2011 |
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev. 1: 2014 and ISO/IEC 27037: 2012 A Ajijola, P Zavarsky, R Ruhl World Congress on Internet Security (WorldCIS-2014), 66-73, 2014 | 49 | 2014 |
Trend analysis of the cve for software vulnerability management YY Chang, P Zavarsky, R Ruhl, D Lindskog 2011 IEEE third international conference on privacy, security, risk and …, 2011 | 49 | 2011 |
A review and comparative study of digital forensic investigation models K Kyei, P Zavarsky, D Lindskog, R Ruhl Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013 | 36 | 2013 |
An efficient framework for IT controls of bill 198 (Canada Sarbanes-Oxley) compliance by aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002 Z Huang, P Zavarsky, R Ruhl 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 33 | 2009 |
Testing and assessing web vulnerability scanners for persistent SQL injection attacks N Khoury, P Zavarsky, D Lindskog, R Ruhl proceedings of the first international workshop on security and privacy …, 2011 | 30 | 2011 |
Risk mitigation strategies for mobile Wi-Fi robot toys from online pedophiles S Yong, D Lindskog, R Ruhl, P Zavarsky 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 29 | 2011 |
An investigative analysis of the security weaknesses in the evolution of RFID enabled passport EA Bogari, P Zavarsky, D Lindskog, R Ruhl International Journal of Internet Technology and Secured Transactions 4 (4 …, 2012 | 27 | 2012 |
A Study of the Effectiveness of CSRF Guard B Chen, P Zavarsky, R Ruhl, D Lindskog 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 27 | 2011 |
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score A Ali, P Zavarsky, D Lindskog, R Ruhl 2011 World Congress on Internet Security (WorldCIS-2011), 109-113, 2011 | 26 | 2011 |
Using healthcare authority and patient blockchains to develop a tamper-proof record tracking system U Goel, R Ruhl, P Zavarsky 2019 IEEE 5th intl conference on big data security on cloud (BigDataSecurity …, 2019 | 25 | 2019 |
The study of evasion of packed pe from static detection M Baig, P Zavarsky, R Ruhl, D Lindskog World Congress on Internet Security (WorldCIS-2012), 99-104, 2012 | 23 | 2012 |
An analysis of CVSS v2 environmental scoring AO Ibidapo, P Zavarsky, D Lindskog, R Ruhl 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 22 | 2011 |
Enhanced user security and privacy protection in 4G LTE network OE Ekene, R Ruhl, P Zavarsky 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 21 | 2016 |
Redesigning secure element access control for NFC enabled Android smartphones using mobile trusted computing W Anwar, D Lindskog, P Zavarsky, R Ruhl International Conference on Information Society (i-Society 2013), 27-34, 2013 | 20 | 2013 |
Fault tree analysis of accidental insider security events P Patil, P Zavarsky, D Lindskog, R Ruhl 2012 International Conference on Cyber Security, 113-118, 2012 | 19 | 2012 |
The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches H Nnoli, D Lindskog, P Zavarsky, S Aghili, R Ruhl 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 16 | 2012 |
The implementation of a full EMV smartcard for a point-of-sale transaction and its impact on the PCI DSS O Ogundele, P Zavarsky, R Ruhl, D Lindskog 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 16 | 2012 |