76 results on '"Vidalis, Stilianos"'
Search Results
2. Technical Report relating to CVE-2022-46480, CVE-2023-26941, CVE-2023-26942, and CVE-2023-26943
3. Automated passive income from stock market using machine learning and big data analytics with security aspects
4. MIDAS: Multi-layered attack detection architecture with decision optimisation
5. Smart homes under siege: Assessing the robustness of physical security against wireless network attacks
6. An Incentive Mechanism for Managing Obligation Delegation
7. Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases
8. Security Evaluation of Companion Android Applications in IoT: The Case of Smart Security Devices.
9. A Trust-Based Approach for Data Sharing in the MQTT Environment
10. Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networks
11. Automated Passive Income from Stock Market Using Machine Learning and Big Data Analytics with Security Aspects-Retracted
12. Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases
13. A Model of Deploying Deception in a Computer Network Operations (CNO) Environment
14. Inter‐organisational intrusion detection using knowledge grid technology
15. Study and Analysis of Threat Assessment Model and Methodology in Real-Time Informational Environment
16. Toward situational awareness in threat detection. A survey
17. Towards the Resolution of Safety and Security Conflicts
18. A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues
19. Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment
20. Toward situational awareness in threat detection. A survey.
21. Bio-Cyber Operations Inspired by the Human Immune System.
22. Assessing cyber-threats in the information environment
23. Rethinking digital forensics
24. Rethinking Digital Forensics
25. Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networks
26. Information security and digital forensics in the world of cyber physical systems
27. The 2016 Hard Disk Study on Information Available on the Second Hand Market in the UK.
28. Proactively Defending Computing Infrastructures through\ud the Implementation of Live Forensics and Capture in\ud Corporate Network Security
29. Towards ‘Crime Specific’ Digital Investigation Frameworks
30. Deception and Manoeuvre Warfare Utilising Cloud Resources
31. An Ontological Approach to Intelligence Gathering using Semantic Metadata
32. A DISCUSSION OF VIRTUALISATION TECHNOLOGIES: THE HEART OF CLOUD COMPUTING
33. Digital continuity at the Welsh Assembly Government: de-duplicating and classifying an unstructured email vault and shared drives
34. Management of Knowledge-based Grids
35. Digital Continuity:\ud Record Classification and Retention on\ud Shared Drives and Email Vaults
36. Educating Digital Forensic Investigators at Newport
37. Extracting Intelligence From Digital Forensic Artefacts.
38. A Model of Deploying Deception in a Computer Network Operations (CNO) Environment
39. Cell Based Intrusion Prevention System.
40. WHEN BIOLOGY MEETS CYBER-SECURITY.
41. Forensically Classifying Files Using HSOM Algorithms
42. Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture
43. On the Road to Virtualized Environment
44. Cloud Computing Storms
45. Security Through Deception
46. Inter‐organisational intrusion detection using knowledge grid technology
47. Who are you Today? Profiling the ID Theft Fraudster.
48. A Model of Deploying Deception in a Computer Network Operations (CNO) Environment.
49. Rethinking digital forensics
50. The 2016 hard disk study on information available on the second hand market in the UK
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.