Helge Janicke
Helge Janicke
Cyber Security Cooperative Research Centre
Email verificata su cybersecuritycrc.org.au
Citata da
Citata da
SCADA security in the light of Cyber-Warfare
A Nicholson, S Webber, S Dyer, T Patel, H Janicke
Computers & Security 31 (4), 418-436, 2012
Blockchain technologies for the internet of things: Research issues and challenges
MA Ferrag, M Derdour, M Mukherjee, A Derhab, L Maglaras, H Janicke
IEEE Internet of Things Journal 6 (2), 2188-2204, 2018
Authentication protocols for internet of things: a comprehensive survey
MA Ferrag, LA Maglaras, H Janicke, J Jiang, L Shu
Security and Communication Networks 2017, 2017
Cyber warfare: Issues and challenges
M Robinson, K Jones, H Janicke
Computers & security 49, 70-94, 2015
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
MA Ferrag, L Maglaras, A Argyriou, D Kosmanos, H Janicke
Journal of Network and Computer Applications 101, 55-82, 2018
Social internet of vehicles for smart cities
LA Maglaras, AH Al-Bayatti, Y He, I Wagner, H Janicke
Journal of Sensor and Actuator Networks 5 (1), 3, 2016
Human behaviour as an aspect of cybersecurity assurance
M Evans, LA Maglaras, Y He, H Janicke
Security and Communication Networks 9 (17), 4667-4679, 2016
Cyber security of critical infrastructures
LA Maglaras, KH Kim, H Janicke, MA Ferrag, S Rallis, P Fragkou, ...
Ict Express 4 (1), 42-45, 2018
Vulnerability analysis of network scanning on SCADA systems
K Coffey, R Smith, L Maglaras, H Janicke
Security and Communication Networks 2018, 2018
A survey on privacy-preserving schemes for smart grid communications
MA Ferrag, LA Maglaras, H Janicke, J Jiang
arXiv preprint arXiv:1611.07722, 2016
A systematic review of data protection and privacy preservation schemes for smart grid communications
MA Ferrag, LA Maglaras, H Janicke, J Jiang, L Shu
Sustainable cities and society 38, 806-835, 2018
Semantics-aware detection of targeted attacks: a survey
R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017
Data confidentiality in mobile ad hoc networks
H Aldabbas, T Alwada'n, H Janicke, A Al-Bayatti
arXiv preprint arXiv:1203.1749, 2012
A note on the formalisation of UCON
H Janicke, A Cau, H Zedan
Proceedings of the 12th ACM symposium on Access control models andá…, 2007
Analysis and run-time verification of dynamic security policies
H Janicke, F Siewe, K Jones, A Cau, H Zedan
International Workshop on Defence Applications of Multi-Agent Systems, 92-103, 2005
Internet of cloud: Security and privacy issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challengesá…, 2018
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
MA Ferrag, L Maglaras, S Moschoyiannis, H Janicke
Journal of Information Security and Applications 50, 102419, 2020
Route optimization of electric vehicles based on dynamic wireless charging
D Kosmanos, LA Maglaras, M Mavrovouniotis, S Moschoyiannis, ...
IEEE Access 6, 42551-42565, 2018
Concurrent enforcement of usage control policies
H Janicke, A Cau, F Siewe, H Zedan
2008 IEEE Workshop on Policies for Distributed Systems and Networks, 111-118, 2008
A novel hierarchical intrusion detection system based on decision tree and rules-based models
A Ahmim, L Maglaras, MA Ferrag, M Derdour, H Janicke
2019 15th International Conference on Distributed Computing in Sensorá…, 2019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20