A novel approach for improving information security management and awareness for home environments | 0 | 0.34 | 2021 |
Incorporating the human facet of security in developing systems and services | 0 | 0.34 | 2021 |
Comparing The Protection And Use Of Online Personal Information In South Africa And The United Kingdom In Line With Data Protection Requirements | 0 | 0.34 | 2020 |
Information Security Risk Communication: A User-Centric Approach | 0 | 0.34 | 2019 |
End-to-middle-to-end solution for IMS media plane security | 0 | 0.34 | 2019 |
Fast Predictive Maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL) - A Review. | 0 | 0.34 | 2019 |
Multi-Platform Authorship Verification | 0 | 0.34 | 2019 |
A Framework For Reporting And Dealing With End-User Security Policy Compliance | 0 | 0.34 | 2019 |
User Profiling Based on Application-Level Using Network Metadata | 0 | 0.34 | 2019 |
A proactive malicious software identification approach for digital forensic examiners | 0 | 0.34 | 2019 |
Rule-Based Security Monitoring of Containerized Environments | 0 | 0.34 | 2019 |
Physical Activity Recognition By Utilising Smartphone Sensor Signals | 0 | 0.34 | 2019 |
Misuse Detection in a Simulated IaaS Environment. | 0 | 0.34 | 2018 |
Continuous User Authentication Using Smartwatch Motion Sensor Data. | 0 | 0.34 | 2018 |
Identifying And Predicting The Factors Affecting End-Users' Risk-Taking Behavior | 1 | 0.36 | 2018 |
Facial-Forensic Analysis Tool. | 0 | 0.34 | 2018 |
Biometrically Linking Document Leakage to the Individuals Responsible. | 0 | 0.34 | 2018 |
Securing Cloud Storage by Transparent Biometric Cryptography. | 0 | 0.34 | 2018 |
A Novel Transparent User Authentication Approach For Mobile Applications | 0 | 0.34 | 2018 |
A Novel Transparent User Authentication Approach For Mobile Applications | 0 | 0.34 | 2018 |
Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers. | 1 | 0.36 | 2018 |
Insider Misuse Attribution using Biometrics | 2 | 0.37 | 2017 |
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. | 0 | 0.34 | 2017 |
A novel privacy preserving user identification approach for network traffic. | 3 | 0.41 | 2017 |
Unobtrusive Gait Recognition Using Smartwatches | 4 | 0.39 | 2017 |
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data. | 1 | 0.36 | 2016 |
Leveraging Biometrics for Insider Misuse Identification. | 0 | 0.34 | 2016 |
A suspect-oriented intelligent and automated computer forensic analysis. | 4 | 0.47 | 2016 |
Awareness of Mobile Device Security: A Survey of User's Attitudes | 0 | 0.34 | 2016 |
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment | 0 | 0.34 | 2016 |
Information security policies: A review of challenges and influencing factors | 0 | 0.34 | 2016 |
Evidence Collection in Cloud Provider Chains. | 1 | 0.37 | 2016 |
User profiling from network traffic via novel application-level interactions | 2 | 0.43 | 2016 |
A forensic acquisition and analysis system for IaaS. | 4 | 0.53 | 2016 |
Continuous and transparent multimodal authentication: reviewing the state of the art. | 4 | 0.38 | 2016 |
Activity Recognition using wearable computing | 0 | 0.34 | 2016 |
A Scalable Architecture for Distributed OSGi in the Cloud. | 0 | 0.34 | 2016 |
Security, Privacy and Usability – A Survey of Users’ Perceptions and Attitudes | 0 | 0.34 | 2015 |
An Identification of Variables Influencing the Establishment of Information Security Culture. | 3 | 0.40 | 2015 |
Continuous user authentication using multi-modal biometrics | 22 | 0.80 | 2015 |
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks | 0 | 0.34 | 2014 |
Android forensics: Correlation analysis | 2 | 0.39 | 2014 |
Active authentication for mobile devices utilising behaviour profiling | 22 | 0.75 | 2014 |
Cloud QoS Scaling by Fuzzy Logic | 8 | 0.57 | 2014 |
An Evaluation of Behavioural Profiling on Mobile Devices | 1 | 0.34 | 2014 |
A response selection model for intrusion response systems: Response Strategy Model RSM | 1 | 0.35 | 2014 |
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. | 9 | 0.54 | 2013 |
Anomaly Detection in IaaS Clouds | 11 | 0.59 | 2013 |
A Technology Independent Security Gateway for Real-Time Multimedia Communication. | 1 | 0.39 | 2013 |
Co-operative user identity verification using an Authentication Aura | 4 | 0.40 | 2013 |