Helge Janicke
Helge Janicke
Cyber Security Cooperative Research Centre
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cybersecuritycrc.org.au
ΤίτλοςΠαρατίθεται απόΈτος
SCADA security in the light of Cyber-Warfare
A Nicholson, S Webber, S Dyer, T Patel, H Janicke
Computers & Security 31 (4), 418-436, 2012
3102012
Cyber warfare: Issues and challenges
M Robinson, K Jones, H Janicke
Computers & security 49, 70-94, 2015
782015
Authentication protocols for Internet of Things: A comprehensive survey
MA Ferrag, LA Maglaras, H Janicke, J Jiang, L Shu
Security and Communication Networks 2017, 2017
722017
Social internet of vehicles for smart cities
L Maglaras, A Al-Bayatti, Y He, I Wagner, H Janicke
Journal of Sensor and Actuator Networks 5 (1), 3, 2016
722016
Blockchain technologies for the internet of things: Research issues and challenges
MA Ferrag, M Derdour, M Mukherjee, A Derhab, L Maglaras, H Janicke
IEEE Internet of Things Journal 6 (2), 2188-2204, 2018
712018
Human behaviour as an aspect of cybersecurity assurance
M Evans, LA Maglaras, Y He, H Janicke
Security and Communication Networks 9 (17), 4667-4679, 2016
602016
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
MA Ferrag, L Maglaras, A Argyriou, D Kosmanos, H Janicke
Journal of Network and Computer Applications 101, 55-82, 2018
552018
Cyber security of critical infrastructures
LA Maglaras, KH Kim, H Janicke, MA Ferrag, S Rallis, P Fragkou, ...
ICT Express 4 (1), 42-45, 2018
422018
Data confidentiality in mobile ad hoc networks
H Aldabbas, T Alwada'n, H Janicke, A Al-Bayatti
arXiv preprint arXiv:1203.1749, 2012
362012
A survey on privacy-preserving schemes for smart grid communications
MA Ferrag, LA Maglaras, H Janicke, J Jiang
arXiv preprint arXiv:1611.07722, 2016
352016
A note on the formalisation of UCON
H Janicke, A Cau, H Zedan
Proceedings of the 12th ACM symposium on Access control models and …, 2007
332007
Semantics-aware detection of targeted attacks: a survey
R Luh, S Marschalek, M Kaiser, H Janicke, S Schrittwieser
Journal of Computer Virology and Hacking Techniques 13 (1), 47-85, 2017
312017
Analysis and run-time verification of dynamic security policies
H Janicke, F Siewe, K Jones, A Cau, H Zedan
International Workshop on Defence Applications of Multi-Agent Systems, 92-103, 2005
302005
A systematic review of data protection and privacy preservation schemes for smart grid communications
MA Ferrag, LA Maglaras, H Janicke, J Jiang, L Shu
Sustainable cities and society 38, 806-835, 2018
282018
Concurrent enforcement of usage control policies
H Janicke, A Cau, F Siewe, H Zedan
2008 IEEE Workshop on Policies for Distributed Systems and Networks, 111-118, 2008
272008
Vulnerability analysis of network scanning on SCADA systems
K Coffey, R Smith, L Maglaras, H Janicke
Security and Communication Networks 2018, 2018
232018
Dynamic access control policies: Specification and verification
H Janicke, A Cau, F Siewe, H Zedan
The Computer Journal 56 (4), 440-463, 2012
232012
Internet of cloud: Security and privacy issues
A Cook, M Robinson, MA Ferrag, LA Maglaras, Y He, K Jones, H Janicke
Cloud Computing for Optimization: Foundations, Applications, and Challenges …, 2018
222018
Deriving enforcement mechanisms from policies
H Janicke, A Cau, F Siewe, H Zedan
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
222007
Runtime-monitoring for industrial control systems
H Janicke, A Nicholson, S Webber, A Cau
Electronics 4 (4), 995-1017, 2015
212015
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20