Login / Signup
Jason Flood
Publication Activity (10 Years)
Years Active: 2012-2019
Publications (10 Years): 6
Top Topics
Attack Detection
Malicious Activities
Winning Strategy
Phishing Attacks
Top Venues
ICWE
PST
CSCESM
EIDWT
</>
Publications
</>
Emad Badawi
,
Guy-Vincent Jourdan
,
Gregor von Bochmann
,
Iosif-Viorel Onut
,
Jason Flood
The "Game Hack" Scam.
ICWE
(2019)
Sophie Le Page
,
Guy-Vincent Jourdan
,
Gregor von Bochmann
,
Iosif-Viorel Onut
,
Jason Flood
Domain Classifier: Compromised Machines Versus Malicious Registrations.
ICWE
(2019)
Qian Cui
,
Guy-Vincent Jourdan
,
Gregor von Bochmann
,
Iosif-Viorel Onut
,
Jason Flood
Phishing Attacks Modifications and Evolutions.
ESORICS (1)
(2018)
Sophie Le Page
,
Gregor von Bochmann
,
Qian Cui
,
Jason Flood
,
Guy-Vincent Jourdan
,
Iosif-Viorel Onut
Using AP-TED to Detect Phishing Attack Variations.
PST
(2018)
Sophie Le Page
,
Guy-Vincent Jourdan
,
Gregor von Bochmann
,
Jason Flood
,
Iosif-Viorel Onut
Using URL shorteners to compare phishing and malware attacks.
eCrime
(2018)
Jonathan Dunne
,
David Malone
,
Jason Flood
Social testing: A framework to support adoption of continuous delivery by small medium enterprises.
CSCESM
(2015)
Jason Flood
,
Mark Denihan
,
Anthony Keane
,
Fredrick Mtenzi
Black hat training of white hat resources: The future of security is gaming.
ICITST
(2012)
Jason Flood
,
Anthony Keane
A Proposed Framework for the Active Detection of Security Vulnerabilities in Multi-tenancy Cloud Systems.
EIDWT
(2012)