Login / Signup
Ron Ruhl
Publication Activity (10 Years)
Years Active: 2009-2019
Publications (10 Years): 8
Top Topics
Payment Protocol
Database
Comparative Study
Fault Tree Analysis
Top Venues
WorldCIS
COMPSAC Workshops
AINA Workshops
ICITST
</>
Publications
</>
Uttkarsh Goel
,
Ron Ruhl
,
Pavol Zavarsky
Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System.
BigDataSecurity/HPSC/IDS
(2019)
Dilpreet Singh
,
Ron Ruhl
,
Hamman Samuel
Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals.
ICISSP
(2018)
Jitto Joseph
,
Ron Ruhl
,
Hamman Samuel
Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes Transmitted.
TrustCom/BigDataSE
(2018)
Amarachi Chinwendu Nwaeze
,
Pavol Zavarsky
,
Ron Ruhl
Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011.
ICDIM
(2017)
Okoye Emmanuel Ekene
,
Ron Ruhl
,
Pavol Zavarsky
Enhanced User Security and Privacy Protection in 4G LTE Network.
COMPSAC Workshops
(2016)
Saikrishna Yellanki
,
Dale Lindskog
,
Pavol Zavarsky
,
Ron Ruhl
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws.
COMPSAC Workshops
(2016)
Lu Shi
,
Sergey Butakov
,
Dale Lindskog
,
Ron Ruhl
,
Evgeny Storozhenko
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems.
AINA Workshops
(2015)
Himanshu Vats
,
Ron Ruhl
,
Shaun Aghili
Fingerprint security for protecting EMV payment cards.
ICITST
(2015)
Akinola Ajijola
,
Pavol Zavarsky
,
Ron Ruhl
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012.
WorldCIS
(2014)
Pryde N. Sema
,
Pavol Zavarsky
,
Ron Ruhl
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities.
WorldCIS
(2014)
Azin Moradmand Badie
,
Dale Lindskog
,
Ron Ruhl
Responding to intrusions in mobile ad hoc networks.
WorldCIS
(2013)
Love Adedayo
,
Sergey Butakov
,
Ron Ruhl
,
Dale Lindskog
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies.
ICITST
(2013)
Jaspreet Singh
,
Ron Ruhl
,
Dale Lindskog
GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM.
SocialCom
(2013)
Chikaodili Ekechukwu
,
Dale Lindskog
,
Ron Ruhl
A Notary Extension for the Online Certificate Status Protocol.
SocialCom
(2013)
Oludele Ogundele
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
The implementation of a full EMV smartcard for a point-of-sale transaction.
WorldCIS
(2012)
Prince Onabajo
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
The study of civil litigation in data storage environment.
WorldCIS
(2012)
Kashif Syed
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
,
Shaun Aghili
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process.
TrustBus
(2012)
Oludele Ogundele
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS.
SocialCom/PASSAT
(2012)
Cyril Ikenna Nwafor
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management.
WorldCIS
(2012)
Eyad Abdullah Bogari
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
An analysis of security weaknesses in the evolution of RFID enabled passport.
WorldCIS
(2012)
Pallavi Patil
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
Fault Tree Analysis of Accidental Insider Security Events.
CyberSecurity
(2012)
Kwaku Kyei
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
A Review and Comparative Study of Digital Forensic Investigation Models.
ICDF2C
(2012)
Adetorera Sogbesan
,
Ayo Ibidapo
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
Collusion threat profile analysis: Review and analysis of MERIT model.
WorldCIS
(2012)
Iain Kyte
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
Enhanced side-channel analysis method to detect hardware virtualization based rootkits.
WorldCIS
(2012)
Henry Nnoli
,
Dale Lindskog
,
Pavol Zavarsky
,
Shaun Aghili
,
Ron Ruhl
The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches.
SocialCom/PASSAT
(2012)
Fares Almari
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
,
Amer Aljaedi
Performance Analysis of Oracle Database in Virtual Environments.
AINA Workshops
(2012)
Mirza Baig
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
The study of evasion of packed PE from static detection.
WorldCIS
(2012)
Yung-Yu Chang
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
Trend Analysis of the CVE for Software Vulnerability Management.
SocialCom/PASSAT
(2011)
Ayodele Oluwaseun Ibidapo
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
An Analysis of CVSS v2 Environmental Scoring.
SocialCom/PASSAT
(2011)
Harpreet Kohli
,
Dale Lindskog
,
Pavol Zavarsky
,
Ron Ruhl
An Enhanced Threat Identification Approach for Collusion Threats.
Metrisec@ESEM
(2011)
Siew Yong
,
Dale Lindskog
,
Ron Ruhl
,
Pavol Zavarsky
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles.
SocialCom/PASSAT
(2011)
Ibidokun Emmanuel Tope
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
Performance Evaluation of Oracle VM Server Virtualization Software 64 Bit Linux Environment.
Metrisec@ESEM
(2011)
Assad Ali
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score.
WorldCIS
(2011)
Andrew Buhr
,
Dale Lindskog
,
Pavol Zavarsky
,
Ron Ruhl
Media Access Control Address Spoofing Attacks against Port Security.
WOOT
(2011)
Ibidokun Emmanuel Tope
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment.
SocialCom/PASSAT
(2011)
Boyan Chen
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
A Study of the Effectiveness of CSRF Guard.
SocialCom/PASSAT
(2011)
Nidal Khoury
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection.
SocialCom/PASSAT
(2011)
Amer Aljaedi
,
Dale Lindskog
,
Pavol Zavarsky
,
Ron Ruhl
,
Fares Almari
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging.
SocialCom/PASSAT
(2011)
David C. Edwards
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
,
Shaun Aghili
E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government.
SocialCom/PASSAT
(2011)
Caroline Ngeno
,
Pavol Zavarsky
,
Dale Lindskog
,
Ron Ruhl
User's Perspective: Privacy and Security of Information on Social Networks.
SocialCom/PASSAT
(2010)
Collins Umana
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
,
Oluwatoyin Gloria Ake-Johnson
Comparative Analysis of ccTLD Security Policies.
SocialCom/PASSAT
(2010)
Ebenezer Sackey
,
Dale Lindskog
,
Ron Ruhl
,
Pavol Zavarsky
A Framework for Home Wireless Network Security Education.
SocialCom/PASSAT
(2010)
Xiaoli Lin
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
Threat Modeling for CSRF Attacks.
CSE (3)
(2009)
Zhitao Huang
,
Pavol Zavarsky
,
Ron Ruhl
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002.
CSE (3)
(2009)
Samuel Oladapo
,
Pavol Zavarsky
,
Ron Ruhl
,
Dale Lindskog
,
Andy Igonor
Managing Risk of IT Security Outsourcing in the Decision-Making Stage.
CSE (3)
(2009)