Login / Signup
ICGS3
2010
2013
2016
2019
2010
2019
Keyphrases
Publications
2019
Sina Pournouri
,
Shahrzad Zargari
,
Babak Akhgar
An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber Attacks.
ICGS3
(2019)
Martin J. Tunnicliffe
,
Omego Obinna
,
Eckhard Pflügel
Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces.
ICGS3
(2019)
Reza Montasari
,
Richard Hill
Next-Generation Digital Forensics: Challenges and Future Paradigms.
ICGS3
(2019)
12th IEEE International Conference on Global Security, Safety and Sustainability, ICGS3 2019, London, UK, January 16-18, 2019
ICGS3
(2019)
Homan Forouzan
,
Hamid Jahankhani
An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police Service.
ICGS3
(2019)
Nuno Castro
,
Henrique M. Dinis Santos
,
Vítor J. Sá
,
Maria José Magalhães
Study of the Means of Online Payment in the Portuguese Population.
ICGS3
(2019)
Bobby L. Tait
Behavioural Biometrics Authentication Tested Using EyeWriter Technology.
ICGS3
(2019)
Rahul Ravindran
Circle of Trust: A High Volume, Energy Efficient, Stake Blind and High Attack Tolerant Blockchain Consensus Protocol.
ICGS3
(2019)
Anh Do
,
John McCarthy
Categorization of Threats and their Impacts on Critical National Infrastructure Systems.
ICGS3
(2019)
Firas Hazzaa
,
Sufian Yousef
,
Nada H. Ali
,
Erika Sanchez
The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network.
ICGS3
(2019)
Jamie O'Hare
,
Rich Macfarlane
,
Owen Lo
Identifying Vulnerabilities Using Internet-Wide Scanning Data.
ICGS3
(2019)
Halima Abdul Halime Shnishah
,
David Mulvaney
Encryption of Text File Using a User Controlled Automatically-Generated Key.
ICGS3
(2019)
Ian Mitchell
,
Sukhvinder Hara
,
M. Sheriff
dAppER: Decentralised Application for Examination Review.
ICGS3
(2019)
Danisa Nkomo
,
Ray Brown
Hybrid Cybersecurity Framework for the Internet of Medical Things (IOMT).
ICGS3
(2019)
Farah Ahmed
,
Fouad Khelifi
,
Ashref Lawgaly
,
Ahmed Bouridane
Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification.
ICGS3
(2019)
William Jahankhani
,
Liang Chen
Email Verification Fake or Genuine?
ICGS3
(2019)
Rodrigo Ruiz
A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity.
ICGS3
(2019)
Bharat Manya
BRT - (Blockchain Relevance Theory): A Theoretical Framework for Blockchain & DLT in Cyber Security Using CISv7 Controls.
ICGS3
(2019)
Abeer Alkhwaldi
,
Mumtaz M. Kamala
,
Rami Qahwaji
Security Perceptions in Cloud-Based e-Govemment Services.
ICGS3
(2019)
Sherese Bishop
The Internet of Things: Implications for Consumer Privacy & Security.
ICGS3
(2019)
Asifa Shad
,
Tariq Abdullah
,
Usman Butt
Web Accessibility Adoption Framework (WAAF) for Businesses and Web Professionals.
ICGS3
(2019)
Mohan Krishna Kagita
Security and Privacy Issues for Business Intelligence in lOT.
ICGS3
(2019)
Yousuf AlBlooshi
,
Amin Hosseinian Far
A Novel Framework for Identification of Critical Business Processes.
ICGS3
(2019)
Stefan Kendzierskyj
,
Hamid Jahankhani
The Role of Blockchain in Supporting Critical National Infrastructure.
ICGS3
(2019)
Jake L. Beavers
,
Michael Faulks
,
Jims Marchang
Hacking NHS Pacemakers: A Feasibility Study.
ICGS3
(2019)
George Copeland
,
John McCarthy
Practical Cybersecurity for Digital Trains.
ICGS3
(2019)
Amal Durou
,
Somaya Al-Máadeed
,
Ibrahim Aref
,
Ahmed Bouridane
,
Mosa Elbendak
A Comparative Study of Machine Learning Approaches for Handwriter Identification.
ICGS3
(2019)
Ahuokpeme Chibueze Brendan
,
John McCarthy
Taxonomy of Threat Categorization and Threat Intelligence Platform.
ICGS3
(2019)
Mohamed Shaik Honnurvali
,
Naren Gupta
,
Keng Goh
,
Tariq Umar
,
Adnan Kabbani
,
Needa Nazecma
Can Future Smart Cities Powered by 100% Renewables and Made Cyber Secured-A Analytical Approach.
ICGS3
(2019)
Usman Javed Butt
,
Maysam Abbod
,
Anzor Lors
,
Hamid Jahankhani
,
Arshad Jamal
,
Arvind Kumar
Ransomware Threat and its Impact on SCADA.
ICGS3
(2019)
Binay Dahal
,
Yoohwan Kim
AutoEncoded Domains with Mean Activation for DGA Botnet Detection.
ICGS3
(2019)
Joseph Zernik
Cybersecurity and Law in Israel - A Case Study.
ICGS3
(2019)
Grace Adedotun-Ogundeji
,
Hamid Jahankhani
Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the Future.
ICGS3
(2019)
Jon Cosson
,
Haider Alhateeb
An Approach to Identify Risk Based Human Behaviour Profiling within an Office Environment.
ICGS3
(2019)
Anita Collins
,
Hamid Jahankhani
Blockchain as a Tool for Financial Transparency in Development Aid.
ICGS3
(2019)
Elias Pimenidis
,
Nikolaos Polatidis
Secure Social Media Spaces for Communities of Vulnerable People.
ICGS3
(2019)
David A. E. Haddon
,
Haider M. Al-Khateeb
Investigating Data Exfiltration in DNS Over HTTPS Queries.
ICGS3
(2019)
Liam Odell
,
Hamid Jahankhani
AI: The Cyber-Physical Project Manager and their Digital Twin.
ICGS3
(2019)
Jaime Ibarra Jimenez
,
Hamid Jahankhani
"Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information (PHI) Processed by IoT-based Telemedicine Devices and Applications Within Healthcare Services.
ICGS3
(2019)
Tariq Abdullah
,
Andrew Jones
eHealth: Challenges Far Integrating BlockChain within Healthcare.
ICGS3
(2019)
Nishan Chelvachandran
,
Hamid Jahankhani
A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social Media.
ICGS3
(2019)
Samar Muslah Albladi
,
George R. S. Weir
A Conceptual Model to Predict Social Engineering Victims.
ICGS3
(2019)
Uzma Mustafa
,
Eckhard Pflügel
,
Nada Philip
A Novel Privacy Framework for Secure M-Health Applications: The Case of the GDPR.
ICGS3
(2019)
Gabriela Ahmadi-Assalemi
,
Haider M. Al-Khateeb
,
Gregory Epiphaniou
,
Jon Cosson
,
Hamid Jahankhani
,
Prashant Pillai
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace.
ICGS3
(2019)
Nishan Chelvachandran
,
Hamid Jahankhani
Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social Media.
ICGS3
(2019)
Stephen S. Sampana
FoRCE (Forensic Recovery of Cloud Evidence): A Digital Cloud Forensics Framework.
ICGS3
(2019)
Jacopo Semeraro
An Investigatory Project on the Anonymity of Blockchain and Cryptocurrencies.
ICGS3
(2019)
Sergio De Abreu
A Feasibility Study on Machine Learning Techniques for APT Detection and Protection in VANETs.
ICGS3
(2019)
Yvan Da Silva Ramos
,
John McCarthy
Management Versus Technical Perspectives on Threats.
ICGS3
(2019)
Joseph Waldu Woensdregt
,
Haider M. Al-Khateeb
,
Gregory Epiphaniou
,
Hamid Jahankhani
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms.
ICGS3
(2019)