Jason Flood

According to our database1, Jason Flood authored at least 8 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Domain Classifier: Compromised Machines Versus Malicious Registrations.
Proceedings of the Web Engineering - 19th International Conference, 2019

The "Game Hack" Scam.
Proceedings of the Web Engineering - 19th International Conference, 2019

2018
Using AP-TED to Detect Phishing Attack Variations.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Phishing Attacks Modifications and Evolutions.
Proceedings of the Computer Security, 2018

Using URL shorteners to compare phishing and malware attacks.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

2015
Social testing: A framework to support adoption of continuous delivery by small medium enterprises.
Proceedings of the Second International Conference on Computer Science, 2015

2012
Black hat training of white hat resources: The future of security is gaming.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

A Proposed Framework for the Active Detection of Security Vulnerabilities in Multi-tenancy Cloud Systems.
Proceedings of the 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, 2012


  Loading...