Paul Jenkins

Orcid: 0000-0002-0026-8360

According to our database1, Paul Jenkins authored at least 50 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack.
Proceedings of the Advances in Computational Intelligence Systems, 2023

Analysing Cyberattacks Using Attack Tree and Fuzzy Rules.
Proceedings of the Advances in Computational Intelligence Systems, 2023

Privacy and Security Landscape of Metaverse.
Proceedings of the Advances in Computational Intelligence Systems, 2023

2022
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity.
Comput. Secur., 2022

2021
D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

The development of a machine learning algorithm to identify occupational injuries in agriculture using pre-hospital care reports.
Health Inf. Sci. Syst., 2021

Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation.
Expert Syst. J. Knowl. Eng., 2021

Fuzzy-import hashing: A static analysis technique for malware detection.
Digit. Investig., 2021

An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology.
Proceedings of the IEEE International Symposium on Systems Engineering, 2021

Does Sovrin Network Offer Sovereign Identity?
Proceedings of the IEEE International Symposium on Systems Engineering, 2021

2020
Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology.
Proceedings of the 8th IEEE International Conference on Mobile Cloud Computing, 2020

uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020

Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems.
Proceedings of the IEEE International Symposium on Systems Engineering, 2020

Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Fuzzy-Import Hashing: A Malware Analysis Approach.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

2019
Divisibility Properties of Coefficients of Modular Functions in Genus Zero Levels.
Integers, 2019

Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems.
Proceedings of the International Symposium on Systems Engineering, 2019

A Web Based Method for Managing PRINCE2<sup>®</sup> Projects Using Trello<sup>®</sup>.
Proceedings of the International Symposium on Systems Engineering, 2019

D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

Learning Agile Scrum Methodology Using the Groupware Tool Trello $$^{\textregistered }$$ Through Collaborative Working.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development.
Proceedings of the IEEE Conference on Games, 2019

2018
Weakly Holomorphic Modular Forms in Prime Power Levels of Genus Zero.
Integers, 2018

Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots.
Proceedings of the 21st International Conference on Information Fusion, 2018

2017
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Small scale mobile energy management system using Raspberry Pi and Python.
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017

Choice of suitable Identity and Access Management standards for mobile computing and communication.
Proceedings of the 24th International Conference on Telecommunications, 2017

Augmented windows fuzzy firewall for preventing denial of service attack.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Lightweight and Cost-Effective Spectrum Analyser Based on Software Defined Radio and Raspberry Pi.
Proceedings of the 2017 European Modelling Symposium (EMS), 2017

2016
Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

Web protocols and challenges of Web latency in the Web of Things.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Fuzzy reasoning based Windows Firewall for preventing denial of service attack.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Enhancing Windows Firewall Security Using Fuzzy Reasoning.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

1996
World Wide Web - Future Uses.
Proceedings of the 1996 International Conference on Object Oriented Information Systems, 1996


  Loading...