Steve Woodhead

According to our database1, Steve Woodhead authored at least 12 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques.
J. Cybersecur. Priv., December, 2022

Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware.
Int. J. Grid Util. Comput., 2022

2019
Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

2018
The effect of datagram size and susceptible population on the epidemiology of fast self-propagating malware.
Proceedings of the 2018 International Conference on Information Networking, 2018

2016
A Safeguard against Fast Self-propagating Malware.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A countermeasure mechanism for fast scanning malware.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2015
Containment of Fast Scanning Computer Network Worms.
Proceedings of the Internet and Distributed Computing Systems, 2015

Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Countermeasure against Witty Worm.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2013
A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

2012
An Investigation into Collaboration and Knowledge Managementduring Product Development in the Aerospace and Defence Industry.
Proceedings of the KMIS 2012, 2012

2006
Authentication delegation for subscription-based remote network services.
Comput. Secur., 2006

Constraint-Enabled Distributed RBAC for Subscription-Based Remote Network Services.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006


  Loading...