default search action
Dale Lindskog
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c47]Manmeet Singh Gill, Dale Lindskog, Pavol Zavarsky:
Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection. TrustCom/BigDataSE 2018: 885-890 - [c46]Sarvjot kaur Kang, Dale Lindskog, Hamman Samuel:
An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases. TrustCom/BigDataSE 2018: 1521-1525 - 2017
- [c45]Manpreet Kaur, Dale Lindskog, Pavol Zavarsky:
Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture. ADHOCNETS 2017: 69-80 - 2016
- [c44]Saikrishna Yellanki, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws. COMPSAC Workshops 2016: 410-415 - [c43]Parul Khanna, Pavol Zavarsky, Dale Lindskog:
Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks. FNC/MobiSPC 2016: 459-464 - [c42]Monika, Pavol Zavarsky, Dale Lindskog:
Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization. FNC/MobiSPC 2016: 465-472 - [c41]Jagjot Kaur, Dale Lindskog:
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks. SIN 2016: 124-128 - 2015
- [c40]Lu Shi, Sergey Butakov, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko:
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems. AINA Workshops 2015: 582-586 - [c39]Vimal Kumar SathiyaBalan, Pavol Zavarsky, Dale Lindskog, Sergey Butakov:
Study of applicability of Chinese remainder theorem based group key management for cloud environment. ICITST 2015: 114-119 - [c38]Rohit Beniwal, Pavol Zavarsky, Dale Lindskog:
Study of compliance of Apple's location based APIs with recommendations of the IETF Geopriv. ICITST 2015: 214-219 - 2014
- [c37]Erez Gilady, Dale Lindskog, Shaun Aghili:
Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems. AINA Workshops 2014: 847-851 - 2013
- [c36]Love Adedayo, Sergey Butakov, Ron Ruhl, Dale Lindskog:
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies. ICITST 2013: 623-629 - [c35]Jaspreet Singh, Ron Ruhl, Dale Lindskog:
GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM. SocialCom 2013: 1005-1010 - [c34]Chikaodili Ekechukwu, Dale Lindskog, Ron Ruhl:
A Notary Extension for the Online Certificate Status Protocol. SocialCom 2013: 1016-1021 - [c33]Ting Zhang, Dale Lindskog:
Full function Firewalls on MANETs: A routing storage and query mechanism for ROFL. WorldCIS 2013: 25-29 - [c32]Azin Moradmand Badie, Dale Lindskog, Ron Ruhl:
Responding to intrusions in mobile ad hoc networks. WorldCIS 2013: 30-34 - 2012
- [c31]Fares Almari, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Amer Aljaedi:
Performance Analysis of Oracle Database in Virtual Environments. AINA Workshops 2012: 1238-1245 - [c30]Pallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Fault Tree Analysis of Accidental Insider Security Events. CyberSecurity 2012: 113-118 - [c29]Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A Review and Comparative Study of Digital Forensic Investigation Models. ICDF2C 2012: 314-327 - [c28]Henry Nnoli, Dale Lindskog, Pavol Zavarsky, Shaun Aghili, Ron Ruhl:
The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches. SocialCom/PASSAT 2012: 734-741 - [c27]Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS. SocialCom/PASSAT 2012: 797-806 - [c26]Kashif Syed, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Shaun Aghili:
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process. TrustBus 2012: 50-64 - [c25]Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The implementation of a full EMV smartcard for a point-of-sale transaction. WorldCIS 2012: 28-35 - [c24]Mirza Baig, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The study of evasion of packed PE from static detection. WorldCIS 2012: 99-104 - [c23]Cyril Ikenna Nwafor, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management. WorldCIS 2012: 150-157 - [c22]Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An analysis of security weaknesses in the evolution of RFID enabled passport. WorldCIS 2012: 158-166 - [c21]Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Enhanced side-channel analysis method to detect hardware virtualization based rootkits. WorldCIS 2012: 192-201 - [c20]Adetorera Sogbesan, Ayo Ibidapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Collusion threat profile analysis: Review and analysis of MERIT model. WorldCIS 2012: 212-217 - [c19]Prince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
The study of civil litigation in data storage environment. WorldCIS 2012: 224-230 - 2011
- [c18]Harpreet Kohli, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
An Enhanced Threat Identification Approach for Collusion Threats. Metrisec@ESEM 2011: 25-30 - [c17]Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Performance Evaluation of Oracle VM Server Virtualization Software 64 Bit Linux Environment. Metrisec@ESEM 2011: 51-57 - [c16]Nidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection. SocialCom/PASSAT 2011: 1095-1101 - [c15]Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment. SocialCom/PASSAT 2011: 1119-1124 - [c14]Ayodele Oluwaseun Ibidapo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of CVSS v2 Environmental Scoring. SocialCom/PASSAT 2011: 1125-1130 - [c13]Siew Yong, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles. SocialCom/PASSAT 2011: 1220-1223 - [c12]Amer Aljaedi, Dale Lindskog, Pavol Zavarsky, Ron Ruhl, Fares Almari:
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging. SocialCom/PASSAT 2011: 1253-1258 - [c11]Boyan Chen, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A Study of the Effectiveness of CSRF Guard. SocialCom/PASSAT 2011: 1269-1272 - [c10]David C. Edwards, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Shaun Aghili:
E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government. SocialCom/PASSAT 2011: 1273-1277 - [c9]Yung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Trend Analysis of the CVE for Software Vulnerability Management. SocialCom/PASSAT 2011: 1290-1293 - [c8]Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Media Access Control Address Spoofing Attacks against Port Security. WOOT 2011: 1-8 - [c7]Assad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score. WorldCIS 2011: 109-113 - 2010
- [c6]Collins Umana, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Oluwatoyin Gloria Ake-Johnson:
Comparative Analysis of ccTLD Security Policies. SocialCom/PASSAT 2010: 926-933 - [c5]Caroline Ngeno, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
User's Perspective: Privacy and Security of Information on Social Networks. SocialCom/PASSAT 2010: 1038-1043 - [c4]Ebenezer Sackey, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:
A Framework for Home Wireless Network Security Education. SocialCom/PASSAT 2010: 1044-1049
2000 – 2009
- 2009
- [c3]Ayonote Clement, Pavol Zavarsky, Dale Lindskog:
Analysis of the GMPLS Control Plane Security. CSE (3) 2009: 313-318 - [c2]Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor:
Managing Risk of IT Security Outsourcing in the Decision-Making Stage. CSE (3) 2009: 456-461 - [c1]Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Threat Modeling for CSRF Attacks. CSE (3) 2009: 486-491
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint