default search action
Pavol Zavarsky
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c81]Laxmi Narsimha Reddy, Sergey Butakov, Pavol Zavarsky:
Applying ML Algorithms to improve traffic classification in Intrusion Detection Systems. IEEE ICCI*CC 2020: 1-6 - [c80]Timilehin David Sobola, Pavol Zavarsky, Sergey Butakov:
Experimental Study of ModSecurity Web Application Firewalls. BigDataSecurity/HPSC/IDS 2020: 209-213 - [c79]Sushant Sharma, Pavol Zavarsky, Sergey Butakov:
Machine Learning based Intrusion Detection System for Web-Based Attacks. BigDataSecurity/HPSC/IDS 2020: 227-230 - [c78]Victor Ajiri, Sergey Butakov, Pavol Zavarsky:
Detection Efficiency of Static Analyzers against Obfuscated Android Malware. BigDataSecurity/HPSC/IDS 2020: 231-234 - [c77]Krishna Gondaliya, Sergey Butakov, Pavol Zavarsky:
SLA as a mechanism to manage risks related to chatbot services. BigDataSecurity/HPSC/IDS 2020: 235-240 - [c76]Osborn N. Nyasore, Pavol Zavarsky, Bobby Swar, Raphael Naiyeju, Shubham Dabra:
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities. BigDataSecurity/HPSC/IDS 2020: 241-245 - [c75]Karthik Anagandula, Pavol Zavarsky:
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities. ICDIS 2020: 40-48 - [c74]Manas Pratim Bhattacharya, Pavol Zavarsky, Sergey Butakov:
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain. ISNCC 2020: 1-7
2010 – 2019
- 2019
- [c73]Uttkarsh Goel, Ron Ruhl, Pavol Zavarsky:
Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System. BigDataSecurity/HPSC/IDS 2019: 25-30 - [c72]Yuyi Liu, Pavol Zavarsky, Yasir Malik:
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning. CSS (1) 2019: 391-406 - [c71]Godwin Raju, Pavol Zavarsky, Adetokunbo Makanju, Yasir Malik:
Vulnerability assessment of machine learning based malware classification models. GECCO (Companion) 2019: 1615-1618 - [c70]Tunde Akeem Yekini, Fehmi Jaafar, Pavol Zavarsky:
Study of Trust at Device Level of the Internet of Things Architecture. HASE 2019: 150-155 - [c69]Samip Dhakal, Fehmi Jaafar, Pavol Zavarsky:
Private Blockchain Network for IoT Device Firmware Integrity Verification and Update. HASE 2019: 164-170 - [c68]Ranbir Singh Bali, Fehmi Jaafar, Pavol Zavarsky:
Lightweight authentication for MQTT to improve the security of IoT communication. ICCSP 2019: 6-12 - [c67]Maryann Njorbuenwu, Bobby Swar, Pavol Zavarsky:
A Survey on the Impacts of Quantum Computers on Information Security. ICDIS 2019: 212-218 - 2018
- [c66]Shivani Modi, Sergey Butakov, Pavol Zavarsky:
Using Fault Tree Analysis with Cobit 5 Risk Scenarios. CoDIT 2018: 385-390 - [c65]Hasan Turaev, Pavol Zavarsky, Bobby Swar:
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions. ICDIS 2018: 110-118 - [c64]Jatesh Jagraj Singh, Hamman Samuel, Pavol Zavarsky:
Impact of Paranoia Levels on the Effectiveness of the ModSecurity Web Application Firewall. ICDIS 2018: 141-144 - [c63]Fehmi Jaafar, Gagandeep Singh, Pavol Zavarsky:
An Analysis of Android Malware Behavior. QRS Companion 2018: 505-512 - [c62]Damilola Murtala, Yasir Malik, Pavol Zavarsky:
Simulating link aggregation in private virtual lan using openflow for cloud environment. SpringSim (CNS) 2018: 11:1-11:7 - [c61]Manmeet Singh Gill, Dale Lindskog, Pavol Zavarsky:
Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection. TrustCom/BigDataSE 2018: 885-890 - [c60]Hajredin Daku, Pavol Zavarsky, Yasir Malik:
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning. TrustCom/BigDataSE 2018: 1560-1564 - [c59]Adegboyega Ogundokun, Pavol Zavarsky, Bobby Swar:
Cybersecurity assurance control baselining for smart grid communication systems. WFCS 2018: 1-6 - 2017
- [c58]Manpreet Kaur, Dale Lindskog, Pavol Zavarsky:
Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture. ADHOCNETS 2017: 69-80 - [c57]Amarachi Chinwendu Nwaeze, Pavol Zavarsky, Ron Ruhl:
Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011. ICDIM 2017: 98-102 - [c56]Adeyemi Aladeokin, Pavol Zavarsky, Neelam Memon:
Analysis and compliance evaluation of cookies-setting websites with privacy protection laws. ICDIM 2017: 121-126 - 2016
- [c55]Saikrishna Yellanki, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws. COMPSAC Workshops 2016: 410-415 - [c54]Okoye Emmanuel Ekene, Ron Ruhl, Pavol Zavarsky:
Enhanced User Security and Privacy Protection in 4G LTE Network. COMPSAC Workshops 2016: 443-448 - [c53]Rajbhooshan Bhakte, Pavol Zavarsky, Sergey Butakov:
Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework. COMPSAC Workshops 2016: 461-466 - [c52]Devanshu Trivedi, Pavol Zavarsky, Sergey Butakov:
Enhancing Relational Database Security by Metadata Segregation. FNC/MobiSPC 2016: 453-458 - [c51]Parul Khanna, Pavol Zavarsky, Dale Lindskog:
Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks. FNC/MobiSPC 2016: 459-464 - [c50]Monika, Pavol Zavarsky, Dale Lindskog:
Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization. FNC/MobiSPC 2016: 465-472 - 2015
- [c49]Vimal Kumar SathiyaBalan, Pavol Zavarsky, Dale Lindskog, Sergey Butakov:
Study of applicability of Chinese remainder theorem based group key management for cloud environment. ICITST 2015: 114-119 - [c48]Muhammad Parvez, Pavol Zavarsky, Nidal Khoury:
Analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilities. ICITST 2015: 186-191 - [c47]Rohit Beniwal, Pavol Zavarsky, Dale Lindskog:
Study of compliance of Apple's location based APIs with recommendations of the IETF Geopriv. ICITST 2015: 214-219 - [c46]Chit Nyi Nyi Hlyne, Pavol Zavarsky, Sergey Butakov:
SCAP benchmark for Cisco router security configuration compliance. ICITST 2015: 270-276 - [c45]Gabriel Biedima Peterside, Pavol Zavarsky, Sergey Butakov:
Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2. ICITST 2015: 355-360 - [c44]Shireesha Katam, Pavol Zavarsky, Francis Gichohi:
Applicability of Domain Based Security risk modeling to SCADA systems. WCICSS 2015: 66-69 - [c43]Pradeep Podiyan, Sergey Butakov, Pavol Zavarsky:
Study of compliance of Android location APIs with Geopriv. WISEC 2015: 30:1-30:2 - 2014
- [c42]Akinola Ajijola, Pavol Zavarsky, Ron Ruhl:
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012. WorldCIS 2014: 66-73 - [c41]Pryde N. Sema, Pavol Zavarsky, Ron Ruhl:
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities. WorldCIS 2014: 87-90 - 2012
- [c40]Fares Almari, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Amer Aljaedi:
Performance Analysis of Oracle Database in Virtual Environments. AINA Workshops 2012: 1238-1245 - [c39]Pallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Fault Tree Analysis of Accidental Insider Security Events. CyberSecurity 2012: 113-118 - [c38]Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A Review and Comparative Study of Digital Forensic Investigation Models. ICDF2C 2012: 314-327 - [c37]Henry Nnoli, Dale Lindskog, Pavol Zavarsky, Shaun Aghili, Ron Ruhl:
The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches. SocialCom/PASSAT 2012: 734-741 - [c36]Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS. SocialCom/PASSAT 2012: 797-806 - [c35]Kashif Syed, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Shaun Aghili:
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process. TrustBus 2012: 50-64 - [c34]Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The implementation of a full EMV smartcard for a point-of-sale transaction. WorldCIS 2012: 28-35 - [c33]Mirza Baig, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The study of evasion of packed PE from static detection. WorldCIS 2012: 99-104 - [c32]Cyril Ikenna Nwafor, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management. WorldCIS 2012: 150-157 - [c31]Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An analysis of security weaknesses in the evolution of RFID enabled passport. WorldCIS 2012: 158-166 - [c30]Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Enhanced side-channel analysis method to detect hardware virtualization based rootkits. WorldCIS 2012: 192-201 - [c29]Adetorera Sogbesan, Ayo Ibidapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Collusion threat profile analysis: Review and analysis of MERIT model. WorldCIS 2012: 212-217 - [c28]Des Fernando, Pavol Zavarsky:
Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phaseas needed. WorldCIS 2012: 218-222 - [c27]Prince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
The study of civil litigation in data storage environment. WorldCIS 2012: 224-230 - 2011
- [c26]Harpreet Kohli, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
An Enhanced Threat Identification Approach for Collusion Threats. Metrisec@ESEM 2011: 25-30 - [c25]Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Performance Evaluation of Oracle VM Server Virtualization Software 64 Bit Linux Environment. Metrisec@ESEM 2011: 51-57 - [c24]Nidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection. SocialCom/PASSAT 2011: 1095-1101 - [c23]Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment. SocialCom/PASSAT 2011: 1119-1124 - [c22]Ayodele Oluwaseun Ibidapo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of CVSS v2 Environmental Scoring. SocialCom/PASSAT 2011: 1125-1130 - [c21]Siew Yong, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles. SocialCom/PASSAT 2011: 1220-1223 - [c20]Amer Aljaedi, Dale Lindskog, Pavol Zavarsky, Ron Ruhl, Fares Almari:
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging. SocialCom/PASSAT 2011: 1253-1258 - [c19]Boyan Chen, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A Study of the Effectiveness of CSRF Guard. SocialCom/PASSAT 2011: 1269-1272 - [c18]David C. Edwards, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Shaun Aghili:
E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government. SocialCom/PASSAT 2011: 1273-1277 - [c17]Yung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Trend Analysis of the CVE for Software Vulnerability Management. SocialCom/PASSAT 2011: 1290-1293 - [c16]Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Media Access Control Address Spoofing Attacks against Port Security. WOOT 2011: 1-8 - [c15]Assad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score. WorldCIS 2011: 109-113 - 2010
- [c14]Collins Umana, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Oluwatoyin Gloria Ake-Johnson:
Comparative Analysis of ccTLD Security Policies. SocialCom/PASSAT 2010: 926-933 - [c13]Caroline Ngeno, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
User's Perspective: Privacy and Security of Information on Social Networks. SocialCom/PASSAT 2010: 1038-1043 - [c12]Ebenezer Sackey, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:
A Framework for Home Wireless Network Security Education. SocialCom/PASSAT 2010: 1044-1049
2000 – 2009
- 2009
- [c11]Ayonote Clement, Pavol Zavarsky, Dale Lindskog:
Analysis of the GMPLS Control Plane Security. CSE (3) 2009: 313-318 - [c10]Mandeep Saran, Pavol Zavarsky:
A Study of the Methods for Improving Internet Usage Policy Compliance. CSE (3) 2009: 371-378 - [c9]Zhitao Huang, Pavol Zavarsky, Ron Ruhl:
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002. CSE (3) 2009: 386-391 - [c8]Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor:
Managing Risk of IT Security Outsourcing in the Decision-Making Stage. CSE (3) 2009: 456-461 - [c7]Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Threat Modeling for CSRF Attacks. CSE (3) 2009: 486-491 - 2006
- [c6]Rizza Camus Caminero, Pavol Zavarsky, Yoshiki Mikami:
Status of the African Web. WWW 2006: 869-870 - 2005
- [c5]Yoshiki Mikami, Pavol Zavarsky, Mohd Zaidi Abd Rozan, Izumi Suzuki, Masayuki Takahashi, Tomohide Maki, Irwan Nizan Ayob, Paolo Boldi, Massimo Santini, Sebastiano Vigna:
The language observatory project (LOP). WWW (Special interest tracks and posters) 2005: 990-991 - 2003
- [c4]Rastislav Lukac, Bogdan Smolka, Konstantinos N. Plataniotis, Anastasios N. Venetsanopoulos, Pavol Zavarsky:
Angular multichannel sigma filter. ICASSP (3) 2003: 745-748 - 2002
- [j1]Somchart Chokchaitam, Masahiro Iwahashi, Pavol Zavarsky, Noriyoshi Kambayashi:
A Bit-Rate Adaptive Coding System Based on Lossless DCT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(2): 403-413 (2002) - [c3]Pavol Zavarsky, Masahiro Kamiya, Noriyoshi Kambayashi:
Eigenvalue approach to analysis of performance of non-orthogonal perfect reconstruction filter banks in signal reconstruction applications. ICECS 2002: 911-914 - 2001
- [c2]Pavol Zavarsky, Noriyoshi Kambayashi, Somchart Chokchaitam, Masahiro Iwahashi, Masahiro Kamiya:
A signal reconstruction method based on an unwrapping of signals in transform domain. ISCAS (2) 2001: 153-156
1990 – 1999
- 1999
- [c1]Pavol Zavarsky, Takeshi Myoken, Noriyoshi Kambayashi, Masahiro Iwahashi, Shinji Fukuma:
Bounds of biorthogonal decompositions and a lossless modification of signal-to-noise ratio. ISSPA 1999: 713-716
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint