default search action
Paul Jenkins
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e1]Nitin Naik, Paul Jenkins, Paul Grace, Longzhi Yang, Shaligram Prajapat:
Advances in Computational Intelligence Systems - Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6-8, 2023, Birmingham, UK. Advances in Intelligent Systems and Computing 1453, Springer 2024, ISBN 978-3-031-47507-8 [contents] - 2023
- [c44]Nitin Naik, Paul Jenkins, Paul Grace, Shaligram Prajapat, Dishita Naik, Jingping Song, Jian Xu, Ricardo M. Czekster:
Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack. UKCI 2023: 351-363 - [c43]Nitin Naik, Paul Jenkins, Paul Grace, Dishita Naik, Shaligram Prajapat, Jingping Song, Jian Xu, Ricardo M. Czekster:
Analysing Cyberattacks Using Attack Tree and Fuzzy Rules. UKCI 2023: 364-378 - [c42]Vibhushinie Bentotahewa, Shadan Khattak, Chaminda Hewage, Sandeep Singh Sengar, Paul Jenkins:
Privacy and Security Landscape of Metaverse. UKCI 2023: 403-417 - 2022
- [j7]Nitin Naik, Paul Grace, Paul Jenkins, Kshirasagar Naik, Jingping Song:
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity. Comput. Secur. 120: 102808 (2022) - [c41]Nitin Naik, Paul Jenkins, Paul Grace:
Cyberattack Analysis Based on Attack Tree with Weighted Average Probability and Risk of Attack. UKCI 2022: 324-333 - 2021
- [j6]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Tossapon Boongoen, Natthakan Iam-On:
Fuzzy-import hashing: A static analysis technique for malware detection. Digit. Investig. 37: 301139 (2021) - [j5]Nitin Naik, Changjing Shang, Paul Jenkins, Qiang Shen:
Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation. Expert Syst. J. Knowl. Eng. 38(5) (2021) - [j4]Erika Scott, Liane Hirabayashi, Alex Levenstein, Nicole Krupa, Paul Jenkins:
The development of a machine learning algorithm to identify occupational injuries in agriculture using pre-hospital care reports. Health Inf. Sci. Syst. 9(1): 31 (2021) - [j3]Nitin Naik, Changjing Shang, Paul Jenkins, Qiang Shen:
D-FRI-Honeypot: A Secure Sting Operation for Hacking the Hackers Using Dynamic Fuzzy Rule Interpolation. IEEE Trans. Emerg. Top. Comput. Intell. 5(6): 893-907 (2021) - [c40]Nitin Naik, Paul Jenkins:
Does Sovrin Network Offer Sovereign Identity? ISSE 2021: 1-6 - [c39]Nitin Naik, Paul Jenkins:
Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology. ISSE 2021: 1-7 - [c38]Nitin Naik, Paul Grace, Paul Jenkins:
An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity. SSCI 2021: 1-8 - 2020
- [c37]Nitin Naik, Paul Jenkins:
Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity. BESC 2020: 1-6 - [c36]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Tossapon Boongoen, Natthakan Iam-On:
Fuzzy-Import Hashing: A Malware Analysis Approach. FUZZ-IEEE 2020: 1-8 - [c35]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song:
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis. FUZZ-IEEE 2020: 1-7 - [c34]Nitin Naik, Paul Jenkins:
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems. ISSE 2020: 1-6 - [c33]Nitin Naik, Paul Jenkins:
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. ISSE 2020: 1-7 - [c32]Nitin Naik, Paul Jenkins:
Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. MobileCloud 2020: 90-95 - [c31]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song, Tossapon Boongoen, Natthakan Iam-On:
Fuzzy Hashing Aided Enhanced YARA Rules for Malware Triaging. SSCI 2020: 1138-1145 - [c30]Nitin Naik, Paul Jenkins, Roger Cooke, Jonathan Gillett, Yaochu Jin:
Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness. SSCI 2020: 1146-1153
2010 – 2019
- 2019
- [j2]Victoria Iba, Paul Jenkins, Merrill Warnick:
Divisibility Properties of Coefficients of Modular Functions in Genus Zero Levels. Integers 19: A7 (2019) - [c29]Nitin Naik, Paul Jenkins:
Relax, It's a Game: Utilising Gamification in Learning Agile Scrum Software Development. CoG 2019: 1-4 - [c28]Nitin Naik, Paul Jenkins, David Newell:
Learning Agile Scrum Methodology Using the Groupware Tool Trello $$^{\textregistered }$$ Through Collaborative Working. CISIS 2019: 343-355 - [c27]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang:
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules. FUZZ-IEEE 2019: 1-6 - [c26]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang:
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering. FUZZ-IEEE 2019: 1-6 - [c25]Nitin Naik, Changjing Shang, Qiang Shen, Paul Jenkins:
D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall. FUZZ-IEEE 2019: 1-6 - [c24]Nitin Naik, Paul Jenkins:
A Web Based Method for Managing PRINCE2® Projects Using Trello®. ISSE 2019: 1-3 - [c23]Nitin Naik, Paul Jenkins, Nick Savage:
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems. ISSE 2019: 1-6 - [c22]Nitin Naik, Paul Jenkins, Nick Savage, Longzhi Yang, Kshirasagar Naik, Jingping Song:
Augmented YARA Rules Fused With Fuzzy Hashing in Ransomware Triaging. SSCI 2019: 625-632 - [c21]Nitin Naik, Paul Jenkins, Jonathan Gillett, Haralambos Mouratidis, Kshirasagar Naik, Jingping Song:
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering. SSCI 2019: 641-648 - 2018
- [j1]Paul Jenkins, DJ Thornton:
Weakly Holomorphic Modular Forms in Prime Power Levels of Genus Zero. Integers 18: A18 (2018) - [c20]Nitin Naik, Paul Jenkins:
A Fuzzy Approach for Detecting and Defending Against Spoofing Attacks on Low Interaction Honeypots. FUSION 2018: 904-910 - [c19]Nitin Naik, Paul Jenkins, Roger Cooke, Longzhi Yang:
Honeypots That Bite Back: A Fuzzy Technique for Identifying and Inhibiting Fingerprinting Attacks on Low Interaction Honeypots. FUZZ-IEEE 2018: 1-8 - [c18]Nitin Naik, Paul Jenkins, Brian Kerby, Joseph Sloane, Longzhi Yang:
Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls. FUZZ-IEEE 2018: 1-8 - [c17]Nitin Naik, Changjing Shang, Qiang Shen, Paul Jenkins:
Intelligent Dynamic Honeypot Enabled by Dynamic Fuzzy Rule Interpolation. HPCC/SmartCity/DSS 2018: 1520-1527 - [c16]Nitin Naik, Paul Jenkins, Nick Savage:
Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis. SSCI 2018: 623-630 - [c15]Nitin Naik, Changjing Shang, Qiang Shen, Paul Jenkins:
Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation. SSCI 2018: 1731-1738 - 2017
- [c14]David Ball, Nitin Naik, Paul Jenkins:
Lightweight and Cost-Effective Spectrum Analyser Based on Software Defined Radio and Raspberry Pi. EMS 2017: 260-266 - [c13]Nitin Naik, Ren Diao, Changjing Shang, Qiang Shen, Paul Jenkins:
D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall. FUZZ-IEEE 2017: 1-6 - [c12]Nitin Naik, Paul Jenkins, Roger Cooke, David Ball, Arthur Foster, Yaochu Jin:
Augmented windows fuzzy firewall for preventing denial of service attack. FUZZ-IEEE 2017: 1-6 - [c11]Nitin Naik, Paul Jenkins, David Newell:
Choice of suitable Identity and Access Management standards for mobile computing and communication. ICT 2017: 1-6 - [c10]David Ball, Nitin Naik, Paul Jenkins:
Small scale mobile energy management system using Raspberry Pi and Python. ISSPIT 2017: 139-143 - [c9]Nitin Naik, Paul Jenkins:
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect. RCIS 2017: 163-174 - 2016
- [c8]Nitin Naik, Paul Jenkins, Philip Davies, David Newell:
Native Web Communication Protocols and Their Effects on the Performance of Web Services and Systems. CIT 2016: 219-225 - [c7]Nitin Naik, Paul Jenkins:
Enhancing Windows Firewall Security Using Fuzzy Reasoning. DASC/PiCom/DataCom/CyberSciTech 2016: 263-269 - [c6]Nitin Naik, Paul Jenkins:
An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm. DASC/PiCom/DataCom/CyberSciTech 2016: 428-431 - [c5]Nitin Naik, Paul Jenkins:
Fuzzy reasoning based Windows Firewall for preventing denial of service attack. FUZZ-IEEE 2016: 759-766 - [c4]Nitin Naik, Paul Jenkins:
Web protocols and challenges of Web latency in the Web of Things. ICUFN 2016: 845-850 - [c3]Nitin Naik, Paul Jenkins:
A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards. MobileCloud 2016: 89-90 - [c2]Nitin Naik, Paul Jenkins, Nick Savage, Vasilios Katos:
Big data security analysis approach using Computational Intelligence techniques in R for desktop users. SSCI 2016: 1-8
1990 – 1999
- 1996
- [c1]Paul Jenkins:
World Wide Web - Future Uses. OOIS 1996: 501-505
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint