default search action
Ron Ruhl
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Conference and Workshop Papers
- 2019
- [c45]Uttkarsh Goel, Ron Ruhl, Pavol Zavarsky:
Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System. BigDataSecurity/HPSC/IDS 2019: 25-30 - 2018
- [c44]Dilpreet Singh, Ron Ruhl, Hamman Samuel:
Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals. ICISSP 2018: 494-502 - [c43]Jitto Joseph, Ron Ruhl, Hamman Samuel:
Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes Transmitted. TrustCom/BigDataSE 2018: 1720-1721 - 2017
- [c42]Amarachi Chinwendu Nwaeze, Pavol Zavarsky, Ron Ruhl:
Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011. ICDIM 2017: 98-102 - 2016
- [c41]Saikrishna Yellanki, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws. COMPSAC Workshops 2016: 410-415 - [c40]Okoye Emmanuel Ekene, Ron Ruhl, Pavol Zavarsky:
Enhanced User Security and Privacy Protection in 4G LTE Network. COMPSAC Workshops 2016: 443-448 - 2015
- [c39]Lu Shi, Sergey Butakov, Dale Lindskog, Ron Ruhl, Evgeny Storozhenko:
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems. AINA Workshops 2015: 582-586 - [c38]Himanshu Vats, Ron Ruhl, Shaun Aghili:
Fingerprint security for protecting EMV payment cards. ICITST 2015: 95-101 - 2014
- [c37]Akinola Ajijola, Pavol Zavarsky, Ron Ruhl:
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012. WorldCIS 2014: 66-73 - [c36]Pryde N. Sema, Pavol Zavarsky, Ron Ruhl:
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities. WorldCIS 2014: 87-90 - 2013
- [c35]Love Adedayo, Sergey Butakov, Ron Ruhl, Dale Lindskog:
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies. ICITST 2013: 623-629 - [c34]Jaspreet Singh, Ron Ruhl, Dale Lindskog:
GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM. SocialCom 2013: 1005-1010 - [c33]Chikaodili Ekechukwu, Dale Lindskog, Ron Ruhl:
A Notary Extension for the Online Certificate Status Protocol. SocialCom 2013: 1016-1021 - [c32]Azin Moradmand Badie, Dale Lindskog, Ron Ruhl:
Responding to intrusions in mobile ad hoc networks. WorldCIS 2013: 30-34 - 2012
- [c31]Fares Almari, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Amer Aljaedi:
Performance Analysis of Oracle Database in Virtual Environments. AINA Workshops 2012: 1238-1245 - [c30]Pallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Fault Tree Analysis of Accidental Insider Security Events. CyberSecurity 2012: 113-118 - [c29]Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A Review and Comparative Study of Digital Forensic Investigation Models. ICDF2C 2012: 314-327 - [c28]Henry Nnoli, Dale Lindskog, Pavol Zavarsky, Shaun Aghili, Ron Ruhl:
The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches. SocialCom/PASSAT 2012: 734-741 - [c27]Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS. SocialCom/PASSAT 2012: 797-806 - [c26]Kashif Syed, Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Shaun Aghili:
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process. TrustBus 2012: 50-64 - [c25]Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The implementation of a full EMV smartcard for a point-of-sale transaction. WorldCIS 2012: 28-35 - [c24]Mirza Baig, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
The study of evasion of packed PE from static detection. WorldCIS 2012: 99-104 - [c23]Cyril Ikenna Nwafor, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management. WorldCIS 2012: 150-157 - [c22]Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An analysis of security weaknesses in the evolution of RFID enabled passport. WorldCIS 2012: 158-166 - [c21]Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
Enhanced side-channel analysis method to detect hardware virtualization based rootkits. WorldCIS 2012: 192-201 - [c20]Adetorera Sogbesan, Ayo Ibidapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Collusion threat profile analysis: Review and analysis of MERIT model. WorldCIS 2012: 212-217 - [c19]Prince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
The study of civil litigation in data storage environment. WorldCIS 2012: 224-230 - 2011
- [c18]Harpreet Kohli, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
An Enhanced Threat Identification Approach for Collusion Threats. Metrisec@ESEM 2011: 25-30 - [c17]Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Performance Evaluation of Oracle VM Server Virtualization Software 64 Bit Linux Environment. Metrisec@ESEM 2011: 51-57 - [c16]Nidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection. SocialCom/PASSAT 2011: 1095-1101 - [c15]Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment. SocialCom/PASSAT 2011: 1119-1124 - [c14]Ayodele Oluwaseun Ibidapo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of CVSS v2 Environmental Scoring. SocialCom/PASSAT 2011: 1125-1130 - [c13]Siew Yong, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles. SocialCom/PASSAT 2011: 1220-1223 - [c12]Amer Aljaedi, Dale Lindskog, Pavol Zavarsky, Ron Ruhl, Fares Almari:
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging. SocialCom/PASSAT 2011: 1253-1258 - [c11]Boyan Chen, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A Study of the Effectiveness of CSRF Guard. SocialCom/PASSAT 2011: 1269-1272 - [c10]David C. Edwards, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Shaun Aghili:
E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government. SocialCom/PASSAT 2011: 1273-1277 - [c9]Yung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Trend Analysis of the CVE for Software Vulnerability Management. SocialCom/PASSAT 2011: 1290-1293 - [c8]Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Media Access Control Address Spoofing Attacks against Port Security. WOOT 2011: 1-8 - [c7]Assad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score. WorldCIS 2011: 109-113 - 2010
- [c6]Collins Umana, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Oluwatoyin Gloria Ake-Johnson:
Comparative Analysis of ccTLD Security Policies. SocialCom/PASSAT 2010: 926-933 - [c5]Caroline Ngeno, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
User's Perspective: Privacy and Security of Information on Social Networks. SocialCom/PASSAT 2010: 1038-1043 - [c4]Ebenezer Sackey, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:
A Framework for Home Wireless Network Security Education. SocialCom/PASSAT 2010: 1044-1049 - 2009
- [c3]Zhitao Huang, Pavol Zavarsky, Ron Ruhl:
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002. CSE (3) 2009: 386-391 - [c2]Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor:
Managing Risk of IT Security Outsourcing in the Decision-Making Stage. CSE (3) 2009: 456-461 - [c1]Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Threat Modeling for CSRF Attacks. CSE (3) 2009: 486-491
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint