Helge Janicke
Orcid: 0000-0002-1345-2829
According to our database1,
Helge Janicke
authored at least 147 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language.
Comput. Secur., 2025
Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
Sensors, June, 2024
ACM Comput. Surv., June, 2024
Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures.
Internet Things, April, 2024
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects.
ICT Express, 2024
Zero Day Ransomware Detection with Pulse: Function Classification with Transformer Models and Assembly Language.
CoRR, 2024
Can We Trust Large Language Models Generated Code? A Framework for In-Context Learning, Security Patterns, and Code Evaluations Across Diverse LLMs.
CoRR, 2024
ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis.
CoRR, 2024
CoRR, 2024
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis.
CoRR, 2024
PDF Malware Detection: Toward Machine Learning Modeling With Explainability Analysis.
IEEE Access, 2024
2023
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports.
IEEE Trans. Intell. Transp. Syst., February, 2023
Inf., 2023
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023
Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper.
CoRR, 2023
Digital Twins and the Future of Their Use Enabling Shift Left and Shift Right Cybersecurity Operations.
Proceedings of the 5th IEEE International Conference on Trust, 2023
2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning.
Dataset, April, 2022
SmartValidator: A framework for automatic identification and classification of cyber threat data.
J. Netw. Comput. Appl., 2022
Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning.
IEEE Access, 2022
Proceedings of the 7th South-East Europe Design Automation, 2022
2021
WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles.
Sensors, 2021
Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis.
Enterp. Inf. Syst., 2021
CoRR, 2021
Comput. Secur., 2021
Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.
IEEE Access, 2021
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 6th South-East Europe Design Automation, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
2020
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education.
J. Comput. Virol. Hacking Tech., 2020
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues.
Telecommun. Syst., 2020
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation.
EAI Endorsed Trans. Security Safety, 2020
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Internet Technol. Lett., 2020
Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems".
J. Inf. Secur. Appl., 2020
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study.
J. Inf. Secur. Appl., 2020
RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks.
Future Internet, 2020
How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems.
EAI Endorsed Trans. Cloud Syst., 2020
A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles.
Array, 2020
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets.
Sci. Program., 2019
IEEE Internet Things J., 2019
Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector.
Int. J. Medical Informatics, 2019
Gov. Inf. Q., 2019
CoRR, 2019
Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership.
Comput. Secur., 2019
Comput. Secur., 2019
Exploring the role of work identity and work locus of control in information security awareness.
Comput. Secur., 2019
HEART-IS: A novel technique for evaluating human error-related information security incidents.
Comput. Secur., 2019
Real-Time Information Security Incident Management: A Case Study Using the IS-CHEC Technique.
IEEE Access, 2019
Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form.
IEEE Access, 2019
Proceedings of the 4th South-East Europe Design Automation, 2019
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019
A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models.
Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems, 2019
2018
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
J. Comput. Virol. Hacking Tech., 2018
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures.
EAI Endorsed Trans. Security Safety, 2018
Secur. Commun. Networks, 2018
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
J. Netw. Comput. Appl., 2018
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
CoRR, 2018
IEEE Access, 2018
Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification.
Proceedings of the Discovery Science - 21st International Conference, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
Secur. Commun. Networks, 2017
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
J. Sens. Actuator Networks, 2017
Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security".
J. Inf. Secur. Appl., 2017
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System.
Int. J. Cyber Warf. Terror., 2017
A security architectural pattern for risk management of industry control systems within critical national infrastructure.
Int. J. Crit. Infrastructures, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Towards data privacy in heterogeneous cloud environments: An extension to the SANTA policy language.
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017
Towards location-aware access control and data privacy in inter-cloud communications.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017
2016
EAI Endorsed Trans. Security Safety, 2016
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Sctivities.
EAI Endorsed Trans. Security Safety, 2016
Secur. Commun. Networks, 2016
Mob. Inf. Syst., 2016
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2016
EAI Endorsed Trans. e Learn., 2016
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development.
CoRR, 2016
Proceedings of the Industrial Networks and Intelligent Systems, 2016
Proceedings of the Industrial Networks and Intelligent Systems, 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Root cause analysis (RCA) as a preliminary tool into the investigation of identity theft.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
2015
Int. J. Inf. Sec., 2015
Proceedings of the 8th IFIP Wireless and Mobile Networking Conference, 2015
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Sci. Eng. Ethics, 2014
Proceedings of the Third International Workshop on Requirements Engineering for Sustainable Systems, 2014
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014
2013
Formal Methods Syst. Des., 2013
Proceedings of the 11th Workshop on Intelligent Solutions in Embedded Systems, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013
2012
Proceedings of the Eighth IEEE World Congress on Services, 2012
Multi-Factor Authentication Using Hardware Information and User Profiling Techniques.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
2011
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the CRiSIS 2011, 2011
2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
2006
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006
2005
Proceedings of the Defence Applications of Multi-Agent Systems, International Workshop, 2005
Autonomous Agents and Multi -agent Systems (AAMAS) for the Military - Issues and Challenges.
Proceedings of the Defence Applications of Multi-Agent Systems, International Workshop, 2005