Nick Savage
Affiliations:- University of Portsmouth, School of Computing, United Kingdom
According to our database1,
Nick Savage
authored at least 30 papers
between 2004 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
2004
2006
2008
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
6
7
8
2
1
1
4
6
4
1
1
1
1
3
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Digit. Investig., 2021
CHAINGE: A Blockchain Solution to Automate Payment Detail Updates to Subscription Services.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning.
Proceedings of the 2020 IEEE World Congress on Services, 2020
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020
Embedding Fuzzy Rules with YARA Rules for Performance Optimisation of Malware Analysis.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020
2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
A Ransomware Detection Method Using Fuzzy Hashing for Mitigating the Risk of Occlusion of Information Systems.
Proceedings of the International Symposium on Systems Engineering, 2019
Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
2018
Threat-Aware Honeypot for Discovering and Predicting Fingerprinting Attacks Using Principal Components Analysis.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
2016
Big data security analysis approach using Computational Intelligence techniques in R for desktop users.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
2014
A new approach for a better recovery of cluster head nodes in underwater sensor networks.
Proceedings of the International Conference on Telecommunications and Multimedia, 2014
2012
Digital forensic research - The analysis of user input on volatile memory of Windows application.
Proceedings of the 2012 World Congress on Internet Security, 2012
Biometric Identification in Virtual Worlds using Biometric Fusion Techniques.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
Proceedings of the 2011 World Congress on Internet Security, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Extraction of User Information by Pattern Matching Techniques in Windows Physical Memory.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011
2010
Graphical Authentication based on user Behaviour.
Proceedings of the SECRYPT 2010, 2010
2004
PhD thesis, 2004