Pavol Zavarsky
According to our database1,
Pavol Zavarsky
authored at least 82 papers
between 1999 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities.
Proceedings of the 3rd International Conference on Data Intelligence and Security, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Deep Packet Inspection in Industrial Automation Control System to Mitigate Attacks Exploiting Modbus/TCP Vulnerabilities.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Applying ML Algorithms to improve traffic classification in Intrusion Detection Systems.
Proceedings of the 19th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2020
2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019
Private Blockchain Network for IoT Device Firmware Integrity Verification and Update.
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
2018
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018
Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Simulating link aggregation in private virtual lan using openflow for cloud environment.
Proceedings of the Communications and Networking Symposium, 2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Prevention of Ransomware Execution in Enterprise Environment on Windows OS: Assessment of Application Whitelisting Solutions.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Impact of Paranoia Levels on the Effectiveness of the ModSecurity Web Application Firewall.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 5th International Conference on Control, 2018
2017
Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
Analysis and compliance evaluation of cookies-setting websites with privacy protection laws.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture.
Proceedings of the Ad Hoc Networks, 2017
2016
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015
Study of applicability of Chinese remainder theorem based group key management for cloud environment.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilities.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Study of compliance of Apple's location based APIs with recommendations of the IETF Geopriv.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2014
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities.
Proceedings of the 2014 World Congress on Internet Security, 2014
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012.
Proceedings of the 2014 World Congress on Internet Security, 2014
2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management.
Proceedings of the 2012 World Congress on Internet Security, 2012
Enhanced side-channel analysis method to detect hardware virtualization based rootkits.
Proceedings of the 2012 World Congress on Internet Security, 2012
Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phaseas needed.
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS.
Proceedings of the 2012 International Conference on Privacy, 2012
The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches.
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score.
Proceedings of the 2011 World Congress on Internet Security, 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Performance Evaluation of Oracle VM Server Virtualization Software 64 Bit Linux Environment.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2006
Proceedings of the 15th international conference on World Wide Web, 2006
2005
Proceedings of the 14th international conference on World Wide Web, 2005
2003
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Eigenvalue approach to analysis of performance of non-orthogonal perfect reconstruction filter banks in signal reconstruction applications.
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
2001
A signal reconstruction method based on an unwrapping of signals in transform domain.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001
1999
Bounds of biorthogonal decompositions and a lossless modification of signal-to-noise ratio.
Proceedings of the ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications, 1999