Ron Ruhl
According to our database1,
Ron Ruhl
authored at least 45 papers
between 2009 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
2018
Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes Transmitted.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
2017
Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017
2016
Customizing IETF RFC 6280 Geopriv for Compliance of Wi-Fi Positioning System APIs with Privacy Laws.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities.
Proceedings of the 2014 World Congress on Internet Security, 2014
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012.
Proceedings of the 2014 World Congress on Internet Security, 2014
2013
Proceedings of the 2013 World Congress on Internet Security, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management.
Proceedings of the 2012 World Congress on Internet Security, 2012
Enhanced side-channel analysis method to detect hardware virtualization based rootkits.
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proceedings of the 2012 World Congress on Internet Security, 2012
Proposed Control Procedure to Mitigate the Risks of Strategic Information Outflow in the Recruitment Process.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS.
Proceedings of the 2012 International Conference on Privacy, 2012
The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches.
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score.
Proceedings of the 2011 World Congress on Internet Security, 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Performance Evaluation of Oracle VM Server Virtualization Software 64 Bit Linux Environment.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009