Formal verification of secure information flow in cloud computing W Zeng, M Koutny, P Watson, V Germanos Journal of Information Security and Applications 27, 103-116, 2016 | 37 | 2016 |
Modelling and analysis of corporate efficiency and productivity loss associated with enterprise information security technologies W Zeng, M Koutny Journal of Information Security and Application 49, 2019 | 36 | 2019 |
Quantitative evaluation of enterprise drm technology W Zeng, A van Moorsel Electronic Notes in Theoretical Computer Science 275, 159-174, 2011 | 25 | 2011 |
Modelling Hybrid Cyber Kill Chain W Zeng, V Germanos PNSE@Petri Nets 2019, 143-160, 2019 | 14 | 2019 |
Quantitative analysis of opacity in cloud computing systems W Zeng, M Koutny IEEE Transactions on Cloud Computing 9 (3), 1210-1219, 2019 | 14 | 2019 |
Opacity in internet of things with cloud computing (short paper) W Zeng, M Koutny, P Watson 2015 IEEE 8th International Conference on Service-Oriented Computing and …, 2015 | 14 | 2015 |
Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology W Zeng, K Liu 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 13 | 2012 |
A methodology for cost‐benefit analysis of information security technologies W Zeng Concurrency and Computation: Practice and Experience 31 (7), e5004, 2019 | 11 | 2019 |
Benefit and cost of cloud computing security W Zeng, V Germanos 2019 IEEE Symposium on Software Engineering for Smart System, 2019 | 9 | 2019 |
Benefit and cost of cloud computing security W Zeng, V Germanos Harnessed Causality: Essays Dedicated to Maciej Koutny on the Occasion of …, 2018 | 9 | 2018 |
A flow sensitive security model for cloud computing systems W Zeng, C Mu, M Koutny, P Watson arXiv preprint arXiv:1404.7760, 2014 | 8 | 2014 |
Verifying secure information flow in federated clouds W Zeng, M Koutny, P Watson 2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014 | 7 | 2014 |
Data resources in dynamic environments W Zeng, M Koutny 2014 Theoretical Aspects of Software Engineering Conference, 185-192, 2014 | 7 | 2014 |
Cost-benefit analysis of digital rights management products using stochastic models W Zeng, K Liu, M Koutny Proceedings of the 46th Annual Simulation Symposium, 1-10, 2013 | 6 | 2013 |
Improving Cybersecurity incidents reporting in Nigeria: Micro, Small and Medium Enterprises perspectives F Ehi Ikuero, W Zeng Nigerian Journal of Technology 41, 512-520, 2022 | 4 | 2022 |
Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections? F Ehi-Ikuero, V Germanos, L Brooks, W Zeng EAI Endorsed Transactions on Security and Safety 8 (25), 2021 | 4 | 2021 |
How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems W Zeng, R Bashir, T Wood, F Siewe, H Janicke, I Wagner EAI Endorsed Transactions on Cloud Systems 7, 2020 | 4 | 2020 |
Mapping of the Security Requirements of GDPR and NIS N Saqib, V Germanos, W Zeng, L Maglaras EAI Endorsed Transaction on Security and Safety 7 (24), 2020 | 4 | 2020 |
Digital Rights Management W Zeng, SE Parkin, A Van Moorsel Technical Report: CS-TR-1223, School of Computing Science, Newcastle University, 2010 | 3 | 2010 |
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation R Bashir, H Janicke, W Zeng EAI Endorsed Transactions on Security and Safety 8 (25), 2021 | 1 | 2021 |