Cloud computing: The impact on digital forensic investigations S Biggs, S Vidalis 2009 International Conference for Internet Technology and Secured …, 2009 | 194 | 2009 |
Using vulnerability trees for decision making in threat assessment S Vidalis, A Jones University of Glamorgan, School of Computing, Tech. Rep. CS-03-2, 2003 | 53 | 2003 |
A critical discussion of risk and threat analysis methods and methodologies S Vidalis School of Computing Technical Report CS-04-03, University of Glamorgan, 2004 | 39 | 2004 |
Assessing identity theft in the Internet of Things S Vidalis, O Angelopoulou Journal of IT Convergence Practice, 2014 | 35 | 2014 |
Analyzing Threat Agents and Their Attributes. S Vidalis, A Jones ECIW, 369-380, 2005 | 28 | 2005 |
Cloud computing storms S Biggs, S Vidalis International Journal of Intelligent Computing Research 1 (1), 61-68, 2010 | 21 | 2010 |
A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues G Sharma, S Vidalis, N Anand, C Menon, S Kumar Electronics 10 (19), 2365, 2021 | 18 | 2021 |
Rethinking digital forensics A Jones, S Vidalis Annals of Emerging Technologies in Computing (AETiC), Print ISSN, 2516-0281, 2019 | 18 | 2019 |
Measuring vulnerabilities and their exploitation cycle E Morakis, S Vidalis, A Blyth Information Security Technical Report 8 (4), 45-55, 2003 | 14 | 2003 |
Security through deception S Vidalis, Z Kazmi Information Systems Security 16 (1), 34-41, 2007 | 13 | 2007 |
Analysis and implementation of threat agents profiles in semi-automated manner for a network traffic in real-time information environment G Sharma, S Vidalis, C Menon, N Anand, S Kumar Electronics 10 (15), 1849, 2021 | 11 | 2021 |
A framework for representing and analysing cyber attacks using object oriented hierarchy trees E Morakis, S Vidalis, A Blyth Proceedings of the 2nd European Conference On Information Warfare And …, 2003 | 11 | 2003 |
Assessing cyber-threats in the information environment S Vidalis, A Jones, A Blyth Network Security 2004 (11), 10-16, 2004 | 10 | 2004 |
TAMMPS: a threat assessment model for micro-payment systems S Vidalis School of Computing. Pontypridd, University of Glmaorgan, 1-152, 2001 | 9 | 2001 |
Information security and digital forensics in the world of cyber physical systems A Jones, S Vidalis, N Abouzakhar 2016 Eleventh international conference on digital information management …, 2016 | 8 | 2016 |
Threat Agents: what InfoSec officers need to know S Vidalis, A Jones Mediterranean Journal of Computers and Networks 1 (2), 97-110, 2005 | 8 | 2005 |
Security in heterogeneous large scale environments using GRID technology S Vidalis, M Pilgermann, E Morakis, A Blyth International Journal of Innovative Computing Information and Control 1, 715-725, 2005 | 8 | 2005 |
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases G Sharma, S Vidalis, C Menon, N Anand Multimedia Tools and Applications 82 (11), 16951-16971, 2023 | 7 | 2023 |
Towards ‘crime specific’digital investigation frameworks O Angelopoulou, S Vidalis | 7 | 2013 |
Enhanced reliable reactive routing (ER3) protocol for multimedia applications in 3D wireless sensor networks N Anand, S Varma, G Sharma, S Vidalis Multimedia Tools and Applications 77, 16927-16946, 2018 | 6 | 2018 |