Old Web
English
Sign In
Acemap
>
authorDetail
>
Helge Janicke
Helge Janicke
King Saud University
Computer security
Computer science
Threat model
Open research
Authentication
5
Papers
20
Citations
0.00
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (5)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges
2018
Mohamed Amine Ferrag
Abdelouahid Derhab
Leandros A. Maglaras
Mithun Mukherjee
Helge Janicke
Show All
Source
Cite
Save
Citations (8)
Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues.
2018
arXiv: Cryptography and Security
Mohamed Amine Ferrag
Leandros A. Maglaras
Abdelouahid Derhab
Athanasios V. Vasilakos
Stylianos Rallis
Helge Janicke
Show All
Source
Cite
Save
Citations (3)
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes
2017
Barnaby Stewart
Luis Rosa
Leandros A. Maglaras
Tiago Cruz
Mohamed Amine Ferrag
P.C.P.S. Simoes
Helge Janicke
Show All
Source
Cite
Save
Citations (9)
A Framework for Minimizing Data Leakage from Nonproduction Systems
2017
Jacqueline Cope
Leandros A. Maglaras
Francois Siewe
Feng Chen
Helge Janicke
Show All
Source
Cite
Save
Citations (0)
Securing Vehicular Networks Against Congestion Attacks Using Smart Defense Mechanisms
2015
Pavlos Basaras
Leandros A. Maglaras
Dimitrios Katsaros
Helge Janicke
Show All
Source
Cite
Save
Citations (0)
1