Follow
Wen Zeng
Title
Cited by
Cited by
Year
Formal verification of secure information flow in cloud computing
W Zeng, M Koutny, P Watson, V Germanos
Journal of Information Security and Applications 27, 103-116, 2016
362016
Modelling and analysis of corporate efficiency and productivity loss associated with enterprise information security technologies
W Zeng, M Koutny
Journal of Information Security and Application 49, 2019
342019
Quantitative evaluation of enterprise drm technology
W Zeng, A van Moorsel
Electronic Notes in Theoretical Computer Science 275, 159-174, 2011
242011
Modelling Hybrid Cyber Kill Chain
W Zeng, V Germanos
PNSE@Petri Nets 2019, 143-160, 2019
132019
Sensitivity analysis of loss of corporate efficiency and productivity associated with enterprise DRM technology
W Zeng, K Liu
2012 Seventh International Conference on Availability, Reliability and …, 2012
132012
Quantitative analysis of opacity in cloud computing systems
W Zeng, M Koutny
IEEE Transactions on Cloud Computing 9 (3), 1210-1219, 2019
122019
Opacity in internet of things with cloud computing (short paper)
W Zeng, M Koutny, P Watson
2015 IEEE 8th International Conference on Service-Oriented Computing and …, 2015
122015
A methodology for cost‐benefit analysis of information security technologies
W Zeng
Concurrency and Computation: Practice and Experience 31 (7), e5004, 2019
112019
Benefit and cost of cloud computing security
W Zeng, V Germanos
2019 IEEE Symposium on Software Engineering for Smart System, 2019
82019
Benefit and cost of cloud computing security
W Zeng, V Germanos
Harnessed Causality: Essays Dedicated to Maciej Koutny on the Occasion of …, 2018
82018
A flow sensitive security model for cloud computing systems
W Zeng, C Mu, M Koutny, P Watson
arXiv preprint arXiv:1404.7760, 2014
82014
Verifying secure information flow in federated clouds
W Zeng, M Koutny, P Watson
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
72014
Data resources in dynamic environments
W Zeng, M Koutny
2014 Theoretical Aspects of Software Engineering Conference, 185-192, 2014
72014
Cost-benefit analysis of digital rights management products using stochastic models
W Zeng, K Liu, M Koutny
Proceedings of the 46th Annual Simulation Symposium, 1-10, 2013
62013
Is E-voting Systems based on Blockchain Technology Efficient in Nigeria General Elections?
F Ehi-Ikuero, V Germanos, L Brooks, W Zeng
EAI Endorsed Transactions on Security and Safety 8 (25), 2021
42021
How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems
W Zeng, R Bashir, T Wood, F Siewe, H Janicke, I Wagner
EAI Endorsed Transactions on Cloud Systems 7, 2020
42020
Mapping of the Security Requirements of GDPR and NIS
N Saqib, V Germanos, W Zeng, L Maglaras
EAI Endorsed Transaction on Security and Safety 7 (24), 2020
32020
Digital Rights Management
W Zeng, SE Parkin, A Van Moorsel
Technical Report: CS-TR-1223, School of Computing Science, Newcastle University, 2010
32010
Improving Cybersecurity incidents reporting in Nigeria: Micro, Small and Medium Enterprises perspectives
F Ehi Ikuero, W Zeng
Nigerian Journal of Technology 41, 512-520, 2022
12022
Evaluating the Impact of Sandbox Applications on Live Digital Forensics Investigation
R Bashir, H Janicke, W Zeng
EAI Endorsed Transactions on Security and Safety 8 (25), 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20