Charles Iheagwara, Andrew Blyth, Mike Bennett Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation. [Citation Graph (0, 0)][DBLP] ICW/ICHSN/ICMCS/SENET, 2005, pp:434-441 [Conf]
Andrew Blyth, J. Chudge The Role of Interaction Analysis in Reuqirements Engineering. [Citation Graph (0, 0)][DBLP] Information System Development Process, 1993, pp:189-205 [Conf]
Charles Iheagwara, Andrew Blyth Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study. [Citation Graph (0, 0)][DBLP] Computer Networks, 2002, v:39, n:2, pp:93-112 [Journal]
Charles Iheagwara, Andrew Blyth The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments. [Citation Graph (0, 0)][DBLP] Computer Networks, 2002, v:39, n:6, pp:827-840 [Journal]
Andrew Blyth, Paula Thomas Performing real-time threat assessment of security incidents using data fusion of IDS logs. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:6, pp:513-534 [Journal]
A Unified Approach to Network Traffic and Network Security Visualisation. [Citation Graph (, )][DBLP]
Presenting DEViSE: Data Exchange for Visualizing Security Events. [Citation Graph (, )][DBLP]
Xbox 360: A digital forensic investigation of the hard disk drive. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP