|
Search the dblp DataBase
George M. Mohay:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- John Holford, George M. Mohay
ProtectOS: Operating System and Hardware Support for Small Objects. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:102-113 [Conf]
- Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay
Gender-Preferential Text Mining of E-mail Discourse. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:282-292 [Conf]
- Stig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:49-58 [Conf]
- Nathan Carey, George M. Mohay, Andrew Clark
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:245-254 [Conf]
- George M. Mohay, J. Zellers
Kernel and Shell-Based Applications Integrity Assurance. [Citation Graph (0, 0)][DBLP] ACSAC, 1997, pp:34-43 [Conf]
- Jacob Zimmermann, George M. Mohay
Distributed intrusion detection in clusters based on non-interference. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:89-95 [Conf]
- David Duncombe, George M. Mohay, Andrew Clark
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:135-144 [Conf]
- George M. Mohay, Kevin Chen, Andrew Clark
ECF - Event Correlation for Forensics. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2003, pp:- [Conf]
- Bradley Schatz, George M. Mohay, Andrew Clark
Generalising Event Forensics Across Multiple Domains. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:136-144 [Conf]
- George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli
The CASS Shell. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:313-325 [Conf]
- Peter Clutterbuck, George M. Mohay
Internet Service Cluster Dispatching Via a TCP Redirection Option. [Citation Graph (0, 0)][DBLP] International Conference on Internet Computing, 2003, pp:381-387 [Conf]
- Nathan Carey, Andrew Clark, George M. Mohay
IDS Interoperability and Correlation Using IDMEF and Commodity Systems. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:252-264 [Conf]
- Jonathon Abbott, Jim Bell, Andrew Clark, Olivier Y. de Vel, George M. Mohay
Automated recognition of event scenarios for digital forensics. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:293-300 [Conf]
- George M. Mohay
Technical Challenges and Directions for Digital Forensics. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:155-164 [Conf]
- Lyta Penna, Andrew Clark, George M. Mohay
Challenges of Automating the Detection of Paedophile Activity on the Internet. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:206-222 [Conf]
- Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:89-104 [Conf]
- P. J. Best, George M. Mohay, Alison Anderson
MIATA: A Machine-Independent Audit Trail Analyser. [Citation Graph (0, 0)][DBLP] Australian Computer Journal, 1997, v:29, n:2, pp:57-63 [Journal]
- K. John Gough, George M. Mohay, W. Pease
Realtime programming in Modula-2. [Citation Graph (0, 0)][DBLP] Australian Computer Journal, 1991, v:23, n:4, pp:175-184 [Journal]
- Bradley Schatz, George M. Mohay, Andrew Clark
A correlation method for establishing provenance of timestamps in digital evidence. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2006, v:3, n:Supplement-1, pp:98-107 [Journal]
- Olivier Y. de Vel, Alison Anderson, Malcolm Corney, George M. Mohay
Mining Email Content for Author Identification Forensics. [Citation Graph (0, 0)][DBLP] SIGMOD Record, 2001, v:30, n:4, pp:55-64 [Journal]
- Peter Clutterbuck, George M. Mohay, Owen Seamons
Exploring Transport Layer Solutions for Parallelism and Load Balancing within Internet Service Clusters. [Citation Graph (0, 0)][DBLP] ITSSA, 2006, v:2, n:3, pp:273-280 [Journal]
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. [Citation Graph (, )][DBLP]
A Model for Computer Profiling. [Citation Graph (, )][DBLP]
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. [Citation Graph (, )][DBLP]
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. [Citation Graph (, )][DBLP]
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. [Citation Graph (, )][DBLP]
A Framework for Improved Adolescent and Child Safety in MMOs. [Citation Graph (, )][DBLP]
Search in 0.030secs, Finished in 0.032secs
|