The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

George M. Mohay: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Holford, George M. Mohay
    ProtectOS: Operating System and Hardware Support for Small Objects. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:102-113 [Conf]
  2. Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay
    Gender-Preferential Text Mining of E-mail Discourse. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:282-292 [Conf]
  3. Stig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann
    A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:49-58 [Conf]
  4. Nathan Carey, George M. Mohay, Andrew Clark
    Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:245-254 [Conf]
  5. George M. Mohay, J. Zellers
    Kernel and Shell-Based Applications Integrity Assurance. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:34-43 [Conf]
  6. Jacob Zimmermann, George M. Mohay
    Distributed intrusion detection in clusters based on non-interference. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:89-95 [Conf]
  7. David Duncombe, George M. Mohay, Andrew Clark
    Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:135-144 [Conf]
  8. George M. Mohay, Kevin Chen, Andrew Clark
    ECF - Event Correlation for Forensics. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2003, pp:- [Conf]
  9. Bradley Schatz, George M. Mohay, Andrew Clark
    Generalising Event Forensics Across Multiple Domains. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:136-144 [Conf]
  10. George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli
    The CASS Shell. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:313-325 [Conf]
  11. Peter Clutterbuck, George M. Mohay
    Internet Service Cluster Dispatching Via a TCP Redirection Option. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2003, pp:381-387 [Conf]
  12. Nathan Carey, Andrew Clark, George M. Mohay
    IDS Interoperability and Correlation Using IDMEF and Commodity Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:252-264 [Conf]
  13. Jonathon Abbott, Jim Bell, Andrew Clark, Olivier Y. de Vel, George M. Mohay
    Automated recognition of event scenarios for digital forensics. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:293-300 [Conf]
  14. George M. Mohay
    Technical Challenges and Directions for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:155-164 [Conf]
  15. Lyta Penna, Andrew Clark, George M. Mohay
    Challenges of Automating the Detection of Paedophile Activity on the Internet. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:206-222 [Conf]
  16. Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
    The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:89-104 [Conf]
  17. P. J. Best, George M. Mohay, Alison Anderson
    MIATA: A Machine-Independent Audit Trail Analyser. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1997, v:29, n:2, pp:57-63 [Journal]
  18. K. John Gough, George M. Mohay, W. Pease
    Realtime programming in Modula-2. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1991, v:23, n:4, pp:175-184 [Journal]
  19. Bradley Schatz, George M. Mohay, Andrew Clark
    A correlation method for establishing provenance of timestamps in digital evidence. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:Supplement-1, pp:98-107 [Journal]
  20. Olivier Y. de Vel, Alison Anderson, Malcolm Corney, George M. Mohay
    Mining Email Content for Author Identification Forensics. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:4, pp:55-64 [Journal]
  21. Peter Clutterbuck, George M. Mohay, Owen Seamons
    Exploring Transport Layer Solutions for Parallelism and Load Balancing within Internet Service Clusters. [Citation Graph (0, 0)][DBLP]
    ITSSA, 2006, v:2, n:3, pp:273-280 [Journal]

  22. Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. [Citation Graph (, )][DBLP]


  23. A Model for Computer Profiling. [Citation Graph (, )][DBLP]


  24. A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. [Citation Graph (, )][DBLP]


  25. Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. [Citation Graph (, )][DBLP]


  26. FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. [Citation Graph (, )][DBLP]


  27. A Framework for Improved Adolescent and Child Safety in MMOs. [Citation Graph (, )][DBLP]


Search in 0.030secs, Finished in 0.032secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002