|
Search the dblp DataBase
Scott Knight:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sylvain Marquis, Thomas R. Dean, Scott Knight
SCL: a language for security testing of network applications. [Citation Graph (0, 0)][DBLP] CASCON, 2005, pp:155-164 [Conf]
- Songtao Zhang, Thomas R. Dean, Scott Knight
A lightweight approach to state based security testing. [Citation Graph (0, 0)][DBLP] CASCON, 2006, pp:341-344 [Conf]
- Sylvain Marquis, Thomas R. Dean, Scott Knight
Packet decoding using context sensitive parsing. [Citation Graph (0, 0)][DBLP] CASCON, 2006, pp:263-274 [Conf]
- Jeffrey E. Brand, Scott Knight
The Narrative and Ludic Nexus in Computer Games: Diverse Worlds II. [Citation Graph (0, 0)][DBLP] DIGRA Conf., 2005, pp:- [Conf]
- Jeffrey E. Brand, Scott Knight, Jakub Majewski
The Diverse Worlds of Computer Games: A Content Analysis of Spaces, Populations, Styles and Narratives. [Citation Graph (0, 0)][DBLP] DIGRA Conf., 2003, pp:- [Conf]
- Constantine Daicos, Scott Knight
A Passive External Web Surveillance Technique for Private Networks. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2005, pp:88-103 [Conf]
- Oded Tal, Scott Knight, Tom Dean
Syntax-based Vulnerability Testing of Frame-based Network Protocols. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:155-160 [Conf]
- Constantine Daicos, Scott Knight
Concerning Enterprise Network Vulnerability to HTTP Tunneling. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:13-24 [Conf]
- Scott Knight, Luciano Carosielli
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:205-216 [Conf]
- Scott Knight, Scott Buffett, Patrick C. K. Hung
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:5, pp:285-286 [Journal]
One Employee and Several Applications: An Information Management Case Study. [Citation Graph (, )][DBLP]
Hardware Trojan Horse Device Based on Unintended USB Channels. [Citation Graph (, )][DBLP]
Permutation-based steganographic channels. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|