The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Scott Knight: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sylvain Marquis, Thomas R. Dean, Scott Knight
    SCL: a language for security testing of network applications. [Citation Graph (0, 0)][DBLP]
    CASCON, 2005, pp:155-164 [Conf]
  2. Songtao Zhang, Thomas R. Dean, Scott Knight
    A lightweight approach to state based security testing. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:341-344 [Conf]
  3. Sylvain Marquis, Thomas R. Dean, Scott Knight
    Packet decoding using context sensitive parsing. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:263-274 [Conf]
  4. Jeffrey E. Brand, Scott Knight
    The Narrative and Ludic Nexus in Computer Games: Diverse Worlds II. [Citation Graph (0, 0)][DBLP]
    DIGRA Conf., 2005, pp:- [Conf]
  5. Jeffrey E. Brand, Scott Knight, Jakub Majewski
    The Diverse Worlds of Computer Games: A Content Analysis of Spaces, Populations, Styles and Narratives. [Citation Graph (0, 0)][DBLP]
    DIGRA Conf., 2003, pp:- [Conf]
  6. Constantine Daicos, Scott Knight
    A Passive External Web Surveillance Technique for Private Networks. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:88-103 [Conf]
  7. Oded Tal, Scott Knight, Tom Dean
    Syntax-based Vulnerability Testing of Frame-based Network Protocols. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:155-160 [Conf]
  8. Constantine Daicos, Scott Knight
    Concerning Enterprise Network Vulnerability to HTTP Tunneling. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:13-24 [Conf]
  9. Scott Knight, Luciano Carosielli
    Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:205-216 [Conf]
  10. Scott Knight, Scott Buffett, Patrick C. K. Hung
    The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:5, pp:285-286 [Journal]

  11. One Employee and Several Applications: An Information Management Case Study. [Citation Graph (, )][DBLP]


  12. Hardware Trojan Horse Device Based on Unintended USB Channels. [Citation Graph (, )][DBLP]


  13. Permutation-based steganographic channels. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002