Items where SHU Author is "Day, David"
|Up a level|
Number of items: 10.
ONOTU, Patrick, DAY, David and RODRIGUES, Marcos (2015). Accurate shellcode recognition from network traffic data using artificial neural nets. In: Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on. IEEE, 355-360.
LALLIE, Harjinder Singh and DAY, David (2012). Industrial engagement in information security and digital forensics: achieving the transitional blend from academia to industry. In: HEA Stem Conference, Imperial College, London, April 13th 2012.
DAY, David (2011). A performance analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines. In: ICDS 2011, The Fifth International Conference on Digital Society. IARIA, 187-192.
DAY, David, ZHAO, Zhengxu and MA, Minhua (2010). Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems. In: Digital Society , 2010 . ICDS '10 . Fourth International Conference on. IEEE Computer Society.
OIKONOMOU, Andreas and DAY, David (2012). Using Serious Games to Motivate Children with Cystic Fibrosis to Engage with Mucus Clearance Physiotherapy. In: The Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2012), Sanpaolo Palace Hotel, Palermo, Italy, July 4th-July 6th. (Submitted)
DAY, David and FLORES, Denys (2012). CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). Institute of Electrical and Electronics Engineers ( IEEE ), 931-936.
DAY, David and ZHAO, Zhengxu (2011). Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems. International Journal of Automation and Computing, 8 (4), 472-483.
LALLIE, Harjinder Singh, LAWSON, Philip and DAY, David (2011). Using digital logs to reduce academic misdemeanour by students in digital forensic assessments. Journal of Information Technology Education, 10, 255-269.
DAY, David (2014). Seizing, imaging, and analyzing digital evidence : step-by-step guidelines. In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.) Cyber crime and cyber terrorism investigator's handbook. Waltham, MA., Syngress, 71-88.
MIDDLETON, Ray, DAY, David and LALLIE, Harjinder Singh (2012). Global network security: a vulnerability assessment of seven popular outsourcing countries. In: The IEEE International Conference on Internet of Things (IEEE iThings 2012), Besançon, France, November 20-23, 2012. (Unpublished)