Items where SHU Author is "Day, David"

Up a level
Export as [feed] RSS
Group by: Item Type | Full Text | No Grouping
Jump to: None | Public | Restricted
Number of items: 10.

None

ONOTU, Patrick, DAY, David and RODRIGUES, Marcos (2015). Accurate shellcode recognition from network traffic data using artificial neural nets. In: Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on. IEEE, 355-360.

LALLIE, Harjinder Singh and DAY, David (2012). Industrial engagement in information security and digital forensics: achieving the transitional blend from academia to industry. In: HEA Stem Conference, Imperial College, London, April 13th 2012.

DAY, David (2011). A performance analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines. In: ICDS 2011, The Fifth International Conference on Digital Society. IARIA, 187-192.

DAY, David, ZHAO, Zhengxu and MA, Minhua (2010). Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems. In: Digital Society , 2010 . ICDS '10 . Fourth International Conference on. IEEE Computer Society.

Public

file
OIKONOMOU, Andreas and DAY, David (2012). Using Serious Games to Motivate Children with Cystic Fibrosis to Engage with Mucus Clearance Physiotherapy. In: The Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2012), Sanpaolo Palace Hotel, Palermo, Italy, July 4th-July 6th. (Submitted)

file
DAY, David and FLORES, Denys (2012). CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). Institute of Electrical and Electronics Engineers ( IEEE ), 931-936.

file
DAY, David and ZHAO, Zhengxu (2011). Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems. International Journal of Automation and Computing, 8 (4), 472-483.

file
LALLIE, Harjinder Singh, LAWSON, Philip and DAY, David (2011). Using digital logs to reduce academic misdemeanour by students in digital forensic assessments. Journal of Information Technology Education, 10, 255-269.

Restricted

file
DAY, David (2014). Seizing, imaging, and analyzing digital evidence : step-by-step guidelines. In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.) Cyber crime and cyber terrorism investigator's handbook. Waltham, MA., Syngress, 71-88.

file
MIDDLETON, Ray, DAY, David and LALLIE, Harjinder Singh (2012). Global network security: a vulnerability assessment of seven popular outsourcing countries. In: The IEEE International Conference on Internet of Things (IEEE iThings 2012), Besançon, France, November 20-23, 2012. (Unpublished)

This list was generated on Thu Sep 3 19:16:02 2015 UTC.