Items where Author is "Day, David"
Number of items: 13.
Article
SHENFIELD, Alex, DAY, David and AYESH, Aladdin
(2018).
Intelligent intrusion detection systems using artificial neural networks.
ICT Express.
[Article]
DAY, David and ZHAO, Zhengxu
(2011).
Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems.
International Journal of Automation and Computing, 8 (4), 472-483.
[Article]
LALLIE, Harjinder Singh, LAWSON, Philip and DAY, David
(2011).
Using digital logs to reduce academic misdemeanour by students in digital forensic assessments.
Journal of Information Technology Education, 10, 255-269.
[Article]
Book Section
ONOTU, Patrick, DAY, David and RODRIGUES, Marcos
(2015).
Accurate shellcode recognition from network traffic data using artificial neural nets.
In:
Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on.
IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
.
IEEE.
[Book Section]
ONOTU, Patrick, DAY, David and RODRIGUES, Marcos
(2015).
Accurate shellcode recognition from network traffic data using artificial neural nets.
In:
Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on.
IEEE, 355-360.
[Book Section]
OIKONOMOU, Andreas, HARTESCU, Dan, DAY, David and MA, Minhua
(2014).
Computer games physiotherapy for children with cystic fibrosis.
In:
Virtual, augmented reality and serious games for healthcare.
Intelligent Systems Reference Library, 1
(68).
Heidelberg, Springer, 411-443.
[Book Section]
DAY, David
(2014).
Seizing, imaging, and analyzing digital evidence : step-by-step guidelines.
In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.)
Cyber crime and cyber terrorism investigator's handbook.
Waltham, MA., Syngress, 71-88.
[Book Section]
MIDDLETON, Ray, DAY, David and LALLIE, Harjinder Singh
(2013).
Global network security: a vulnerability assessment of seven popular outsourcing countries.
In:
2012 IEEE International Conference on Green Computing and Communications.
IEEE.
[Book Section]
DAY, David and FLORES, Denys
(2012).
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection.
In:
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012).
Institute of Electrical and Electronics Engineers ( IEEE ), 931-936.
[Book Section]
DAY, David
(2011).
A performance analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines.
In:
ICDS 2011, The Fifth International Conference on Digital Society.
IARIA, 187-192.
[Book Section]
DAY, David, ZHAO, Zhengxu and MA, Minhua
(2010).
Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems.
In:
Digital Society , 2010 . ICDS '10 . Fourth International Conference on.
IEEE Computer Society.
[Book Section]
Conference or Workshop Item
OIKONOMOU, Andreas and DAY, David
(2012).
Using Serious Games to Motivate Children with Cystic Fibrosis to Engage with Mucus Clearance Physiotherapy.
In: The Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2012), Sanpaolo Palace Hotel, Palermo, Italy, July 4th-July 6th.
(Submitted)
[Conference or Workshop Item]
LALLIE, Harjinder Singh and DAY, David
(2012).
Industrial engagement in information security and digital forensics: achieving the transitional blend from academia to industry.
In: HEA Stem Conference, Imperial College, London, April 13th 2012.
[Conference or Workshop Item]