Items where Author is "Day, David"

[Atom feed] Atom [RSS2 feed] RSS
Group by: Item Type | Full Text | No Grouping
Number of items: 13.

Article

file
SHENFIELD, Alex, DAY, David and AYESH, Aladdin (2018). Intelligent intrusion detection systems using artificial neural networks. ICT Express. [Article]

file
DAY, David and ZHAO, Zhengxu (2011). Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems. International Journal of Automation and Computing, 8 (4), 472-483. [Article]

file
LALLIE, Harjinder Singh, LAWSON, Philip and DAY, David (2011). Using digital logs to reduce academic misdemeanour by students in digital forensic assessments. Journal of Information Technology Education, 10, 255-269. [Article]

Book Section

file
ONOTU, Patrick, DAY, David and RODRIGUES, Marcos (2015). Accurate shellcode recognition from network traffic data using artificial neural nets. In: Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) . IEEE. [Book Section]

ONOTU, Patrick, DAY, David and RODRIGUES, Marcos (2015). Accurate shellcode recognition from network traffic data using artificial neural nets. In: Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on. IEEE, 355-360. [Book Section]

OIKONOMOU, Andreas, HARTESCU, Dan, DAY, David and MA, Minhua (2014). Computer games physiotherapy for children with cystic fibrosis. In: Virtual, augmented reality and serious games for healthcare. Intelligent Systems Reference Library, 1 (68). Heidelberg, Springer, 411-443. [Book Section]

file
DAY, David (2014). Seizing, imaging, and analyzing digital evidence : step-by-step guidelines. In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.) Cyber crime and cyber terrorism investigator's handbook. Waltham, MA., Syngress, 71-88. [Book Section]

file
MIDDLETON, Ray, DAY, David and LALLIE, Harjinder Singh (2013). Global network security: a vulnerability assessment of seven popular outsourcing countries. In: 2012 IEEE International Conference on Green Computing and Communications. IEEE. [Book Section]

file
DAY, David and FLORES, Denys (2012). CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). Institute of Electrical and Electronics Engineers ( IEEE ), 931-936. [Book Section]

DAY, David (2011). A performance analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines. In: ICDS 2011, The Fifth International Conference on Digital Society. IARIA, 187-192. [Book Section]

DAY, David, ZHAO, Zhengxu and MA, Minhua (2010). Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems. In: Digital Society , 2010 . ICDS '10 . Fourth International Conference on. IEEE Computer Society. [Book Section]

Conference or Workshop Item

file
OIKONOMOU, Andreas and DAY, David (2012). Using Serious Games to Motivate Children with Cystic Fibrosis to Engage with Mucus Clearance Physiotherapy. In: The Sixth International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2012), Sanpaolo Palace Hotel, Palermo, Italy, July 4th-July 6th. (Submitted) [Conference or Workshop Item]

LALLIE, Harjinder Singh and DAY, David (2012). Industrial engagement in information security and digital forensics: achieving the transitional blend from academia to industry. In: HEA Stem Conference, Imperial College, London, April 13th 2012. [Conference or Workshop Item]

This list was generated on Fri Dec 20 16:59:03 2024 UTC.