Author of the publication

Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection.

, and . ECIW, page 117-128. Academic Conferences Limited, Reading, UK, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forensic Readiness for SCADA/ICS Incident Response., , , , , , and . ICS-CSR, BCS, (2016)Responsibility Modelling: A New Approach to the Re-Alignment and Re-Engineering of Health-Care Organisations.. Personal Medical Information, Springer, (1997)The Impact of Hard Disk Firmware Steganography on Computer Forensics., , , and . J. Digit. Forensics Secur. Law, 4 (2): 73-84 (2009)Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment., and . ECIW, page 9-20. Academic Conferences Limited, Reading, UK, (2005)XEON - An Architecture for an XML Enabled Firewall., , and . ICEIS, page 1111-1116. (2002)Inter-organisational intrusion detection using knowledge grid technology., , and . Inf. Manag. Comput. Secur., 14 (4): 327-342 (2006)Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection., and . ECIW, page 117-128. Academic Conferences Limited, Reading, UK, (2005)ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements., , , and . COOCS, page 216-227. ACM, (1993)A Unified Approach to Network Traffic and Network Security Visualisation., , and . ICC, page 1-6. IEEE, (2009)A Forensic Taxonomy of SCADA Systems and Approach to Incident Response., , , , and . ICS-CSR, BCS, (2015)