Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Responsibility Modelling: A New Approach to the Re-Alignment and Re-Engineering of Health-Care Organisations.. Personal Medical Information, Springer, (1997)The Impact of Hard Disk Firmware Steganography on Computer Forensics., , , and . J. Digit. Forensics Secur. Law, 4 (2): 73-84 (2009)Forensic Readiness for SCADA/ICS Incident Response., , , , , , and . ICS-CSR, BCS, (2016)Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection., and . ECIW, page 117-128. Academic Conferences Limited, Reading, UK, (2005)ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements., , , and . COOCS, page 216-227. ACM, (1993)A Unified Approach to Network Traffic and Network Security Visualisation., , and . ICC, page 1-6. IEEE, (2009)XEON - An Architecture for an XML Enabled Firewall., , and . ICEIS, page 1111-1116. (2002)Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment., and . ECIW, page 9-20. Academic Conferences Limited, Reading, UK, (2005)Inter-organisational intrusion detection using knowledge grid technology., , and . Inf. Manag. Comput. Secur., 14 (4): 327-342 (2006)Xbox 360: A digital forensic investigation of the hard disk drive., , , , and . Digital Investigation, 6 (3-4): 104-111 (2010)