Forensic Readiness for SCADA/ICS Incident Response. | 0 | 0.34 | 2016 |
A forensic taxonomy of SCADA systems and approach to incident response | 3 | 0.44 | 2015 |
The Impact of Hard Disk Firmware Steganography on Computer Forensics. | 3 | 0.92 | 2009 |
An Architecture for An XML Enabled Firewall | 0 | 0.34 | 2009 |
Inter-organisational intrusion detection using knowledge grid technology | 2 | 0.54 | 2006 |
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection | 0 | 0.34 | 2005 |
Architecture for Near Real-Time Threat Assessment Using IDS Data | 0 | 0.34 | 2005 |
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment | 0 | 0.34 | 2005 |
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data | 1 | 0.36 | 2005 |
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment | 1 | 0.36 | 2005 |
XEON - An Architecture for an XML Enabled Firewall | 0 | 0.34 | 2002 |
Using Stakeholders, Domain Knowledge, and Responsibilities to Specify Information Systems' Requirements | 6 | 0.47 | 1999 |