Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Planning and Refactoring in Extreme Programming., , , and . XP, volume 4044 of Lecture Notes in Computer Science, page 154-163. Springer, (2006)Private browsing: A window of forensic opportunity.. Digital Investigation, 11 (1): 20-29 (2014)Trust Without Identification.. SPC, volume 3934 of Lecture Notes in Computer Science, page 1-2. Springer, (2006)Optimising unicode regular expression evaluation with previews.. Softw. Pract. Exp., 47 (5): 669-688 (2017)Control consistency as a management tool: the identification of systematic security control weaknesses in air traffic management.. Int. J. Crit. Comput. Based Syst., 6 (3): 229-245 (2016)Refactoring service-based systems: how to avoid trusting a workflow service., and . Concurr. Comput. Pract. Exp., 18 (10): 1255-1275 (2006)Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise., , , , and . Inf. Syst. Frontiers, 15 (1): 17-34 (2013)Smart Devices and Software Agents: The Basics of Good Behaviour., , and . SPC, volume 2802 of Lecture Notes in Computer Science, page 39-52. Springer, (2003)Recovery of Encryption Keys from Memory Using a Linear Scan., and . ARES, page 1369-1376. IEEE Computer Society, (2008)CyBOK: The Cyber Security Body of Knowledge, , , , and . , 1.0. The National Cyber Security Centre, UK, (October 2019)