Author of the publication

Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation.

, , and . Systems Communications, page 434-441. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment., and . ECIW, page 9-20. Academic Conferences Limited, Reading, UK, (2005)Forensic cloud environment: a solution for big data forensics., , , and . Int. J. Electron. Secur. Digit. Forensics, 14 (5): 513-533 (2022)XEON - An Architecture for an XML Enabled Firewall., , and . ICEIS, page 1111-1116. (2002)Presenting DEViSE: Data Exchange for Visualizing Security Events., , and . IEEE Computer Graphics and Applications, 29 (3): 6-11 (2009)Inter-organisational intrusion detection using knowledge grid technology., , and . Inf. Manag. Comput. Secur., 14 (4): 327-342 (2006)Information Assurance - Security in the Information Environment, and . Computer Communications and Networks Springer, (2006)Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection., and . ECIW, page 117-128. Academic Conferences Limited, Reading, UK, (2005)A review of cyber security risk assessment methods for SCADA systems., , , , , , and . Comput. Secur., (2016)ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements., , , and . COOCS, page 216-227. ACM, (1993)An XML-based architecture for data integration in vulnerability assessments., and . Inf. Manag. Comput. Security, 13 (4): 260-273 (2005)