Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XEON - An Architecture for an XML Enabled Firewall., , and . ICEIS, page 1111-1116. (2002)Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment., and . ECIW, page 9-20. Academic Conferences Limited, Reading, UK, (2005)Inter-organisational intrusion detection using knowledge grid technology., , and . Inf. Manag. Comput. Secur., 14 (4): 327-342 (2006)Presenting DEViSE: Data Exchange for Visualizing Security Events., , and . IEEE Computer Graphics and Applications, 29 (3): 6-11 (2009)Forensic cloud environment: a solution for big data forensics., , , and . Int. J. Electron. Secur. Digit. Forensics, 14 (5): 513-533 (2022)A review of cyber security risk assessment methods for SCADA systems., , , , , , and . Comput. Secur., (2016)Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection., and . ECIW, page 117-128. Academic Conferences Limited, Reading, UK, (2005)Information Assurance - Security in the Information Environment, and . Computer Communications and Networks Springer, (2006)An XML-based architecture for data integration in vulnerability assessments., and . Inf. Manag. Comput. Security, 13 (4): 260-273 (2005)ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements., , , and . COOCS, page 216-227. ACM, (1993)