Clive Blackwell

According to our database1, Clive Blackwell authored at least 17 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Using Security Patterns for Modelling Security Capabilities in Grid Systems.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Using Fraud Trees to Analyze Internet Credit Card Fraud.
Proceedings of the Advances in Digital Forensics X, 2014

Future Directions for Research on Cyberpatterns.
Proceedings of the Cyberpatterns, 2014

Towards a Penetration Testing Framework Using Attack Patterns.
Proceedings of the Cyberpatterns, 2014

A Strategy for Structuring and Formalising Attack Patterns.
Proceedings of the Cyberpatterns, 2014

Towards a Conceptual Framework for Security Patterns.
Proceedings of the Cyberpatterns, 2014

2013
A Framework for Digital Forensics and Investigations: The Goal-Driven Approach.
Int. J. Digit. Crime Forensics, 2013

Using a Goal-Driven Approach in the Investigation of a Questioned Contract.
Proceedings of the Advances in Digital Forensics IX, 2013

2011
An Investigative Framework for Incident Analysis.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

A Forensic Framework for Incident Analysis Applied to the Insider Threat.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Formally modeling the electricity grid with bigraphs.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
A security ontology for incident analysis.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
A reasoning agent for credit card fraud using the event calculus.
Int. J. Electron. Secur. Digit. Forensics, 2009

A Security Architecture to Protect Against Data Loss.
Proceedings of the Information Security and Digital Forensics, 2009

A security architecture to protect against the insider threat from damage, fraud and theft.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
The management of online credit card data using the Payment Card Industry Data Security Standard.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

A multi-layered security architecture for modelling complex systems.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008


  Loading...