George M. Mohay
According to our database1,
George M. Mohay
authored at least 45 papers
between 1988 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events.
Comput. Secur., 2014
2013
Proceedings of the Influence of Technology on Social Network Analysis and Mining, 2013
2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012
2011
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines.
Digit. Investig., 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Proceedings of the Ninth Australasian Information Security Conference, 2011
Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Digital Forensics and Cyber Crime, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010
2009
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Forensics in Telecommunications, 2009
2008
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks.
Proceedings of the The Third International Conference on Availability, 2008
2006
Exploring Transport Layer Solutions for Parallelism and Load Balancing within Internet Service Clusters.
Int. Trans. Syst. Sci. Appl., 2006
Digit. Investig., 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
2005
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Intell. Syst. Account. Finance Manag., 2004
Generalising Event Forensics Across Multiple Domains.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004
2003
Internet Service Cluster Dispatching Via a TCP Redirection Option.
Proceedings of the International Conference on Internet Computing, 2003
ECF - Event Correlation for Forensics.
Proceedings of the 1st Australian Computer, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
Proceedings of the Applications of Data Mining in Computer Security, 2002
2001
1997
MIATA: A Machine-Independent Audit Trail Analyser.
Aust. Comput. J., 1997
Using Time Series Methods in Profiling Computer User Activity for Intrusion Detection: Case Study Results.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1995
1991
Realtime programming in Modula-2.
Aust. Comput. J., 1991
1988
Modula-2 - a second course in programming.
Advances in computer science series, Prentice Hall, ISBN: 978-0-13-599390-3, 1988