John Haggerty

According to our database1, John Haggerty authored at least 46 papers between 1987 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Presence Metadata in the Internet of Things: Challenges and Opportunities.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2017
Using trust to detect denial of service attacks in the internet of things over MANETs.
Int. J. Space Based Situated Comput., 2017

2016
Avoiding the misuse of social media by employees.
Netw. Secur., 2016

Detect DoS Attack Using MrDR Method in Merging Two MANETs.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Investigating employee harassment via social media.
J. Syst. Inf. Technol., 2015

Extrusion detection of illegal files in cloud-based systems.
Int. J. Space Based Situated Comput., 2015

Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Understanding User Knowledge of Computer Security and Risk: A Comparative Study.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

2014
Forensic investigation of social networking applications.
Netw. Secur., 2014

Forensic triage of email network narratives through visualisation.
Inf. Manag. Comput. Secur., 2014

Retrieval and Analysis of Web Search Narratives for Digital Investigations.
Proceedings of the Tenth International Network Conference, 2014

A Taxonomy of Defence Mechanisms to Mitigate DoS Attacks in MANETs.
Proceedings of the Tenth International Network Conference, 2014

Visualization of System Log Files for Post-incident Analysis and Response.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
MetaFor: Metadata Signatures for Automated Remote File Identification in Forensic Investigations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

Visual Triage of Email Network Narratives for Digital Investigations.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

2012
A Framework for the Forensic Analysis of User Interaction with Social Media.
Int. J. Digit. Crime Forensics, 2012

Digital evidence from mobile telephone applications.
Comput. Law Secur. Rev., 2012

Forensic Analysis of User Interaction with Social Media: A Methodology.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

2011
Towards a Whole Body Sensing Platform for Healthcare Applications.
Proceedings of the Whole Body Interaction, 2011

Forensic investigation of cloud computing systems.
Netw. Secur., 2011

A Framework for the Forensic Investigation of Unstructured Email Relationship Data.
Int. J. Digit. Crime Forensics, 2011

Digital evidence from peer-to-peer networks.
Comput. Law Secur. Rev., 2011

A Social Network Discovery Model for Digital Forensics Investigations.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Temporal Social Network Analysis for Historians - A Case Study.
Proceedings of the IMAGAPP & IVAPP 2011, 2011

Expanding Tele-care: Using Motion Sensors for Monitoring Purposes.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

2010
Forensic investigation of peer-to-peer networks.
Netw. Secur., 2010

Digital evidence in cloud computing systems.
Comput. Law Secur. Rev., 2010

The legal aspects of corporate computer usage policies.
Comput. Law Secur. Rev., 2010

Efficient Address Management for Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
The legal aspects of corporate e-mail investigations.
Comput. Law Secur. Rev., 2009

Social Network Visualization for Forensic Investigation of E-mail.
Proceedings of the 4th International Workshop on Digital Forensics and Incident Analysis, 2009

Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks.
Proceedings of the NBiS 2009, 2009

2008
FORWEB: file fingerprinting for automated network forensics investigations.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

Protocol Specification for Conflict Free MANET Address Allocation Mechanisms.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
The legal aspects of corporate computer forensic investigations.
Comput. Law Secur. Rev., 2007

FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints.
Proceedings of the New Approaches for Security, 2007

Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking.
IEEE J. Sel. Areas Commun., 2005

Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
DiDDeM : a system for early detection of denial-of-services attacks.
PhD thesis, 2004

DiDDeM: a system for early detection of TCP SYN flood attacks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2002
The Threat From Within -An Analysis of Attacks on anInternal Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

1987
Synchronization in Neural Nets.
Proceedings of the Neural Information Processing Systems, Denver, Colorado, USA, 1987, 1987


  Loading...