Peter Stephenson

According to our database1, Peter Stephenson authored at least 23 papers between 1999 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Health Mashups: Presenting Statistical Patterns between Wellbeing Data and Context in Natural Language to Promote Behavior Change.
ACM Trans. Comput. Hum. Interact., 2013

2012
Cyber Crime Assessment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2006
Trends.
J. Digit. Forensic Pract., 2006

2004
Forensic Analysis of Risks in Enterprise Systems.
Inf. Secur. J. A Glob. Perspect., 2004

Application Of Formal Methods To Root Cause Analysis of Digital Incidents.
Int. J. Digit. EVid., 2004

The right tools for the job.
Digit. Investig., 2004

Inner Earth: Towards Interaction Patterns.
Proceedings of the Technologies for Interactive Digital Storytelling and Entertainment, 2004

Accelerating the ray tracing of height fields.
Proceedings of the 2nd International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2004, 2004

2003
A Structured Approach to Incident Postmortems.
Inf. Secur. J. A Glob. Perspect., 2003

Structured Investigation of Digital Incidents in Complex Computing Environments.
Inf. Secur. J. A Glob. Perspect., 2003

Modeling of Post-Incident Root Cause Analysis.
Int. J. Digit. EVid., 2003

2001
France and the Art of Intrusion Detection.
Inf. Secur. J. A Glob. Perspect., 2001

Running the line: Line drawing using runs and runs of runs.
Comput. Graph., 2001

Making the DDA Run: Two-Dimensional Ray Traversal Using Runs and Runs of Runs.
Proceedings of the 24th Australasian Computer Science Conference (ACSC 2001), 29 January, 2001

2000
It's a Strange, Strange, Strange, Strange World.
Inf. Secur. J. A Glob. Perspect., 2000

Flying by the Seat of Our Pants.
Inf. Secur. J. A Glob. Perspect., 2000

Standards or Best Practices - Conflicting Interests.
Inf. Secur. J. A Glob. Perspect., 2000

Assessing Vulnerabilities.
Inf. Secur. J. A Glob. Perspect., 2000

Where Is the IDS?
Inf. Secur. J. A Glob. Perspect., 2000

Why Step When You Can Run? Iterative Line Digitization Algorithms Based On Hierarchies Of Runs.
IEEE Computer Graphics and Applications, 2000

1999
Coming of Age.
Inf. Secur. J. A Glob. Perspect., 1999

Hiring Hackers.
Inf. Secur. J. A Glob. Perspect., 1999

Information Warfare, or, Help! The Sky Is Falling!
Inf. Secur. J. A Glob. Perspect., 1999


  Loading...