Richard E. Overill
Orcid: 0000-0002-5943-1812
According to our database1,
Richard E. Overill
authored at least 43 papers
between 1993 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2018
Entropy, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
2016
Neurocomputing, 2016
2015
Digit. Investig., 2015
Proceedings of the Tenth International Conference on Digital Information Management, 2015
2014
Secur. Commun. Networks, 2014
Artificial Neural Networks in the Detection of Known and Unknown DDoS Attacks: Proof-of-Concept.
Proceedings of the Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection, 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013
2012
Int. J. Inf. Technol. Commun. Convergence, 2012
Proceedings of the Balkan Conference in Informatics, 2012, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the ARES 2010, 2010
2009
Development of masters modules in computer forensics and cybercrime for computer science and forensic science students.
Int. J. Electron. Secur. Digit. Forensics, 2009
Proceedings of the Advances in Digital Forensics V, 2009
2008
2007
J. Comput. Virol., 2007
Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment.
Proceedings of the 2007 International Conference on Security & Management, 2007
2005
2004
Review: Views into the Chinese Room: New Essays on Searle and Artificial Intelligence.
J. Log. Comput., 2004
J. Log. Comput., 2004
2003
Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
2002
J. Log. Comput., 2002
2001
J. Log. Comput., 2001
Book Review: "Cryptography and Computational Number Theory" by K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing.
J. Log. Comput., 2001
Book Review: "Time Warps, String Edits, and Macromolecules: the Theory and Practice of Sequence Comparison" by David Sankoff and Joseph Kruskal.
J. Log. Comput., 2001
Book Review: "Parallel Processing and Parallel Algorithms: Theory and Computation" by Seyed H. Roosta.
J. Log. Comput., 2001
J. Log. Comput., 2001
1997
Parallel Comput., 1997
1996
1995
1994
Parallel Comput., 1994
1993
Comput. Humanit., 1993