David J. Parish

According to our database1, David J. Parish authored at least 59 papers between 1989 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Using Pattern-of-Life as Contextual Information for Anomaly-Based Intrusion Detection Systems.
IEEE Access, 2017

Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Adding contextual information to Intrusion Detection Systems using Fuzzy Cognitive Maps.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016

2015
A statistical framework for identification of tunnelled applications using machine learning.
Int. Arab J. Inf. Technol., 2015

A data fusion technique to detect wireless network virtual jamming attacks.
Proceedings of the IEEE International Workshop on Measurements & Networking, 2015

Predicting multi-stage attacks based on IP information.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Manual and Automatic assigned thresholds in multi-layer data fusion intrusion detection system for 802.11 attacks.
IET Inf. Secur., 2014

Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Empirical study of automatic dataset labelling.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Using classification techniques for creation of predictive intrusion detection model.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis.
IEEE Trans. Affect. Comput., 2013

Detecting misbehaviour in WiFi using multi-layer metric data fusion.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013

2012
A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignment.
Proceedings of the 2012 World Congress on Internet Security, 2012

Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Attribution of attack trees.
Comput. Electr. Eng., 2011

Fusing multi-layer metrics for detecting security attacks in 802.11 networks.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platform.
Proceedings of the 2011 World Congress on Internet Security, 2011

An on-line wireless attack detection system using multi-layer data fusion.
Proceedings of the IEEE International Workshop on Measurement and Networking, 2011

2010
Applying wavelets for the controlled compression of communication network measurements.
IET Commun., 2010

Adversarial Security: Getting to the Root of the Problem.
Proceedings of the Open Research Problems in Network Security, 2010

Evidential Notions of Defensibility and Admissibility with Property Preservation.
Proceedings of the Open Research Problems in Network Security, 2010

Quality of detectability (QoD) and QoD-aware AAT-based attack detection.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

An approach to the automated selection of protocols for a wireless network design.
Proceedings of the 7th International Symposium on Communication Systems Networks and Digital Signal Processing, 2010

Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Challenges in the capture and dissemination of measurements from high-speed networks.
IET Commun., 2009

On the Design of <i>Forgiving</i> Biometric Security Systems.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Detection of applications within encrypted tunnels using packet size distributions.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Metrics for network forensics conviction evidence.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

A Framework for Cross-Layer Measurements in Wireless Networks.
Proceedings of the Fifth Advanced International Conference on Telecommunications, 2009

Compressing Computer Network Measurements Using Embedded Zerotree Wavelets.
Proceedings of the Fifth Advanced International Conference on Telecommunications, 2009

2008
A system for online compression of high-speed network measurements.
Int. J. Internet Protoc. Technol., 2008

Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2007
Network visualisation: a review.
IET Commun., 2007

A Live System for Wavelet Compression of High Speed Computer Network Measurements.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

Tracking sensor node operation deviations in wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2007

Node connectivity index as mobility metric for GA based QoS routing in MANET.
Proceedings of the 4th International Conference on Mobile Technology, 2007

Approximate wireless sensor network health monitoring.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

Visualising Communication Network Security Attacks.
Proceedings of the 11th International Conference on Information Visualisation, 2007

Traffic Summary Analysis for Network Abuse Detection in High Date-Rate ISP Networks.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Automated Detection of Emerging Network Security Threats.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Honey Plotter and the Web of Terror.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Automated Detection of Changes in Computer Network Measurements using Wavelets.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2006
Architecture for the management and presentation of communication network performance data.
IEEE Trans. Instrum. Meas., 2006

Detecting security threats in the network core using Data Mining techniques.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

2005
Detecting and classifying delay Data Exceptions on communication networks using rule based algorithms.
Int. J. Commun. Syst., 2005

Performance Evaluation of a PC-based Active Router and Analysis of an Active Secure FTP Application.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

2004
A System for Fault Detection and Reconfiguration of Hardware Based Active Networks.
Proceedings of the 10th IEEE International On-Line Testing Symposium (IOLTS 2004), 2004

2003
Reconfigurable Computing and Active Networks.
Proceedings of the International Conference on Engineering of Reconfigurable Systems and Algorithms, June 23, 2003

Hardware Support for Active Networking.
Proceedings of the International Conference on Security and Management, 2003

2001
A transform domain feature detection and concealment algorithm for errors in DCT encoded images.
Comput. Graph., 2001

Simulation of a Video Surveillance Network Using Remote Intelligent Security Cameras.
Proceedings of the Networking, 2001

2000
Providing an accurate global time reference to indoor computer based equipment.
Microprocess. Microsystems, 2000

A hybrid simulator for an ATM network.
Int. J. Commun. Syst., 2000

Processing network delay measurements into network events.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

1999
Generic Performance Management of Multiservice Networks.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

1995
On the accelerated simulation of VBR virtual channel multiplexing in a single-server first-in-first-out buffer.
Proceedings of the ATM Networks, 1995

1994
On the treatment of video cell loss in the transmission of motion-JPEG and JPEG images.
Comput. Graph., 1994

1989
Statistics of video signals for viewphone-type pictures.
IEEE J. Sel. Areas Commun., 1989


  Loading...