George M. Mohay

According to our database1, George M. Mohay authored at least 45 papers between 1988 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events.
Comput. Secur., 2014

2013
Enhancing Child Safety in MMOGs.
Proceedings of the Influence of Technology on Social Network Analysis and Mining, 2013

2012
Ensemble-based DDoS detection and mitigation model.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Modelling Web-server Flash Events.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

2011
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines.
Digit. Investig., 2011

Detecting Collusive Fraud in Enterprise Resource Planning Systems.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Detection of Anomalies from User Profiles Generated from System Logs.
Proceedings of the Ninth Australasian Information Security Conference, 2011

Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Fraud Detection in ERP Systems Using Scenario Matching.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Use of IP Addresses for High Rate Flooding Attack Detection.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Dealing with the Problem of Cybercrime.
Proceedings of the Digital Forensics and Cyber Crime, 2010

A Distributed Denial of Service Testbed.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

Money Laundering and FATF Compliance by the International Community.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

A Framework for Improved Adolescent and Child Safety in MMOs.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

A Model for Computer Profiling.
Proceedings of the ARES 2010, 2010

2009
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.
Proceedings of the Identity and Privacy in the Internet Age, 2009

FIA: An Open Forensic Integration Architecture for Composing Digital Evidence.
Proceedings of the Forensics in Telecommunications, 2009

2008
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks.
Proceedings of the The Third International Conference on Availability, 2008

2006
Exploring Transport Layer Solutions for Parallelism and Load Balancing within Internet Service Clusters.
Int. Trans. Syst. Sci. Appl., 2006

A correlation method for establishing provenance of timestamps in digital evidence.
Digit. Investig., 2006

Automated recognition of event scenarios for digital forensics.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Distributed intrusion detection in clusters based on non-interference.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Challenges of Automating the Detection of Paedophile Activity on the Internet.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Technical Challenges and Directions for Digital Forensics.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Machine-independent audit trail analysis - a tool for continuous audit assurance.
Intell. Syst. Account. Finance Manag., 2004

Generalising Event Forensics Across Multiple Domains.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004

2003
Internet Service Cluster Dispatching Via a TCP Redirection Option.
Proceedings of the International Conference on Internet Computing, 2003

ECF - Event Correlation for Forensics.
Proceedings of the 1st Australian Computer, 2003

Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
IDS Interoperability and Correlation Using IDMEF and Commodity Systems.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Gender-Preferential Text Mining of E-mail Discourse.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

E-Mail Authorship Attribution for Computer Forensics.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
Mining Email Content for Author Identification Forensics.
SIGMOD Rec., 2001

1997
MIATA: A Machine-Independent Audit Trail Analyser.
Aust. Comput. J., 1997

Using Time Series Methods in Profiling Computer User Activity for Intrusion Detection: Case Study Results.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

Kernel and Shell-Based Applications Integrity Assurance.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

ProtectOS: Operating System and Hardware Support for Small Objects.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1995
The CASS Shell.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1991
Realtime programming in Modula-2.
Aust. Comput. J., 1991

1988
Modula-2 - a second course in programming.
Advances in computer science series, Prentice Hall, ISBN: 978-0-13-599390-3, 1988


  Loading...