Howard Chivers

According to our database1, Howard Chivers authored at least 34 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Scoping the Cyber Security Body of Knowledge.
IEEE Secur. Priv., 2018

Navigating the Windows Mail database.
Digit. Investig., 2018

2017
Optimising unicode regular expression evaluation with previews.
Softw. Pract. Exp., 2017

2016
Control consistency as a management tool: the identification of systematic security control weaknesses in air traffic management.
Int. J. Crit. Comput. Based Syst., 2016

2014
Private browsing: A window of forensic opportunity.
Digit. Investig., 2014

2013
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise.
Inf. Syst. Frontiers, 2013

Security Blind Spots in the ATM Safety Culture.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Forensic data recovery from the Windows Search Database.
Digit. Investig., 2011

2010
Detecting Hidden Encrypted Volumes.
Proceedings of the Communications and Multimedia Security, 2010

Optimising IDS Sensor Placement.
Proceedings of the ARES 2010, 2010

2009
XRound: A reversible template language and its application in model-based security analysis.
Inf. Softw. Technol., 2009

Risk profiles and distributed risk assessment.
Comput. Secur., 2009

A Deployment Value Model for Intrusion Detection Sensors.
Proceedings of the Advances in Information Security and Assurance, 2009

A Multi-objective Optimisation Approach to IDS Sensor Placement.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Windows Vista and digital investigations.
Digit. Investig., 2008

Recovery of Encryption Keys from Memory Using a Linear Scan.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Novel Approach to the Detection of Cheating in Multiplayer Online Games.
Proceedings of the 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 2007

2006
Security design analysis.
PhD thesis, 2006

Refactoring service-based systems: how to avoid trusting a workflow service.
Concurr. Comput. Pract. Exp., 2006

Security Planning and Refactoring in Extreme Programming.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2006

Trust Without Identification.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Agile development of secure web applications.
Proceedings of the 6th International Conference on Web Engineering, 2006

Information Modeling for Automated Risk Analysis.
Proceedings of the Communications and Multimedia Security, 2006

2005
Editorial.
Softw. Pract. Exp., 2005

Applying Security Design Analysis to a service-based system.
Softw. Pract. Exp., 2005

Breaking the Model: Finalisation and a Taxonomy of Security Attacks.
Proceedings of the REFINE 2005 Workshop, 2005

Agile Security Using an Incremental Security Architecture.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

High-integrity extreme programming.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Specifying Information-Flow Controls.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language.
Proceedings of the Model Driven Architecture, 2005

2004
Smart dust, friend or foe?--Replacing identity with configuration trust.
Comput. Networks, 2004

Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by datamining.
Proceedings of the Communications and Multimedia Security, 2004

2003
Smart Devices and Software Agents: The Basics of Good Behaviour.
Proceedings of the Security in Pervasive Computing, 2003


  Loading...