Jeffrey Horton

According to our database1, Jeffrey Horton authored at least 9 papers between 1998 and 2009.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Ranking Attack Graphs with Graph Neural Networks.
Proceedings of the Information Security Practice and Experience, 2009

Distributed Detection of Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2007
Comparing and debugging firewall rule tables.
IET Inf. Secur., 2007

Transport Layer Identification of Skype Traffic.
Proceedings of the Information Networking. Towards Ubiquitous Networking and Services, 2007

An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Detecting Policy Violations through Traffic Analysis.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
On Securing RTP-Based Streaming Content with Firewalls.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

1999
Companion Viruses and the Macintosh: Threats and Countermeasures.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
Covert Distributed Computing Using Java Through Web Spoofing.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...