John N. Whitley

According to our database1, John N. Whitley authored at least 9 papers between 2009 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Maximise unsafe path routing protocol for forest fire monitoring system using Wireless Sensor Networks.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

Fooling a Liveness-Detecting Capacitive Fingerprint Scanner.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Attribution of attack trees.
Comput. Electr. Eng., 2011

DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platform.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
Adversarial Security: Getting to the Root of the Problem.
Proceedings of the Open Research Problems in Network Security, 2010

Evidential Notions of Defensibility and Admissibility with Property Preservation.
Proceedings of the Open Research Problems in Network Security, 2010

Quality of detectability (QoD) and QoD-aware AAT-based attack detection.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
On the Design of <i>Forgiving</i> Biometric Security Systems.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009


  Loading...