John Sheppard

Orcid: 0000-0003-4212-0329

Affiliations:
  • Waterford Institute of Technology, Ireland
  • University College Dublin, Ireland (PhD)


According to our database1, John Sheppard authored at least 13 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review.
CoRR, 2024

2023
ChatGPT for digital forensic investigation: The good, the bad, and the unknown.
Forensic Sci. Int. Digit. Investig., October, 2023

DFRWS EU 10-Year Review and Future Directions in Digital Forensic Research.
CoRR, 2023

An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

2022
Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions.
IEEE Access, 2022

Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

2021
What do incident response practitioners need to know? A skillmap for the years ahead.
Digit. Investig., 2021

2020
Retracing the Flow of the Stream: Investigating Kodi Streaming Services.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

A Partial Approach to Intrusion Detection.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2018
Cloud Investigations of Illegal IPTV Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2005
The Use of Data Mining in the Implementation of a Network Intrusion Detection System.
Proceedings of the WEBIST 2005, 2005

2003
Textual CBR for Incident Report Retrieval.
Proceedings of the Computational Science and Its Applications, 2003


  Loading...