Richard E. Overill

Orcid: 0000-0002-5943-1812

According to our database1, Richard E. Overill authored at least 43 papers between 1993 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2018
Ranking the Impact of Different Tests on a Hypothesis in a Bayesian Network.
Entropy, 2018

Measuring Evidential Weight in Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics XIV, 2018

2016
Detection of known and unknown DDoS attacks using Artificial Neural Networks.
Neurocomputing, 2016

2015
DESO: Addressing volume and variety in large-scale criminal cases.
Digit. Investig., 2015

Network traffic classification techniques and challenges.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

2014
Human-centric security service and its application in smart space.
Secur. Commun. Networks, 2014

Artificial Neural Networks in the Detection of Known and Unknown DDoS Attacks: Proof-of-Concept.
Proceedings of the Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection, 2014

Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

2013
The 'inverse CSI effect': further evidence from e-crime data.
Int. J. Electron. Secur. Digit. Forensics, 2013

Triage template pipelines in digital forensic investigations.
Digit. Investig., 2013

Quantification of digital forensic hypotheses using probability theory.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

2012
Digital quantum forensics: future challenges and prospects.
Int. J. Inf. Technol. Commun. Convergence, 2012

Insider threats in corporate environments: a case study for data leakage prevention.
Proceedings of the Balkan Conference in Informatics, 2012, 2012

Uncertainty Bounds for Digital Forensic Evidence and Hypotheses.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

A Complexity Based Forensic Analysis of the Trojan Horse Defence.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Evaluation of Evidence in Internet Auction Fraud Investigations.
Proceedings of the Advances in Digital Forensics VI, 2010

A Complexity Based Model for Quantifying Forensic Evidential Probabilities.
Proceedings of the ARES 2010, 2010

2009
Development of masters modules in computer forensics and cybercrime for computer science and forensic science students.
Int. J. Electron. Secur. Digit. Forensics, 2009

A Cost-Effective Model for Digital Forensic Investigations.
Proceedings of the Advances in Digital Forensics V, 2009

2008
ISMS insider intrusion prevention and detection.
Inf. Secur. Tech. Rep., 2008

2007
On the role of the Facilitator in information security risk assessment.
J. Comput. Virol., 2007

Computational immunology and anomaly detection.
Inf. Secur. Tech. Rep., 2007

Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment.
Proceedings of the 2007 International Conference on Security & Management, 2007

2005
Review: Advances in Elliptic Curve Cryptography.
J. Log. Comput., 2005

2004
Review: Views into the Chinese Room: New Essays on Searle and Artificial Intelligence.
J. Log. Comput., 2004

Review: A Dictionary of the Internet.
J. Log. Comput., 2004

Review: Things a Computer Scientist Rarely Talks About.
J. Log. Comput., 2004

Review: From 0 to 1; an Authoritative History of Modern Computing.
J. Log. Comput., 2004

2003
Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003

2002
Foundations of Cryptography: Basic Tools.
J. Log. Comput., 2002

Codes and Ciphers: Julius Caesar, The Enigma, and the Internet.
J. Log. Comput., 2002

2001
Book Review: "Artificial Immune Systems and their Applications" by D. Dasgupta.
J. Log. Comput., 2001

Book Review: "Cryptography and Computational Number Theory" by K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing.
J. Log. Comput., 2001

Book Review: "Time Warps, String Edits, and Macromolecules: the Theory and Practice of Sequence Comparison" by David Sankoff and Joseph Kruskal.
J. Log. Comput., 2001

Book Review: "Parallel Processing and Parallel Algorithms: Theory and Computation" by Seyed H. Roosta.
J. Log. Comput., 2001

Book Review: "Selected Papers on Analysis of Algorithms" by Donald E. Knuth.
J. Log. Comput., 2001

1997
Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm.
Parallel Comput., 1997

1996
Heterogeneous Computing Machines and Amdahl's Law.
Parallel Comput., 1996

1995
alpha<sub>critical</sub> for Parallel Processors.
Parallel Comput., 1995

1994
Performance of Parallel Algorithms for the Evaluation of Power Series.
Parallel Comput., 1994

1993
On the combinatorial complexity of fuzzy pattern matching in music analysis.
Comput. Humanit., 1993


  Loading...