Date


Output Type

Download Available

85 results

Identity management challenges in cloud computing.

Presentation / Conference
Howie, J. (2010, September)
Identity management challenges in cloud computing. Paper presented at RSA Europe, London

Key note: Information Lifecycle and Data Governance

Presentation / Conference
Howie, J. (2010, August)
Key note: Information Lifecycle and Data Governance. Paper presented at Goverance, Risk and Compliance, Lisbon, Portugal

Automatic sleep stage decision support: the use of fuzzy sets based on amplitude statistics of electrophysiological signals.

Presentation / Conference
Gerst, A., Lawson, A., MacCallum, M., & Dickhaus, H. (2005, January)
Automatic sleep stage decision support: the use of fuzzy sets based on amplitude statistics of electrophysiological signals. Paper presented at Signal Processing Applications in Clinical Neurophysiology, British Institute of Radiology, London, UK

Covert channel analysis and detection using reverse proxy servers.

Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...

A new grouping scheme for path-based multicast communication

Presentation / Conference
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2003, July)
A new grouping scheme for path-based multicast communication