Identity management challenges in cloud computing.
Presentation / Conference
Howie, J. (2010, September)
Identity management challenges in cloud computing. Paper presented at RSA Europe, London
Key note: Information Lifecycle and Data Governance
Presentation / Conference
Howie, J. (2010, August)
Key note: Information Lifecycle and Data Governance. Paper presented at Goverance, Risk and Compliance, Lisbon, Portugal
Automatic sleep stage decision support: the use of fuzzy sets based on amplitude statistics of electrophysiological signals.
Presentation / Conference
Gerst, A., Lawson, A., MacCallum, M., & Dickhaus, H. (2005, January)
Automatic sleep stage decision support: the use of fuzzy sets based on amplitude statistics of electrophysiological signals. Paper presented at Signal Processing Applications in Clinical Neurophysiology, British Institute of Radiology, London, UK
Covert channel analysis and detection using reverse proxy servers.
Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...
A new grouping scheme for path-based multicast communication
Presentation / Conference
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2003, July)
A new grouping scheme for path-based multicast communication