10 results

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Conference Proceeding
Graves, J., Buchanan, W. J., Saliou, L. & Old, L. J. (2006)
Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. ISBN 1905305206
Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers ...

NetHost-sensor: Monitoring a target host's application via system calls

Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006)
NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003
Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert ...

Analysis of an agent-based metric-driven for ad-hoc, on-demand routing.

Journal Article
Buchanan, W. J., Migas, N., Sinclair, G., & McArtney, K. (2006)
Analysis of an agent-based metric-driven for ad-hoc, on-demand routing. Ad hoc networks, 4(2), 146-167. https://doi.org/10.1016/j.adhoc.2004.04.009
Ad-hoc networks could bring many benefits over traditional, fixed networks. Unfortunately, they have many difficulties, including the selection of the optimal route, the avail...

Mastering Delphi programming.

Book
Buchanan, W. J. (2001)
Mastering Delphi programming. Palgrave Publishers
This book provides an introduction to the use of Delphi Version 3/4 in developing programs, full of real-life applications including serial communications, internet programmin...

Mastering Java.

Book
Buchanan, W. J. (1997)
Mastering Java. Macmillan Press
This book provides an introduction to the Java programming language and also covers other related areas such as HTML, JavaScript, CGIscript and VRML. Most of the Java programs...

Mastering Pascal and Delphi programming.

Book
Buchanan, W. J. (1997)
Mastering Pascal and Delphi programming. Macmillan Press
This work provides an introduction to programming with Pascal and extends this to show how Borland Delphi is used to develop Microsoft Windows programs. It provides real life ...

Software development for engineers.

Book
Buchanan, W. J. (1997)
Software development for engineers. Newton, MA, USA: Butterworth-Heinemann
Specialisation in software has become a thing of the past. With the move towards graphical user interface programming, engineers must have a sound knowledge of several program...

C for Electronic Engineering with Applied Software Engineering.

Book
Buchanan, W. J. (1995)
C for Electronic Engineering with Applied Software Engineering. Prentice Hall
The objective of this text is to provide a practical introduction to the C programming language through the usage of electrical/electronic examples. All the examples in the te...