5 results

Technical evaluation of an e-health platform.

Conference Proceeding
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012
Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation...

Enhancing intrusion detection via an active target host.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006
Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of netwo...

Towards reusable and reconfigurable models for the WWW

Conference Proceeding
Brown, E., & Buchanan, W. (2002)
Towards reusable and reconfigurable models for the WWW. In Proceedings 26th Annual International Computer Software and Applications. , (814-815). https://doi.org/10.1109/cmpsac.2002.1045106
Reuse and component design have extensively been applied to software engineering, but reuse and formal design methods in WWW-based system is still in its infancy. Most WWW dev...

Affliate advertising fraud and an investigatory fraud framework.

Conference Proceeding
Miehling, M. J., Buchanan, W. J. & Lawson, A. (2010)
Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011
This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through c...

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS).

Conference Proceeding
Buchanan, W. J., Flandrin, F., Macfarlane, R. & Graves, J. (2010)
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011
This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system...