NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...
Critical analysis and error determination of locating-finding techniques in GSM.
Journal Article
Buchanan, W. J., Raja, A. & Munoz, J. (2005)
Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications. 3, 165-182. doi:10.1504/IJMC.2005.005905. ISSN 1470-949X
GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These t...
We know where you are [cellular location tracking]
Journal Article
Raja, K., Buchanan, W., & Munoz, J. (2004)
We know where you are [cellular location tracking]. Communications engineer, 2(3), 34-39. doi:10.1049/ce:20040307