Search results

  • 2009

    Ontology guided risk analysis: From informal specifications to formal metrics

    Gandhi, R. & Lee, S. W., 2009, Advances in Information and Intelligent Systems. Ras, Z. & Ribarsky, W. (eds.). p. 227-249 23 p. (Studies in Computational Intelligence; vol. 251).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Requirements engineering visualization: A survey on the state-of-the-art

    Cooper, J. R., Lee, S. W., Gandhi, R. A. & Gotel, O., 2009, 2009 4th International Workshop on Requirements Engineering Visualization, REV 2009. p. 46-55 10 p. 5460248. (2009 4th International Workshop on Requirements Engineering Visualization, REV 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • 2008

    IDEA: A new intrusion detection data source

    Mahoney, W. & Sousan, W., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 15-19 5 p. 4511526. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • IDEA: A new intrusion detection data source

    Mahoney, W. & Sousan, W., 2008, In: International Journal of Security and its Applications. 2, 3, p. 17-24 8 p.

    Research output: Contribution to journalArticlepeer-review

  • The impact of vista and federal desktop core configuration on incident response

    Cotton, D., Nugen, S. & Mahoney, W., 2008, p. 87-96. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  • 2007

    Instrumentation of open-source software for intrusion detection

    Mahoney, W. & Sousan, W., 2007, Runtime Verification - 7th International Workshop, RV 2007, Revised Selected Papers. Springer Verlag, p. 151-163 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4839 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Intrusion detection in open source software via dynamic aspects

    Mahoney, W. & Sousan, W., 2007, p. 147-154. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  • Using common off-the-shelf tools to implement dynamic aspects

    Mahoney, W. R. & Sousan, W. L., Feb 2007, In: ACM SIGPLAN Notices. 42, 2, p. 34-41 8 p.

    Research output: Contribution to journalArticlepeer-review

    5 Scopus citations
  • 2006

    Compiler assisted tracking of hacker assaults

    Mahoney, W., 2006, p. 143-151. 9 p.

    Research output: Contribution to conferencePaperpeer-review

    2 Scopus citations
  • 2004

    Adventures in Palindromes

    Mahoney, W. R., Apr 2004, Dr. Dobb's Journal, 29, 4, p. 30-33 4 p.

    Research output: Contribution to specialist publicationArticle

  • 2003

    The "all-pairs closest points" problem

    Mahoney, W. R., Jan 2003, Dr. Dobb's Journal, 28, 1, p. 48-51 4 p.

    Research output: Contribution to specialist publicationArticle