Search results

  • 2008

    The impact of vista and federal desktop core configuration on incident response

    Cotton, D., Nugen, S. & Mahoney, W., 2008, p. 87-96. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  • 2007

    Instrumentation of open-source software for intrusion detection

    Mahoney, W. & Sousan, W., 2007, Runtime Verification - 7th International Workshop, RV 2007, Revised Selected Papers. Springer Verlag, p. 151-163 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4839 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Intrusion detection in open source software via dynamic aspects

    Mahoney, W. & Sousan, W., 2007, p. 147-154. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  • Using common off-the-shelf tools to implement dynamic aspects

    Mahoney, W. R. & Sousan, W. L., Feb 2007, In: ACM SIGPLAN Notices. 42, 2, p. 34-41 8 p.

    Research output: Contribution to journalArticlepeer-review

    5 Scopus citations
  • 2006

    Compiler assisted tracking of hacker assaults

    Mahoney, W., 2006, p. 143-151. 9 p.

    Research output: Contribution to conferencePaperpeer-review

    2 Scopus citations
  • 2004

    Adventures in Palindromes

    Mahoney, W. R., Apr 2004, Dr. Dobb's Journal, 29, 4, p. 30-33 4 p.

    Research output: Contribution to specialist publicationArticle

  • 2003

    The "all-pairs closest points" problem

    Mahoney, W. R., Jan 2003, Dr. Dobb's Journal, 28, 1, p. 48-51 4 p.

    Research output: Contribution to specialist publicationArticle