QUT ePrints

Browse By Person: Mohay, George

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Jump to: 2001 | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012
Number of items: 59.

2001

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 2,771
Number of citations in Scopus 148
Number of citations in Web of Science® 67

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the Authors of Suspect Email. .
Number of full-text downloads 1,123

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 275

2002

Carey, Nathan, Clark, Andrew, & Mohay, George (2002) IDS interoperability and correlation using IDMEF and commodity systems. In Fourth International Conference on Information and Communications Security, 9-12 December 2002, Singapore.
Number of full-text downloads 488
Number of citations in Web of Science® 4

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 414
Number of citations in Web of Science® 3

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 551

Clutterbuck, Peter & Mohay, George (2002) Measuring Distributed Software Server Availability and Response Time Via the Socket and TCP layers. In Arabnia, & Mun, (Eds.) Proceedings of the International Conference on Internet Computing IC'02, 24-27 June, 2002, Las Vegas, Nevada, USA.

2003

Chen, Kevin, Clark, Andrew, De Vel, Olivier, & Mohay, George (2003) ECF - Event correlation for forensics. In First Australian Computer Network and Information Forensics Conference, 25 November 2003, Perth, Australia.
Number of full-text downloads 691

Carey, Nathan, Mohay, George M., & Clark, Andrew (2003) Attack Signature Matching and Discovery in Systems Employing Heterogenous IDS. In Friedman, Art (Ed.) Nineteenth Annual Computer Security Applications Conference, 8-12 December, Las Vegas, NV, USA.
Number of full-text downloads 206

Mohay, George M., Anderson, Alison M., Collie, Byron, de Vel, Olivier, & McKemmish, Rodney D. (2003) Computer and Intrusion Forensics. Artech House, Boston, MA, USA.

Clutterbuck, Peter & Mohay, George (2003) Internet Service Cluster Dispatching Via a TCP Redirection Option. In Arabnia, A & Mum, Y (Eds.) International Conference on Internet Computing 2003, 23-26 June, 2003, Las Vegas, Nevada, USA.

2004

Andersson, Stig, Clark, Andrew, & Mohay, George (2004) Network based buffer overflow detection by exploit code analysis. In Mohay, George M., Clark, Andrew J., & Kerr, Kathryn (Eds.) AusCERT Asia Pacific Information Technology Security Conference: R&D Stream, 23-27 May 2004, Gold Coast, Australia.
Number of full-text downloads 472

Schatz, Bradley, Mohay, George M., & Clark, Andrew (2004) Generalising Event Forensics Across Multiple Domains. In Valli, C. (Ed.) 2nd Australian Computer Networks Information and Forensics Conference, 25 November, Perth, Australia.
Number of full-text downloads 579

Best, Peter J., Mohay, George M., & Anderson, Alison M. (2004) Machine-independent audit trail analysis – a decision support tool for continuous audit assurance. Intelligent Systems in Accounting, Finance and Management, 12(2), pp. 85-102.
Number of full-text downloads 280

Clark, Andrew, Mohay, George, & Schatz, Bradley (2004) Rich Event Representation for Computer Forensics. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), 12-15 December 2004, Gold Coast, Queensland.

2005

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2005) Challenges of automating the detection of paedophile activity on the Internet. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November 2005, Taipei, Taiwan.
Number of full-text downloads 2,122
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Zimmermann, Jacob, Clark, Andrew J., Mohay, George M., Pouget, Fabien, & Dacier, Marc (2005) The use of packet inter-arrival times for investigating unsolicited Internet traffic. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November, Taipei, Taiwan.
Number of full-text downloads 102
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Andersson, Stig, Clark, Andrew J., & Mohay, George M. (2005) Detecting network-based obfuscated code injection attacks using sandboxing. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 22-26 May 2005, Gold Coast, Queensland.
Number of full-text downloads 273

Schatz, Bradley, Mohay, George, & Clark, Andrew (2005) Generalising event correlation across multiple domains. Journal of Information Warfare, 4(1), pp. 69-79.

Mohay, George (2005) Technical Challenges and Directions for Digital Forensics. In Huang, M (Ed.) First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005, 7-9 November 2005, Taipei, Taiwan.
Number of citations in Scopus 13

Andersson, Stig, Clark, Andrew J., Mohay, George M., Schatz, Bradley, & Zimmermann, Jacob (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In Proceedings of the 21st Annual Computer Security Applications Conference, 5-9 December 2005, Tucson, Arizona.
Number of full-text downloads 149
Number of citations in Scopus 4

2006

Schatz, Bradley, Mohay, George M., & Clark, Andrew J. (2006) A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation, 3(Supplement 1), S98-S107.
Number of full-text downloads 343
Number of citations in Scopus 15

Duncombe, David, Mohay, George M., & Clark, Andrew J. (2006) Synapse : auto correlation and dynamic attack redirection in an immunologically-inspired IDS. In Buyya, Rajkumar, Ma, Tianchi, Safavi-Naini, Rei, Steketee, Chris, & Susilo, Willy (Eds.) ACSW frontiers 2006 : proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society, Hobart, pp. 135-144.
Number of full-text downloads 122

Abbott, Jonathon, Bell, Jim, Clark, Andrew, De Vel, Olivier, & Mohay, George M. (2006) Automated Recognition of Event Scenarios for Digital Forensics. In Liebrock, N. (Ed.) 2006 ACM Symposium on Applied Computing, 23-27 April, Dijon, France.
Number of citations in Scopus 4

Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew (2006) Computer profiling to assist computer forensic investigations. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, Australian Homeland Security Research Centre, Canberra, Australian Capital Territory, pp. 287-301.

Mohay, George & Zimmermann, Jakub (2006) Distributed Intrusion Detection in Clusters Based on Non-Interference. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.

Clark, Andrew, Mohay, George, Panichprecha, Sorot, & Zimmermann, Jakub (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Clutterbuck, Peter, Mohay, George, & Seamons, Owen (2006) Exploring Transport Layer Solutions for Parallelism and Load Balancing Within Internet Services Clusters. International Transactions on Systems Science and Applications, 2(3), pp. 273-280.

Mohay, George (2006) From Computer Forensics to Digital Forensics. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Clark, Andrew, Dacier, Marc, Mohay, George, Pouget, Fabien, & Zimmermann, Jakub (2006) Internet Attack Knowledge Discovery Via Clusters and Cliques of Attack Traces. Journal of Information Assurance and Security, 1(1), pp. 21-32.

Bruce, Christine S., Mohay, George M., Smith, Glenn P., Stoodley, Ian D., & Tweedale, Robyn (Eds.) (2006) Transforming IT Education: Promoting a Culture of Excellence. Informing Science Press, Santa Rosa, CA. USA.

2007

Marrington, Andrew D., Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2007) Event-based computer profiling for the forensic reconstruction of computer activity. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld.
Number of full-text downloads 1,088

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 346
Number of citations in Scopus 1

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 267

2008

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE Computer Society, Shanghai, China, pp. 147-154.
Number of full-text downloads 353
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Kiani, Mehdi, Clark, Andrew J., & Mohay, George M. (2008) Evaluation of anomaly based character distribution models in the detection of SQL injection attacks. In Third International Conference on Availability, Reliability and Security, 4-7 March, 2008, Barcelona, Spain.
Number of full-text downloads 408
Number of citations in Scopus 8
Number of citations in Web of Science® 2

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 432
Number of citations in Scopus 9
Number of citations in Web of Science® 3

2009

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 349

Marrington, Andrew, Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2009) Dealing with temporal inconsistency in automated computer forensic profiling. [Working Paper] (Unpublished)
Number of full-text downloads 397

Raghavan, Sriram, Clark, Andrew J., & Mohay, George M. (2009) FIA : an open foresic integration architecture for composing digital evidence. In Sorell, Matthew (Ed.) Forensics in Telecommunications, Information and Multimedia, Springer Berlin Heidelberg, Adelaide, South Australia, pp. 83-94.
Number of full-text downloads 779

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 135
Number of citations in Scopus 2

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May 2009, Venice/Mestre, Italy.
Number of full-text downloads 399
Number of citations in Scopus 4

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 291

2010

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 359

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 442

Alkaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Alan N. (2010) Money laundering and FATF compliance by the international community. In Berleur, Jacques, Hercheui, Magda David, & Hilty, Lorenz M (Eds.) IFIP Advances in Information and Communication Technology, Springer Verlag, Brisbane, Australia, pp. 86-97.
Number of full-text downloads 819

Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland. (In Press)
Number of full-text downloads 307
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 514

Marrington, Andrew, Mohay, George M., Morarji, Hasmukh L., & Clark, Andrew J. (2010) A model for computer profiling. In Proceedings of the Third International Workshop on Digital Forensics, Andrzej Frycz Modrzewski Cracow College, Krakow, Poland.
Number of full-text downloads 145

Alkaabi, Ali, Mohay, George M., McCullagh, Adrian J., & Chantler, Alan N. (2010) Dealing with the problem of cybercrime. In Baggili, Ibrahim (Ed.) Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, ICST, Abu Dhabi.
Number of full-text downloads 805

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2010) A framework for improved adolescent and child safety in MMOs. In Memon, Nasrullah & Alhajj, Reda (Eds.) 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), IEEE Computer Society, University of Southern Denmark, Odense, Denmark, pp. 33-40.
Number of full-text downloads 154

2011

Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Number of full-text downloads 192
Number of citations in Scopus 3

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 242

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 489

Marrington, Andrew, Baggili, Ibrahim, Mohay, George M., & Clark, Andrew J. (2011) CAT Detect (Computer Activity Timeline Detection) : a tool for detecting inconsistency in computer activity timelines. Digital Investigation, 8(Sup), S52-S61.

2012

Bhatia, Sajal, Schmidt, Desmond, & Mohay, George M. (2012) Ensemble-based DDoS detection and mitigation model. In 2012 Fifth International Conference On Security of Information and Networks, Jaipur, India, pp. 79-86.
Number of full-text downloads 241
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Bhatia, Sajal, Mohay, George M., Schmidt, Desmond, & Tickle, Alan (2012) Modelling web-server Flash Events. In 2012 IEEE 11th International Symposium on Network Computing and Applications, Conference Publishing Services, Cambridge, MA, USA, pp. 79-86.
Number of full-text downloads 215
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 33

This list was generated on Sat Nov 22 06:36:06 2014 EST.