QUT ePrints

Browse By Person: Mohay, George

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 59.

Book

Bruce, Christine S., Mohay, George M., Smith, Glenn P., Stoodley, Ian D., & Tweedale, Robyn (Eds.) (2006) Transforming IT Education: Promoting a Culture of Excellence. Informing Science Press, Santa Rosa, CA. USA.

Mohay, George M., Anderson, Alison M., Collie, Byron, de Vel, Olivier, & McKemmish, Rodney D. (2003) Computer and Intrusion Forensics. Artech House, Boston, MA, USA.

Book Chapter

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Journal Article

Marrington, Andrew, Baggili, Ibrahim, Mohay, George M., & Clark, Andrew J. (2011) CAT Detect (Computer Activity Timeline Detection) : a tool for detecting inconsistency in computer activity timelines. Digital Investigation, 8(Sup), S52-S61.

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 504

Schatz, Bradley, Mohay, George M., & Clark, Andrew J. (2006) A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation, 3(Supplement 1), S98-S107.
Number of full-text downloads 337
Number of citations in Scopus 15

Clutterbuck, Peter, Mohay, George, & Seamons, Owen (2006) Exploring Transport Layer Solutions for Parallelism and Load Balancing Within Internet Services Clusters. International Transactions on Systems Science and Applications, 2(3), pp. 273-280.

Clark, Andrew, Dacier, Marc, Mohay, George, Pouget, Fabien, & Zimmermann, Jakub (2006) Internet Attack Knowledge Discovery Via Clusters and Cliques of Attack Traces. Journal of Information Assurance and Security, 1(1), pp. 21-32.

Schatz, Bradley, Mohay, George, & Clark, Andrew (2005) Generalising event correlation across multiple domains. Journal of Information Warfare, 4(1), pp. 69-79.

Best, Peter J., Mohay, George M., & Anderson, Alison M. (2004) Machine-independent audit trail analysis – a decision support tool for continuous audit assurance. Intelligent Systems in Accounting, Finance and Management, 12(2), pp. 85-102.
Number of full-text downloads 273

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 2,686
Number of citations in Scopus 148
Number of citations in Web of Science® 67

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the Authors of Suspect Email. .
Number of full-text downloads 1,119

Conference Paper

Bhatia, Sajal, Schmidt, Desmond, & Mohay, George M. (2012) Ensemble-based DDoS detection and mitigation model. In 2012 Fifth International Conference On Security of Information and Networks, Jaipur, India, pp. 79-86.
Number of full-text downloads 234
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Bhatia, Sajal, Mohay, George M., Schmidt, Desmond, & Tickle, Alan (2012) Modelling web-server Flash Events. In 2012 IEEE 11th International Symposium on Network Computing and Applications, Conference Publishing Services, Cambridge, MA, USA, pp. 79-86.
Number of full-text downloads 210
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Number of full-text downloads 187
Number of citations in Scopus 3

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 235

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 459

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 353

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 440

Alkaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Alan N. (2010) Money laundering and FATF compliance by the international community. In Berleur, Jacques, Hercheui, Magda David, & Hilty, Lorenz M (Eds.) IFIP Advances in Information and Communication Technology, Springer Verlag, Brisbane, Australia, pp. 86-97.
Number of full-text downloads 809

Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland. (In Press)
Number of full-text downloads 298
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Marrington, Andrew, Mohay, George M., Morarji, Hasmukh L., & Clark, Andrew J. (2010) A model for computer profiling. In Proceedings of the Third International Workshop on Digital Forensics, Andrzej Frycz Modrzewski Cracow College, Krakow, Poland.
Number of full-text downloads 140

Alkaabi, Ali, Mohay, George M., McCullagh, Adrian J., & Chantler, Alan N. (2010) Dealing with the problem of cybercrime. In Baggili, Ibrahim (Ed.) Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, ICST, Abu Dhabi.
Number of full-text downloads 782

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2010) A framework for improved adolescent and child safety in MMOs. In Memon, Nasrullah & Alhajj, Reda (Eds.) 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), IEEE Computer Society, University of Southern Denmark, Odense, Denmark, pp. 33-40.
Number of full-text downloads 150

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 343

Raghavan, Sriram, Clark, Andrew J., & Mohay, George M. (2009) FIA : an open foresic integration architecture for composing digital evidence. In Sorell, Matthew (Ed.) Forensics in Telecommunications, Information and Multimedia, Springer Berlin Heidelberg, Adelaide, South Australia, pp. 83-94.
Number of full-text downloads 773

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 135
Number of citations in Scopus 2

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May 2009, Venice/Mestre, Italy.
Number of full-text downloads 395
Number of citations in Scopus 4

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 286

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE Computer Society, Shanghai, China, pp. 147-154.
Number of full-text downloads 350
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Kiani, Mehdi, Clark, Andrew J., & Mohay, George M. (2008) Evaluation of anomaly based character distribution models in the detection of SQL injection attacks. In Third International Conference on Availability, Reliability and Security, 4-7 March, 2008, Barcelona, Spain.
Number of full-text downloads 403
Number of citations in Scopus 8
Number of citations in Web of Science® 2

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 428
Number of citations in Scopus 9
Number of citations in Web of Science® 3

Marrington, Andrew D., Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2007) Event-based computer profiling for the forensic reconstruction of computer activity. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld.
Number of full-text downloads 1,077

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 342
Number of citations in Scopus 1

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 260

Duncombe, David, Mohay, George M., & Clark, Andrew J. (2006) Synapse : auto correlation and dynamic attack redirection in an immunologically-inspired IDS. In Buyya, Rajkumar, Ma, Tianchi, Safavi-Naini, Rei, Steketee, Chris, & Susilo, Willy (Eds.) ACSW frontiers 2006 : proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society, Hobart, pp. 135-144.
Number of full-text downloads 122

Abbott, Jonathon, Bell, Jim, Clark, Andrew, De Vel, Olivier, & Mohay, George M. (2006) Automated Recognition of Event Scenarios for Digital Forensics. In Liebrock, N. (Ed.) 2006 ACM Symposium on Applied Computing, 23-27 April, Dijon, France.
Number of citations in Scopus 4

Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew (2006) Computer profiling to assist computer forensic investigations. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, Australian Homeland Security Research Centre, Canberra, Australian Capital Territory, pp. 287-301.

Mohay, George & Zimmermann, Jakub (2006) Distributed Intrusion Detection in Clusters Based on Non-Interference. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.

Clark, Andrew, Mohay, George, Panichprecha, Sorot, & Zimmermann, Jakub (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Mohay, George (2006) From Computer Forensics to Digital Forensics. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2005) Challenges of automating the detection of paedophile activity on the Internet. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November 2005, Taipei, Taiwan.
Number of full-text downloads 2,102
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Zimmermann, Jacob, Clark, Andrew J., Mohay, George M., Pouget, Fabien, & Dacier, Marc (2005) The use of packet inter-arrival times for investigating unsolicited Internet traffic. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November, Taipei, Taiwan.
Number of full-text downloads 102
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Andersson, Stig, Clark, Andrew J., & Mohay, George M. (2005) Detecting network-based obfuscated code injection attacks using sandboxing. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 22-26 May 2005, Gold Coast, Queensland.
Number of full-text downloads 267

Mohay, George (2005) Technical Challenges and Directions for Digital Forensics. In Huang, M (Ed.) First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005, 7-9 November 2005, Taipei, Taiwan.
Number of citations in Scopus 13

Andersson, Stig, Clark, Andrew J., Mohay, George M., Schatz, Bradley, & Zimmermann, Jacob (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In Proceedings of the 21st Annual Computer Security Applications Conference, 5-9 December 2005, Tucson, Arizona.
Number of full-text downloads 144
Number of citations in Scopus 4

Andersson, Stig, Clark, Andrew, & Mohay, George (2004) Network based buffer overflow detection by exploit code analysis. In Mohay, George M., Clark, Andrew J., & Kerr, Kathryn (Eds.) AusCERT Asia Pacific Information Technology Security Conference: R&D Stream, 23-27 May 2004, Gold Coast, Australia.
Number of full-text downloads 468

Schatz, Bradley, Mohay, George M., & Clark, Andrew (2004) Generalising Event Forensics Across Multiple Domains. In Valli, C. (Ed.) 2nd Australian Computer Networks Information and Forensics Conference, 25 November, Perth, Australia.
Number of full-text downloads 556

Clark, Andrew, Mohay, George, & Schatz, Bradley (2004) Rich Event Representation for Computer Forensics. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), 12-15 December 2004, Gold Coast, Queensland.

Chen, Kevin, Clark, Andrew, De Vel, Olivier, & Mohay, George (2003) ECF - Event correlation for forensics. In First Australian Computer Network and Information Forensics Conference, 25 November 2003, Perth, Australia.
Number of full-text downloads 673

Carey, Nathan, Mohay, George M., & Clark, Andrew (2003) Attack Signature Matching and Discovery in Systems Employing Heterogenous IDS. In Friedman, Art (Ed.) Nineteenth Annual Computer Security Applications Conference, 8-12 December, Las Vegas, NV, USA.
Number of full-text downloads 203

Clutterbuck, Peter & Mohay, George (2003) Internet Service Cluster Dispatching Via a TCP Redirection Option. In Arabnia, A & Mum, Y (Eds.) International Conference on Internet Computing 2003, 23-26 June, 2003, Las Vegas, Nevada, USA.

Carey, Nathan, Clark, Andrew, & Mohay, George (2002) IDS interoperability and correlation using IDMEF and commodity systems. In Fourth International Conference on Information and Communications Security, 9-12 December 2002, Singapore.
Number of full-text downloads 476
Number of citations in Web of Science® 4

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 401
Number of citations in Web of Science® 3

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 544

Clutterbuck, Peter & Mohay, George (2002) Measuring Distributed Software Server Availability and Response Time Via the Socket and TCP layers. In Arabnia, & Mun, (Eds.) Proceedings of the International Conference on Internet Computing IC'02, 24-27 June, 2002, Las Vegas, Nevada, USA.

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 274

Working Paper

Marrington, Andrew, Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2009) Dealing with temporal inconsistency in automated computer forensic profiling. [Working Paper] (Unpublished)
Number of full-text downloads 384

Other

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 33

This list was generated on Sat Oct 18 14:36:40 2014 EST.