Browse By Person: Mohay, George

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 62.

Book

Bruce, Christine S., Mohay, George M., Smith, Glenn P., Stoodley, Ian D., & Tweedale, Robyn (Eds.) (2006) Transforming IT Education: Promoting a Culture of Excellence. Informing Science Press, Santa Rosa, CA. USA.

Mohay, George M., Anderson, Alison M., Collie, Byron, de Vel, Olivier, & McKemmish, Rodney D. (2003) Computer and Intrusion Forensics. Artech House, Boston, MA, USA.

Book Chapter

Tickle, Alan, Ahmed, Ejaz, Bhaskar, Surinder, Mohay, George, Panichprecha, Sorot, Raghavan, S., et al. (2011) Background. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 9-40.

Mohay, George, Ahmed, Ejaz, Bhatia, Sajal, Nadarajan, Anitha, Ravindran, B., Tickle, Alan, et al. (2011) Detection and mitigation of high-rate flooding attacks. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 131-181.

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Journal Article

Bhatia, Sajal, Schmidt, Desmond, Mohay, George, & Tickle, Alan (2014) A framework for generating realistic traffic for distributed denial-of-service attacks and flash events. Computers and Security, 40, pp. 95-107.
Number of citations in Scopus 12
Number of citations in Web of Science® 3

Marrington, Andrew , Baggili, Ibrahim , Mohay, George M., & Clark, Andrew J. (2011) CAT Detect (Computer Activity Timeline Detection) : a tool for detecting inconsistency in computer activity timelines. Digital Investigation, 8(Sup), S52-S61.
Number of citations in Web of Science® 3

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 589

Schatz, Bradley, Mohay, George M., & Clark, Andrew J. (2006) A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation, 3(Supplement 1), S98-S107.
Number of full-text downloads 394
Number of citations in Scopus 18

Clutterbuck, Peter, Mohay, George, & Seamons, Owen (2006) Exploring Transport Layer Solutions for Parallelism and Load Balancing Within Internet Services Clusters. International Transactions on Systems Science and Applications, 2(3), pp. 273-280.

Clark, Andrew, Dacier, Marc, Mohay, George, Pouget, Fabien, & Zimmermann, Jacob (2006) Internet Attack Knowledge Discovery Via Clusters and Cliques of Attack Traces. Journal of Information Assurance and Security, 1(1), pp. 21-32.

Schatz, Bradley, Mohay, George, & Clark, Andrew (2005) Generalising event correlation across multiple domains. Journal of Information Warfare, 4(1), pp. 69-79.

Best, Peter J., Mohay, George M., & Anderson, Alison M. (2004) Machine-independent audit trail analysis – a decision support tool for continuous audit assurance. Intelligent Systems in Accounting, Finance and Management, 12(2), pp. 85-102.
Number of full-text downloads 350

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 4,064
Number of citations in Scopus 200
Number of citations in Web of Science® 99

Conference Paper

Bhatia, Sajal, Schmidt, Desmond, & Mohay, George M. (2012) Ensemble-based DDoS detection and mitigation model. In 2012 Fifth International Conference On Security of Information and Networks, Jaipur, India, pp. 79-86.
Number of full-text downloads 358
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Bhatia, Sajal, Mohay, George M., Schmidt, Desmond, & Tickle, Alan (2012) Modelling web-server Flash Events. In 2012 IEEE 11th International Symposium on Network Computing and Applications, Conference Publishing Services, Cambridge, MA, USA, pp. 79-86.
Number of full-text downloads 318
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Number of full-text downloads 259
Number of citations in Scopus 9

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 318

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 704

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 427
Number of citations in Scopus 1

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 515
Number of citations in Web of Science® 3

Alkaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Alan N. (2010) Money laundering and FATF compliance by the international community. In Berleur, Jacques, Hercheui, Magda David, & Hilty, Lorenz M (Eds.) IFIP Advances in Information and Communication Technology, Springer Verlag, Brisbane, Australia, pp. 86-97.
Number of full-text downloads 966

Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland.
Number of full-text downloads 410
Number of citations in Scopus 2
Number of citations in Web of Science® 4

Marrington, Andrew, Mohay, George M., Morarji, Hasmukh L., & Clark, Andrew J. (2010) A model for computer profiling. In Proceedings of the Third International Workshop on Digital Forensics, Andrzej Frycz Modrzewski Cracow College, Krakow, Poland.
Number of full-text downloads 175
Number of citations in Web of Science® 1

Alkaabi, Ali, Mohay, George M., McCullagh, Adrian J., & Chantler, Alan N. (2010) Dealing with the problem of cybercrime. In Baggili, Ibrahim (Ed.) Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, ICST, Abu Dhabi.
Number of full-text downloads 1,144

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2010) A framework for improved adolescent and child safety in MMOs. In Memon, Nasrullah & Alhajj, Reda (Eds.) 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), IEEE Computer Society, University of Southern Denmark, Odense, Denmark, pp. 33-40.
Number of full-text downloads 182
Number of citations in Scopus 1

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 410

Raghavan, Sriram, Clark, Andrew J., & Mohay, George M. (2009) FIA : an open foresic integration architecture for composing digital evidence. In Sorell, Matthew (Ed.) Forensics in Telecommunications, Information and Multimedia, Springer Berlin Heidelberg, Adelaide, South Australia, pp. 83-94.
Number of full-text downloads 1,152

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 159
Number of citations in Scopus 6

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May 2009, Venice/Mestre, Italy.
Number of full-text downloads 473
Number of citations in Scopus 7

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 358

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE Computer Society, Shanghai, China, pp. 147-154.
Number of full-text downloads 395
Number of citations in Scopus 6
Number of citations in Web of Science® 4

Kiani, Mehdi, Clark, Andrew J., & Mohay, George M. (2008) Evaluation of anomaly based character distribution models in the detection of SQL injection attacks. In Third International Conference on Availability, Reliability and Security, 4-7 March, 2008, Barcelona, Spain.
Number of full-text downloads 793
Number of citations in Scopus 9
Number of citations in Web of Science® 4

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 518
Number of citations in Scopus 11
Number of citations in Web of Science® 4

Marrington, Andrew D., Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2007) Event-based computer profiling for the forensic reconstruction of computer activity. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld.
Number of full-text downloads 1,187

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 400
Number of citations in Scopus 4

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 325

Duncombe, David, Mohay, George M., & Clark, Andrew J. (2006) Synapse : auto correlation and dynamic attack redirection in an immunologically-inspired IDS. In Buyya, Rajkumar, Ma, Tianchi, Safavi-Naini, Rei, Steketee, Chris, & Susilo, Willy (Eds.) ACSW frontiers 2006 : proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society, Hobart, pp. 135-144.
Number of full-text downloads 155

Abbott, Jonathon, Bell, Jim, Clark, Andrew, de Vel, Olivier, & Mohay, George M. (2006) Automated Recognition of Event Scenarios for Digital Forensics. In Liebrock, N. (Ed.) 2006 ACM Symposium on Applied Computing, 23-27 April, Dijon, France.
Number of citations in Scopus 7

Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew (2006) Computer profiling to assist computer forensic investigations. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, Australian Homeland Security Research Centre, Canberra, Australian Capital Territory, pp. 287-301.

Mohay, George & Zimmermann, Jakub (2006) Distributed Intrusion Detection in Clusters Based on Non-Interference. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.

Clark, Andrew, Mohay, George, Panichprecha, Sorot, & Zimmermann, Jacob (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Mohay, George (2006) From Computer Forensics to Digital Forensics. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2005) Challenges of automating the detection of paedophile activity on the Internet. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November 2005, Taipei, Taiwan.
Number of full-text downloads 2,290
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Zimmermann, Jacob, Clark, Andrew J., Mohay, George M., Pouget, Fabien, & Dacier, Marc (2005) The use of packet inter-arrival times for investigating unsolicited Internet traffic. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November, Taipei, Taiwan.
Number of full-text downloads 120
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Andersson, Stig, Clark, Andrew J., & Mohay, George M. (2005) Detecting network-based obfuscated code injection attacks using sandboxing. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 22-26 May 2005, Gold Coast, Queensland.
Number of full-text downloads 387

Mohay, George (2005) Technical Challenges and Directions for Digital Forensics. In Huang, M (Ed.) First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005, 7-9 November 2005, Taipei, Taiwan.
Number of citations in Scopus 18

Andersson, Stig, Clark, Andrew J., Mohay, George M., Schatz, Bradley, & Zimmermann, Jacob (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In Proceedings of the 21st Annual Computer Security Applications Conference, 5-9 December 2005, Tucson, Arizona.
Number of full-text downloads 181
Number of citations in Scopus 4

Andersson, Stig, Clark, Andrew, & Mohay, George (2004) Network based buffer overflow detection by exploit code analysis. In Mohay, George M., Clark, Andrew J., & Kerr, Kathryn (Eds.) AusCERT Asia Pacific Information Technology Security Conference: R&D Stream, 23-27 May 2004, Gold Coast, Australia.
Number of full-text downloads 652

Schatz, Bradley, Mohay, George M., & Clark, Andrew (2004) Generalising Event Forensics Across Multiple Domains. In Valli, C. (Ed.) 2nd Australian Computer Networks Information and Forensics Conference, 25 November, Perth, Australia.
Number of full-text downloads 687

Clark, Andrew, Mohay, George, & Schatz, Bradley (2004) Rich Event Representation for Computer Forensics. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), 12-15 December 2004, Gold Coast, Queensland.

Chen, Kevin, Clark, Andrew, De Vel, Olivier, & Mohay, George (2003) ECF - Event correlation for forensics. In First Australian Computer Network and Information Forensics Conference, 25 November 2003, Perth, Australia.
Number of full-text downloads 898

Carey, Nathan, Mohay, George M., & Clark, Andrew (2003) Attack Signature Matching and Discovery in Systems Employing Heterogenous IDS. In Friedman, Art (Ed.) Nineteenth Annual Computer Security Applications Conference, 8-12 December, Las Vegas, NV, USA.
Number of full-text downloads 367
Number of citations in Scopus 2

Clutterbuck, Peter & Mohay, George (2003) Internet Service Cluster Dispatching Via a TCP Redirection Option. In Arabnia, A & Mum, Y (Eds.) International Conference on Internet Computing 2003, 23-26 June, 2003, Las Vegas, Nevada, USA.

Carey, Nathan, Clark, Andrew, & Mohay, George (2002) IDS interoperability and correlation using IDMEF and commodity systems. In Fourth International Conference on Information and Communications Security, 9-12 December 2002, Singapore.
Number of full-text downloads 637
Number of citations in Scopus 2
Number of citations in Web of Science® 5

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 541
Number of citations in Scopus 28
Number of citations in Web of Science® 3

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 642

Clutterbuck, Peter & Mohay, George (2002) Measuring Distributed Software Server Availability and Response Time Via the Socket and TCP layers. In Arabnia & Mun (Eds.) Proceedings of the International Conference on Internet Computing IC'02, 24-27 June, 2002, Las Vegas, Nevada, USA.

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 353

Working Paper

Marrington, Andrew, Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2009) Dealing with temporal inconsistency in automated computer forensic profiling. [Working Paper] (Unpublished)
Number of full-text downloads 684

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the authors of suspect email. [Working Paper] (Unpublished)
Number of full-text downloads 1,239

Other

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 51

This list was generated on Sat Aug 20 14:13:23 2016 AEST.