Items where Author is "Seifert, Christian"

Group by: Item Type | No Grouping
Number of items: 15.

Stirling, D., Welch, Ian, Komisarczuk, Peter and Seifert, Christian (2009) Automating malware scanning using workflows. In: 9th IEEE ccGrid Conference, Workflow Systems in e-Science Workshop (WSES), 18-21 May 2009, Shanghai, China.

Seifert, Christian, Delwadia, V., Komisarczuk, Peter, Stirling, D. and Welch, Ian (2009) Measurement study on malicious web servers in the .nz domain. In: Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Lecture Notes in Computer Science, 5594. Springer, Heidelberg, Germany, pp. 8-25. ISBN 9783642026195

Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2009) True positive cost curve: a cost-based evaluation method for high-interaction client honeypots. In: Emerging Security Information, Systems and Technologies. SECURWARE'09. Third International Conference on IEEE, 18-23 Jun 2009, Athens, Greece.

Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Identification of malicious web pages with static heuristics. In: 2008 Australasian Telecommunication Networks and Applications Conference (ATNAC 2008), 07-10 Dec 2008, Adelaide, Australia.

Seifert, Christian, Welch, Ian, Komisarczuk, Peter, Aval, Chiraag Uday and Endicott-Popovsky, Barbara (2008) Identification of malicious web pages through analysis of underlying DNS and web server relationships. In: 33rd IEEE Conference on Local Computer Networks (LCN 2008), 14-17 Oct 2008, Montreal, Canada.

Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 2 report. Technical Report. Victoria University of Wellington, Wellington.

Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. In: 2008 ACM Symposium on Applied Computing (SAC '08), 16-20 Mar 2008, Fortaleza, Brazil.

Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 1 report. Technical Report. Victoria University of Wellington, Wellington, NZ.

Seifert, Christian, Endicott-Popovsky, Barbara, Frincke, Deborah A., Komisarczuk, Peter, Muschevici, Radu and Welch, Ian (2008) Justifying the need for forensically ready protocols: a case study of identifying malicious web servers using client honeypots. In: Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, 27–30 Jan 2008, Kyoto, Japan.

Navarez, J., Seifert, Christian, Endicott-Popovsky, Barbara, Welch, Ian and Komisarczuk, Peter (2008) Technical report, Victoria University of Wellington. Wellington.

Komisarczuk, Peter, Seifert, Christian, Pemberton, D. and Welch, Ian (2007) Grid enabled internet instruments. In: IEEE Global Telecommunications Conference, 2007 (GLOBECOM '07). IEEE, pp. 1906-1911. ISBN 9781424410422

Seifert, Christian, Steenson, Ramon, Welch, Ian and Komisarczuk, Peter (2007) Capture - a behavioral analysis tool for applications and documents. In: The Digital Forensic Research Conference, 13-15 Aug 2007, Pittsburgh, USA.

Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Effectiveness of security by admonition: a case study of security warnings in a web browser setting. (In)secure Magazine, 9. pp. 9-16.

Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) HoneyC - The low-interaction client honeypot. Technical Report. University of Wellington.

Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Taxonomy of honeypots. Technical Report. Victoria University of Wellington.

This list was generated on Wed May 1 13:02:34 2024 UTC.

Menu