Navarez, J., Seifert, Christian, Endicott-Popovsky, Barbara, Welch, Ian and Komisarczuk, Peter (2008) Technical report, Victoria University of Wellington. Wellington.
Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Effectiveness of security by admonition: a case study of security warnings in a web browser setting. (In)secure Magazine, 9. pp. 9-16.
Seifert, Christian, Delwadia, V., Komisarczuk, Peter, Stirling, D. and Welch, Ian (2009) Measurement study on malicious web servers in the .nz domain. In: Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Lecture Notes in Computer Science, 5594. Springer, Heidelberg, Germany, pp. 8-25. ISBN 9783642026195
Komisarczuk, Peter, Seifert, Christian, Pemberton, D. and Welch, Ian (2007) Grid enabled internet instruments. In: IEEE Global Telecommunications Conference, 2007 (GLOBECOM '07). IEEE, pp. 1906-1911. ISBN 9781424410422
Stirling, D., Welch, Ian, Komisarczuk, Peter and Seifert, Christian (2009) Automating malware scanning using workflows. In: 9th IEEE ccGrid Conference, Workflow Systems in e-Science Workshop (WSES), 18-21 May 2009, Shanghai, China.
Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2009) True positive cost curve: a cost-based evaluation method for high-interaction client honeypots. In: Emerging Security Information, Systems and Technologies. SECURWARE'09. Third International Conference on IEEE, 18-23 Jun 2009, Athens, Greece.
Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Identification of malicious web pages with static heuristics. In: 2008 Australasian Telecommunication Networks and Applications Conference (ATNAC 2008), 07-10 Dec 2008, Adelaide, Australia.
Seifert, Christian, Welch, Ian, Komisarczuk, Peter, Aval, Chiraag Uday and Endicott-Popovsky, Barbara (2008) Identification of malicious web pages through analysis of underlying DNS and web server relationships. In: 33rd IEEE Conference on Local Computer Networks (LCN 2008), 14-17 Oct 2008, Montreal, Canada.
Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. In: 2008 ACM Symposium on Applied Computing (SAC '08), 16-20 Mar 2008, Fortaleza, Brazil.
Seifert, Christian, Endicott-Popovsky, Barbara, Frincke, Deborah A., Komisarczuk, Peter, Muschevici, Radu and Welch, Ian (2008) Justifying the need for forensically ready protocols: a case study of identifying malicious web servers using client honeypots. In: Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, 27–30 Jan 2008, Kyoto, Japan.
Seifert, Christian, Steenson, Ramon, Welch, Ian and Komisarczuk, Peter (2007) Capture - a behavioral analysis tool for applications and documents. In: The Digital Forensic Research Conference, 13-15 Aug 2007, Pittsburgh, USA.
Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 2 report. Technical Report. Victoria University of Wellington, Wellington.
Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 1 report. Technical Report. Victoria University of Wellington, Wellington, NZ.
Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) HoneyC - The low-interaction client honeypot. Technical Report. University of Wellington.
Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Taxonomy of honeypots. Technical Report. Victoria University of Wellington.