Items where Author is "Seifert, Christian"

Up a level
Group by: Item Type | No Grouping
Number of items: 15.

Article

Navarez, J., Seifert, Christian, Endicott-Popovsky, Barbara, Welch, Ian and Komisarczuk, Peter (2008) Technical report, Victoria University of Wellington. Wellington.

Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Effectiveness of security by admonition: a case study of security warnings in a web browser setting. (In)secure Magazine, 9. pp. 9-16.

Book Section

Seifert, Christian, Delwadia, V., Komisarczuk, Peter, Stirling, D. and Welch, Ian (2009) Measurement study on malicious web servers in the .nz domain. In: Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Lecture Notes in Computer Science, 5594. Springer, Heidelberg, Germany, pp. 8-25. ISBN 9783642026195

Komisarczuk, Peter, Seifert, Christian, Pemberton, D. and Welch, Ian (2007) Grid enabled internet instruments. In: IEEE Global Telecommunications Conference, 2007 (GLOBECOM '07). IEEE, pp. 1906-1911. ISBN 9781424410422

Conference or Workshop Item

Stirling, D., Welch, Ian, Komisarczuk, Peter and Seifert, Christian (2009) Automating malware scanning using workflows. In: 9th IEEE ccGrid Conference, Workflow Systems in e-Science Workshop (WSES), 18-21 May 2009, Shanghai, China.

Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2009) True positive cost curve: a cost-based evaluation method for high-interaction client honeypots. In: Emerging Security Information, Systems and Technologies. SECURWARE'09. Third International Conference on IEEE, 18-23 Jun 2009, Athens, Greece.

Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Identification of malicious web pages with static heuristics. In: 2008 Australasian Telecommunication Networks and Applications Conference (ATNAC 2008), 07-10 Dec 2008, Adelaide, Australia.

Seifert, Christian, Welch, Ian, Komisarczuk, Peter, Aval, Chiraag Uday and Endicott-Popovsky, Barbara (2008) Identification of malicious web pages through analysis of underlying DNS and web server relationships. In: 33rd IEEE Conference on Local Computer Networks (LCN 2008), 14-17 Oct 2008, Montreal, Canada.

Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. In: 2008 ACM Symposium on Applied Computing (SAC '08), 16-20 Mar 2008, Fortaleza, Brazil.

Seifert, Christian, Endicott-Popovsky, Barbara, Frincke, Deborah A., Komisarczuk, Peter, Muschevici, Radu and Welch, Ian (2008) Justifying the need for forensically ready protocols: a case study of identifying malicious web servers using client honeypots. In: Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, 27–30 Jan 2008, Kyoto, Japan.

Seifert, Christian, Steenson, Ramon, Welch, Ian and Komisarczuk, Peter (2007) Capture - a behavioral analysis tool for applications and documents. In: The Digital Forensic Research Conference, 13-15 Aug 2007, Pittsburgh, USA.

Report

Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 2 report. Technical Report. Victoria University of Wellington, Wellington.

Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 1 report. Technical Report. Victoria University of Wellington, Wellington, NZ.

Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) HoneyC - The low-interaction client honeypot. Technical Report. University of Wellington.

Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Taxonomy of honeypots. Technical Report. Victoria University of Wellington.

This list was generated on Sun Dec 22 11:11:01 2024 UTC.

Menu