Items where Kingston Author is "Lenaghan, Andrew"
Group by: Item Type | No Grouping Number of items: 12. ArticleOnwubiko, Cyril and Lenaghan, Andrew (2009) Challenges and complexities of managing information security. International Journal of Electronic Security and Digital Forensics, 2(3), pp. 306-321. ISSN (print) 1751-911X Onwubiko, C. and Lenaghan, A.P. (2006) Response mechanism for defending computer networks. International Journal of Computer Science and Network Security, 6(8A), pp. 36-42. ISSN (print) 1738-7906 Book SectionOnwubiko, C. and Lenaghan, A.P. (2005) Vulnerability assessment: towards an integrated security infrastructure. In: Petratos, Panagiotis and Michalopoulos, Demitrios, (eds.) Computer science and information systems: selected papers from the 1st International Conference on Computer Science and Information Systems on June 16-18, 2005. Athens, Greece : Athens Institute for Education and Research. pp. 157-169. ISBN 9608867231 Hebbes, Luke and Lenaghan, Andrew (2004) A semi-fragile steganographic digital signature for images. In: Lopez, Javier , Qing, Sihan and Okamoto, Eiji, (eds.) Information and Communications Security. Berlin, Germany : Springer. pp. 271-275. (Lecture Notes in Computer Science, (3269)) ISSN (print) 0302-9743 ISBN 9783540235637 Conference or Workshop ItemOnwubiko, C. and Lenaghan, A. (2007) Managing security threats and vulnerabilities for small to medium enterprises. In: IEEE Intelligence and Security Informatics; 23-24 May 2007, New Brunswick, NJ, U.S.A.. ISBN 142441329X Onwubiko, C., Lenaghan, A.P. and Hebbes, L. (2006) An integrated security framework for assisting in the defence of computer networks. In: Joint IST Workshop on Mobile Future and the Symposium on Trends in Communications.; 24 - 27 Jun 2006, Bratislava, Slovakia. ISBN 1424403685 Onwubiko, Cyril, Lenaghan, Andrew P., Hebbes, Luke and Malyan, Ron R. (2005) The representation and use of relation information for the detection of threats by security information management systems. In: 1st European Conference on Computer Network Defence (EC2ND); Dec 2005, Pontypridd, Wales. ISBN 9781846283116 Hebbes, L., Malyan, R. and Lenaghan, A. (2005) Genetic algorithms for turbo codes. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X Lenaghan, A., Onwubiko, C., Hebbes, L. and Malyan, R. (2005) Security spaces for protecting users of wireless public hotspots. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X Onwubiko, C., Lenaghan, A. and Hebbes, L. (2005) An improved worm mitigation model for evaluating the spread of aggressive network worms. In: The International Conference on Computer as a Tool; 21 - 24 Nov 2005, Belgrade, Serbia. (EUROCON) ISBN 142440049X Lenaghan, A., Schiefer, A., Malyan, R. and Colbert, M. (2001) Position aware group information services. In: International Conference on Trends in Communications; 04 Jul - 07 Jul 2001, Bratislava, Slovakia. ISBN 0780364902 ThesisLenaghan, Andrew (2001) The significance of models of vision for the development of artificial handwriting recognition systems. (PhD thesis), Kingston University, . |