Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 3.

Article

McGough, Andrew Stephen and Arief, Budi and Gamble, Carl and Wall, David and Brennan, John and Fitzgerald, John and van Moorsel, Aad and Alwis, Sujeewa and Theodoropoulos, Georgios and Ruck-Keene, Ed (2015) Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6 (4). pp. 3-46. ISSN 2093-5374. E-ISSN 2093-5382. (Full text available)
[img]
Preview

Conference or workshop item

McGough, Andrew Stephen and Wall, David and Brennan, John and Theodoropoulos, Georgios and Ruck-Keene, Ed and Arief, Budi and Gamble, Carl and Fitzgerald, John and van Moorsel, Aad and Alwis, Sujeewa (2015) Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). In: MIST '15 Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST’15). ACM, New York, NY, USA pp. 1-12. ISBN 978-1-4503-3824-0. (doi:https://doi.org/10.1145/2808783.2808785) (Full text available)
[img]
Preview

Boiten, Eerke Albert and Bowman, Howard and Derrick, John and Steen, Maarten (1997) Viewpoint consistency in Z and LOTOS: A case study. In: Fitzgerald, John and Jones, Cliff B. and Lucas, Peter, eds. Lecture Notes in Computer Science. FME '97: Industrial Applications and Strengthened Foundations of Formal Methods, 4th International Symposium of Formal Methods Europe. Lecture Notes in Computer Science, 1313. Springer-Verlag Berlin pp. 644-664. ISBN 3-540-63533-5. (doi:https://doi.org/10.1007/3-540-63533-5_34) (Full text available)
[img] [img]
Preview

This list was generated on Mon Apr 29 07:20:46 2019 BST.