2005 |
7 | EE | Charles Iheagwara,
Andrew Blyth,
Mike Bennett:
Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation.
ICW/ICHSN/ICMCS/SENET 2005: 434-441 |
2004 |
6 | EE | Charles Iheagwara:
The effect of intrusion detection management methods on the return on investment.
Computers & Security 23(3): 213-228 (2004) |
5 | EE | Charles Iheagwara,
Andrew Blyth,
Timm Kevin,
David Kinn:
Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation.
Information & Software Technology 46(10): 651-664 (2004) |
4 | | Charles Iheagwara,
Andrew Blyth,
Mukesh Singhal:
Cost effective management frameworks for intrusion detection systems.
Journal of Computer Security 12(5): 777-798 (2004) |
2003 |
3 | | Charles Iheagwara,
Andrew Blyth,
Mukesh Singhal:
A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment.
Journal of Computer Security 11(1): 1-33 (2003) |
2002 |
2 | EE | Charles Iheagwara,
Andrew Blyth:
Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study.
Computer Networks 39(2): 93-112 (2002) |
1 | EE | Charles Iheagwara,
Andrew Blyth:
The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments.
Computer Networks 39(6): 827-840 (2002) |