2007 |
10 | EE | Scott Knight,
Scott Buffett,
Patrick C. K. Hung:
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services.
Int. J. Inf. Sec. 6(5): 285-286 (2007) |
2006 |
9 | EE | Sylvain Marquis,
Thomas R. Dean,
Scott Knight:
Packet decoding using context sensitive parsing.
CASCON 2006: 263-274 |
8 | EE | Songtao Zhang,
Thomas R. Dean,
Scott Knight:
A lightweight approach to state based security testing.
CASCON 2006: 341-344 |
2005 |
7 | EE | Sylvain Marquis,
Thomas R. Dean,
Scott Knight:
SCL: a language for security testing of network applications.
CASCON 2005: 155-164 |
6 | EE | Jeffrey E. Brand,
Scott Knight:
The Narrative and Ludic Nexus in Computer Games: Diverse Worlds II.
DIGRA Conf. 2005 |
5 | EE | Constantine Daicos,
Scott Knight:
A Passive External Web Surveillance Technique for Private Networks.
MMM-ACNS 2005: 88-103 |
2004 |
4 | EE | Oded Tal,
Scott Knight,
Tom Dean:
Syntax-based Vulnerability Testing of Frame-based Network Protocols.
PST 2004: 155-160 |
2003 |
3 | EE | Jeffrey E. Brand,
Scott Knight,
Jakub Majewski:
The Diverse Worlds of Computer Games: A Content Analysis of Spaces, Populations, Styles and Narratives.
DIGRA Conf. 2003 |
2 | | Constantine Daicos,
Scott Knight:
Concerning Enterprise Network Vulnerability to HTTP Tunneling.
SEC 2003: 13-24 |
1 | | Scott Knight,
Luciano Carosielli:
Detecting Malicious Use with Unlabelled Data Using Clustering and Outlier Analysis.
SEC 2003: 205-216 |