![]() |
| 2003 | ||
|---|---|---|
| 3 | Atif Ahmad, Tobias Ruighaver: Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation. Australian Computer, Network & Information Forensics Conference 2003 | |
| 2 | Tobias Ruighaver, C. C. Terence Tan, Atif Ahmad: Incident Handling: Where the need for planning is often not recognised. Australian Computer, Network & Information Forensics Conference 2003 | |
| 2002 | ||
| 1 | Aftab Ahmad, Tobias Ruighaver: A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration. SEC 2002: 55-66 | |
| 1 | Aftab Ahmad | [1] |
| 2 | Atif Ahmad | [2] [3] |
| 3 | C. C. Terence Tan | [2] |