dblp.uni-trier.dewww.uni-trier.de

Peter Stephenson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
21EEPeter Stephenson: Trends. J. Digital Forensic Practice 1(1): 1-2 (2006)
2004
20EEChristian Henning, Peter Stephenson: Accelerating the ray tracing of height fields. GRAPHITE 2004: 254-258
19EEPeter Stephenson, Keiko Satoh, Audrey Klos, Diane Kinloch, Emily Taylor, Cindy Chambers: Inner Earth: Towards Interaction Patterns. TIDSE 2004: 158-163
18EEPeter Stephenson: The right tools for the job. Digital Investigation 1(1): 24-27 (2004)
17EEPeter Stephenson: Application Of Formal Methods To Root Cause Analysis of Digital Incidents. IJDE 3(1): (2004)
16EEPeter Stephenson: Forensic Analysis of Risks in Enterprise Systems. Information Systems Security 13(4): 11-21 (2004)
2003
15EEPeter Stephenson: Modeling of Post-Incident Root Cause Analysis. IJDE 2(2): (2003)
14EEPeter Stephenson: Structured Investigation of Digital Incidents in Complex Computing Environments. Information Systems Security 12(3): 29-38 (2003)
13EEPeter Stephenson: A Structured Approach to Incident Postmortems. Information Systems Security 12(4): 50-56 (2003)
2001
12EEPeter Stephenson, Bruce E. Litow: Making the DDA Run: Two-Dimensional Ray Traversal Using Runs and Runs of Runs. ACSC 2001: 177-183
11EEPeter Stephenson, Bruce E. Litow: Running the line: Line drawing using runs and runs of runs. Computers & Graphics 25(4): 681-690 (2001)
10EEPeter Stephenson: France and the Art of Intrusion Detection. Information Systems Security 9(6): 1-4 (2001)
2000
9EEPeter Stephenson, Bruce E. Litow: Why Step When You Can Run? Iterative Line Digitization Algorithms Based On Hierarchies Of Runs. IEEE Computer Graphics and Applications 20(6): 76-84 (2000)
8EEPeter Stephenson: Where Is the IDS? Information Systems Security 8(4): 1-6 (2000)
7EEPeter Stephenson: Assessing Vulnerabilities. Information Systems Security 9(1): 1-5 (2000)
6EEPeter Stephenson: Standards or Best Practices - Conflicting Interests. Information Systems Security 9(3): 1-6 (2000)
5EEPeter Stephenson: Flying by the Seat of Our Pants. Information Systems Security 9(4): 1-5 (2000)
4EEPeter Stephenson: It's a Strange, Strange, Strange, Strange World. Information Systems Security 9(5): 1-6 (2000)
1999
3EEPeter Stephenson: Information Warfare, or, Help! The Sky Is Falling! Information Systems Security 8(1): 6-10 (1999)
2EEPeter Stephenson: Hiring Hackers. Information Systems Security 8(2): 10-13 (1999)
1EEPeter Stephenson: Coming of Age. Information Systems Security 8(3): 5-9 (1999)

Coauthor Index

1Cindy Chambers [19]
2Christian Henning [20]
3Diane Kinloch [19]
4Audrey Klos [19]
5Bruce E. Litow [9] [11] [12]
6Keiko Satoh [19]
7Emily Taylor [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)