2006 |
21 | EE | Peter Stephenson:
Trends.
J. Digital Forensic Practice 1(1): 1-2 (2006) |
2004 |
20 | EE | Christian Henning,
Peter Stephenson:
Accelerating the ray tracing of height fields.
GRAPHITE 2004: 254-258 |
19 | EE | Peter Stephenson,
Keiko Satoh,
Audrey Klos,
Diane Kinloch,
Emily Taylor,
Cindy Chambers:
Inner Earth: Towards Interaction Patterns.
TIDSE 2004: 158-163 |
18 | EE | Peter Stephenson:
The right tools for the job.
Digital Investigation 1(1): 24-27 (2004) |
17 | EE | Peter Stephenson:
Application Of Formal Methods To Root Cause Analysis of Digital Incidents.
IJDE 3(1): (2004) |
16 | EE | Peter Stephenson:
Forensic Analysis of Risks in Enterprise Systems.
Information Systems Security 13(4): 11-21 (2004) |
2003 |
15 | EE | Peter Stephenson:
Modeling of Post-Incident Root Cause Analysis.
IJDE 2(2): (2003) |
14 | EE | Peter Stephenson:
Structured Investigation of Digital Incidents in Complex Computing Environments.
Information Systems Security 12(3): 29-38 (2003) |
13 | EE | Peter Stephenson:
A Structured Approach to Incident Postmortems.
Information Systems Security 12(4): 50-56 (2003) |
2001 |
12 | EE | Peter Stephenson,
Bruce E. Litow:
Making the DDA Run: Two-Dimensional Ray Traversal Using Runs and Runs of Runs.
ACSC 2001: 177-183 |
11 | EE | Peter Stephenson,
Bruce E. Litow:
Running the line: Line drawing using runs and runs of runs.
Computers & Graphics 25(4): 681-690 (2001) |
10 | EE | Peter Stephenson:
France and the Art of Intrusion Detection.
Information Systems Security 9(6): 1-4 (2001) |
2000 |
9 | EE | Peter Stephenson,
Bruce E. Litow:
Why Step When You Can Run? Iterative Line Digitization Algorithms Based On Hierarchies Of Runs.
IEEE Computer Graphics and Applications 20(6): 76-84 (2000) |
8 | EE | Peter Stephenson:
Where Is the IDS?
Information Systems Security 8(4): 1-6 (2000) |
7 | EE | Peter Stephenson:
Assessing Vulnerabilities.
Information Systems Security 9(1): 1-5 (2000) |
6 | EE | Peter Stephenson:
Standards or Best Practices - Conflicting Interests.
Information Systems Security 9(3): 1-6 (2000) |
5 | EE | Peter Stephenson:
Flying by the Seat of Our Pants.
Information Systems Security 9(4): 1-5 (2000) |
4 | EE | Peter Stephenson:
It's a Strange, Strange, Strange, Strange World.
Information Systems Security 9(5): 1-6 (2000) |
1999 |
3 | EE | Peter Stephenson:
Information Warfare, or, Help! The Sky Is Falling!
Information Systems Security 8(1): 6-10 (1999) |
2 | EE | Peter Stephenson:
Hiring Hackers.
Information Systems Security 8(2): 10-13 (1999) |
1 | EE | Peter Stephenson:
Coming of Age.
Information Systems Security 8(3): 5-9 (1999) |