References
Application of the JDL Data Fusion Process Model for Cyber Security In Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications. Vol. 7710. SPIE, 2010.
Multi-sensor Data Fusion for Cyber Security Situation Awareness." Procedia Environmental Sciences 10, no. Part B (2011): 1029-1034. "
A Survey of Data Provenance in e-Science." ACM SIGMOD 34, no. 3 (2005): 31-36. "
Computer Network Defence Situational Awareness: Information Requirements." In Military Communications Conference., 2006. "
Cyber Defence Situational Awareness and Dynamic Risk Assessment." In Presentation at the NATO Research and Technology Organisation Symposium on Information Assurance and Cyber Defence, IST-091. Tallin, Estonia, 2010. "
SQL Databases v. NoSQL Databases." Communications of the ACM 53, no. 4 (2010): 10-11. "
Elastic., 2016.
Visualisation et Analyse de Risque Dynamique pour la Cyber- Défense." In Symposium sur la Sécurité des Technologies de l’Information et de la Communication (SSTIC). Rennes, 2010. "
Bring Your Own Device, Securely In 28th Annual ACM Symposium on Applied Computing, SAC’13. Coimbra, Portugal, 2013.
Enabling BYOD Through Secure Meta-market In 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec’14. Oxford, United Kingdom, 2014.
Developing a NATO BYOD Security Policy In International Conference on Military Communications and Information System, ICMCIS. Brussels, Belgium, 2016.
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones." In Technology and Practice of Passwords, Lecture Notes in Computer Science, 45-61. Vol. 9551. Cham: Springer, 2015. "
Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics." In New Trends in Image Analysis and Processing − ICIAP 2015 Workshops. Cham: Springer, 2015. "
Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication In Proceedings of the Mobile Security Technologies Workshop (MOST), in conjunction with 37th IEEE Symposium on Security and Privacy. San Jose, CA, 2016.
The Helmholtz Principle." In From Gestalt Theory to Image Analysis, Interdisciplinary Applied Mathematics, 31-45. Vol. 34 . Springer, 2008. "
On the Helmholtz Principle for Data Mining In Technical report. HP Laboratories, 2010.
Rapid Change Detection and Text Mining In Proceedings of the 2nd IMA Conference on Mathematics in Defence. Swindon, UK: Defence Academy of the United Kingdom, 2011.
Assisted Content-based Labelling and Classification of Documents In Proceedings of the International Conference on Military Communications and Information System (ICMCIS)., 2016.
NATO, Cyber defence., 2016.
NATO Headquarters., 2016.
NATO, COI Cooperation Portal., 2016.
Information Assurance/Cyber Defence Research Framework In Technical Report. Paris: NATO Science and Technology Organization, 2014.