default search action
Howard Chivers
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j15]Howard Chivers:
Navigating the Windows Mail database. Digit. Investig. 26: 92-99 (2018) - [j14]Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, Claudia Peersman:
Scoping the Cyber Security Body of Knowledge. IEEE Secur. Priv. 16(3): 96-102 (2018) - 2017
- [j13]Howard Chivers:
Optimising unicode regular expression evaluation with previews. Softw. Pract. Exp. 47(5): 669-688 (2017) - 2016
- [j12]Howard Chivers:
Control consistency as a management tool: the identification of systematic security control weaknesses in air traffic management. Int. J. Crit. Comput. Based Syst. 6(3): 229-245 (2016) - 2014
- [j11]Howard Chivers:
Private browsing: A window of forensic opportunity. Digit. Investig. 11(1): 20-29 (2014) - 2013
- [j10]Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh, Hao Chen:
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise. Inf. Syst. Frontiers 15(1): 17-34 (2013) - [c18]Howard Chivers, John Hird:
Security Blind Spots in the ATM Safety Culture. ARES 2013: 774-779 - 2011
- [j9]Howard Chivers, Christopher James Hargreaves:
Forensic data recovery from the Windows Search Database. Digit. Investig. 7(3-4): 114-126 (2011) - [j8]Philip Nobles, Shahid Ali, Howard Chivers:
Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 93-102 (2011) - 2010
- [c17]Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, Philip Nobles:
Optimising IDS Sensor Placement. ARES 2010: 315-320 - [c16]Christopher James Hargreaves, Howard Chivers:
Detecting Hidden Encrypted Volumes. Communications and Multimedia Security 2010: 233-244
2000 – 2009
- 2009
- [j7]Howard Chivers, John A. Clark, Pau-Chen Cheng:
Risk profiles and distributed risk assessment. Comput. Secur. 28(7): 521-535 (2009) - [j6]Howard Chivers, Richard F. Paige:
XRound: A reversible template language and its application in model-based security analysis. Inf. Softw. Technol. 51(5): 876-893 (2009) - [c15]Hao Chen, John A. Clark, Juan E. Tapiador, Siraj A. Shaikh, Howard Chivers, Philip Nobles:
A Multi-objective Optimisation Approach to IDS Sensor Placement. CISIS 2009: 101-108 - [c14]Siraj A. Shaikh, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen:
A Deployment Value Model for Intrusion Detection Sensors. ISA 2009: 250-259 - 2008
- [j5]Christopher James Hargreaves, Howard Chivers, Dave Titheridge:
Windows Vista and digital investigations. Digit. Investig. 5(1-2): 34-48 (2008) - [c13]Christopher James Hargreaves, Howard Chivers:
Recovery of Encryption Keys from Memory Using a Linear Scan. ARES 2008: 1369-1376 - 2007
- [c12]Peter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers:
A Novel Approach to the Detection of Cheating in Multiplayer Online Games. ICECCS 2007: 97-106 - 2006
- [b1]Howard Robert Chivers:
Security design analysis. University of York, UK, 2006 - [j4]Howard Chivers, John A. McDermid:
Refactoring service-based systems: how to avoid trusting a workflow service. Concurr. Comput. Pract. Exp. 18(10): 1255-1275 (2006) - [c11]Howard Chivers:
Information Modeling for Automated Risk Analysis. Communications and Multimedia Security 2006: 228-239 - [c10]Xiaocheng Ge, Richard F. Paige, Fiona Polack, Howard Chivers, Phillip J. Brooke:
Agile development of secure web applications. ICWE 2006: 305-312 - [c9]Howard Chivers:
Trust Without Identification. SPC 2006: 1-2 - [c8]Emine Gokce Aydal, Richard F. Paige, Howard Chivers, Phillip J. Brooke:
Security Planning and Refactoring in Extreme Programming. XP 2006: 154-163 - 2005
- [j3]Howard Chivers, Andrew P. Martin:
Editorial. Softw. Pract. Exp. 35(9): 799-800 (2005) - [j2]Howard Chivers, Martyn Fletcher:
Applying Security Design Analysis to a service-based system. Softw. Pract. Exp. 35(9): 873-897 (2005) - [c7]Howard Chivers, Richard F. Paige:
XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language. ECMDA-FA 2005: 205-219 - [c6]Howard Chivers, Jeremy Jacob:
Specifying Information-Flow Controls. ICDCS Workshops 2005: 114-120 - [c5]Richard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson:
High-integrity extreme programming. SAC 2005: 1518-1523 - [c4]Howard Chivers, Richard F. Paige, Xiaocheng Ge:
Agile Security Using an Incremental Security Architecture. XP 2005: 57-65 - [c3]John A. Clark, Susan Stepney, Howard Chivers:
Breaking the Model: Finalisation and a Taxonomy of Security Attacks. REFINE 2005: 225-242 - 2004
- [j1]Howard Chivers, John A. Clark:
Smart dust, friend or foe?--Replacing identity with configuration trust. Comput. Networks 46(5): 723-740 (2004) - [c2]Howard Chivers:
Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by datamining. Communications and Multimedia Security 2004: 17-29 - 2003
- [c1]Howard Chivers, John A. Clark, Susan Stepney:
Smart Devices and Software Agents: The Basics of Good Behaviour. SPC 2003: 39-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint