default search action
Richard E. Overill
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c15]Richard E. Overill:
Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations? ARES 2020: 49:1-49:6
2010 – 2019
- 2018
- [j28]Leila Schneps, Richard E. Overill, David A. Lagnado:
Ranking the Impact of Different Tests on a Hypothesis in a Bayesian Network. Entropy 20(11): 856 (2018) - [c14]Richard E. Overill, Kam-Pui Chow:
Measuring Evidential Weight in Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2018: 3-10 - 2016
- [j27]Alan Saied, Richard E. Overill, Tomasz Radzik:
Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 172: 385-393 (2016) - 2015
- [j26]Owen Brady, Richard E. Overill, Jeroen Keppens:
DESO: Addressing volume and variety in large-scale criminal cases. Digit. Investig. 15: 72-82 (2015) - [c13]Noora Al Khater, Richard E. Overill:
Network traffic classification techniques and challenges. ICDIM 2015: 43-48 - 2014
- [j25]Hangbae Chang, Hosin David Lee, Richard E. Overill:
Human-centric security service and its application in smart space. Secur. Commun. Networks 7(10): 1439-1440 (2014) - [c12]Owen Brady, Richard E. Overill, Jeroen Keppens:
Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology. JISIC 2014: 176-183 - [c11]Alan Saied, Richard E. Overill, Tomasz Radzik:
Artificial Neural Networks in the Detection of Known and Unknown DDoS Attacks: Proof-of-Concept. PAAMS (Workshops) 2014: 309-320 - 2013
- [j24]Richard E. Overill, Jantje A. M. Silomon, Keith A. Roscoe:
Triage template pipelines in digital forensic investigations. Digit. Investig. 10(2): 168-174 (2013) - [j23]Richard E. Overill:
The 'inverse CSI effect': further evidence from e-crime data. Int. J. Electron. Secur. Digit. Forensics 5(2): 81-89 (2013) - [c10]Richard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow, Hayson Tse:
Quantification of digital forensic hypotheses using probability theory. SADFE 2013: 1-5 - 2012
- [j22]Richard E. Overill:
Digital quantum forensics: future challenges and prospects. Int. J. Inf. Technol. Commun. Convergence 2(3): 205-211 (2012) - [c9]Richard E. Overill, Jantje A. M. Silomon:
Uncertainty Bounds for Digital Forensic Evidence and Hypotheses. ARES 2012: 590-595 - [c8]Veroniki Stamati-Koromina, Christos Ilioudis, Richard E. Overill, Christos K. Georgiadis, Demosthenes Stamatis:
Insider threats in corporate environments: a case study for data leakage prevention. BCI 2012: 271-274 - 2011
- [c7]Richard E. Overill, Jantje A. M. Silomon:
A Complexity Based Forensic Analysis of the Trojan Horse Defence. ARES 2011: 764-768 - [c6]Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai:
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations. IFIP Int. Conf. Digital Forensics 2011: 231-243 - 2010
- [c5]Richard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow:
A Complexity Based Model for Quantifying Forensic Evidential Probabilities. ARES 2010: 671-676 - [c4]Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Jantje A. M. Silomon, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai:
Evaluation of Evidence in Internet Auction Fraud Investigations. IFIP Int. Conf. Digital Forensics 2010: 121-132
2000 – 2009
- 2009
- [j21]Richard E. Overill:
Development of masters modules in computer forensics and cybercrime for computer science and forensic science students. Int. J. Electron. Secur. Digit. Forensics 2(2): 132-140 (2009) - [c3]Richard E. Overill, Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law:
A Cost-Effective Model for Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2009: 231-240 - 2008
- [j20]Richard E. Overill:
ISMS insider intrusion prevention and detection. Inf. Secur. Tech. Rep. 13(4): 216-219 (2008) - 2007
- [j19]Richard E. Overill:
Computational immunology and anomaly detection. Inf. Secur. Tech. Rep. 12(4): 188-191 (2007) - [j18]Lizzie Coles-Kemp, Richard E. Overill:
On the role of the Facilitator in information security risk assessment. J. Comput. Virol. 3(2): 143-148 (2007) - [c2]Lizzie Coles-Kemp, Richard E. Overill:
Triangulating the Views of Human and Non-Human Stakeholders in Information System Security Risk Assessment. Security and Management 2007: 172-178 - 2005
- [j17]Richard E. Overill:
Review: Advances in Elliptic Curve Cryptography. J. Log. Comput. 15(5): 815 (2005) - 2004
- [j16]Richard E. Overill:
Review: From 0 to 1; an Authoritative History of Modern Computing. J. Log. Comput. 14(2): 323 (2004) - [j15]Richard E. Overill:
Review: Things a Computer Scientist Rarely Talks About. J. Log. Comput. 14(2): 323-324 (2004) - [j14]Richard E. Overill:
Review: A Dictionary of the Internet. J. Log. Comput. 14(2): 324-325 (2004) - [j13]Richard E. Overill:
Review: Views into the Chinese Room: New Essays on Searle and Artificial Intelligence. J. Log. Comput. 14(2): 325-326 (2004) - 2003
- [c1]Jungwon Kim, Arlene Ong, Richard E. Overill:
Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector. IEEE Congress on Evolutionary Computation 2003: 405-412 - 2002
- [j12]Richard E. Overill:
Codes and Ciphers: Julius Caesar, The Enigma, and the Internet. J. Log. Comput. 12(3): 543 (2002) - [j11]Richard E. Overill:
Foundations of Cryptography: Basic Tools. J. Log. Comput. 12(3): 543-544 (2002) - 2001
- [j10]Richard E. Overill:
Book Review: "Selected Papers on Analysis of Algorithms" by Donald E. Knuth. J. Log. Comput. 11(2): 355 (2001) - [j9]Richard E. Overill:
Book Review: "Parallel Processing and Parallel Algorithms: Theory and Computation" by Seyed H. Roosta. J. Log. Comput. 11(2): 355-356 (2001) - [j8]Richard E. Overill:
Book Review: "Time Warps, String Edits, and Macromolecules: the Theory and Practice of Sequence Comparison" by David Sankoff and Joseph Kruskal. J. Log. Comput. 11(2): 356 (2001) - [j7]Richard E. Overill:
Book Review: "Cryptography and Computational Number Theory" by K.-Y. Lam, I. Shparlinski, H. Wang and C. Xing. J. Log. Comput. 11(6): 961 (2001) - [j6]Richard E. Overill:
Book Review: "Artificial Immune Systems and their Applications" by D. Dasgupta. J. Log. Comput. 11(6): 961-962 (2001)
1990 – 1999
- 1997
- [j5]Richard E. Overill, Stephen Wilson:
Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm. Parallel Comput. 23(13): 2115-2127 (1997) - 1996
- [j4]David Moncrieff, Richard E. Overill, Stephen Wilson:
Heterogeneous Computing Machines and Amdahl's Law. Parallel Comput. 22(3): 407-413 (1996) - 1995
- [j3]David Moncrieff, Richard E. Overill, Stephen Wilson:
alphacritical for Parallel Processors. Parallel Comput. 21(3): 467-471 (1995) - 1994
- [j2]Richard E. Overill, Stephen Wilson:
Performance of Parallel Algorithms for the Evaluation of Power Series. Parallel Comput. 20(8): 1205-1213 (1994) - 1993
- [j1]Richard E. Overill:
On the combinatorial complexity of fuzzy pattern matching in music analysis. Comput. Humanit. 27(2): 105-110 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint