default search action
John Haggerty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c27]Robert Hegarty, John Haggerty:
Presence Metadata in the Internet of Things: Challenges and Opportunities. ICISSP 2020: 631-638
2010 – 2019
- 2017
- [j17]Albandari Alsumayt, John Haggerty, Ahmad Lotfi:
Using trust to detect denial of service attacks in the internet of things over MANETs. Int. J. Space Based Situated Comput. 7(1): 43-56 (2017) - 2016
- [j16]Mark John Taylor, John Haggerty, David Gresty, Chris Wren, Tom Berry:
Avoiding the misuse of social media by employees. Netw. Secur. 2016(5): 8-11 (2016) - [c26]Albandari Alsumayt, John Haggerty, Ahmad Lotfi:
Detect DoS Attack Using MrDR Method in Merging Two MANETs. AINA Workshops 2016: 889-895 - 2015
- [j15]Robert Hegarty, John Haggerty:
Extrusion detection of illegal files in cloud-based systems. Int. J. Space Based Situated Comput. 5(3): 150-158 (2015) - [j14]Mark John Taylor, John Haggerty, David Gresty, Natalia Criado Pacheco, Tom Berry, Peter Almond:
Investigating employee harassment via social media. J. Syst. Inf. Technol. 17(4): 322-335 (2015) - [c25]Robert Hegarty, John Haggerty:
SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations. EISIC 2015: 24-29 - [c24]Albandari Alsumayt, John Haggerty, Ahmad Lotfi:
Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET. EISIC 2015: 121-124 - [c23]Craig Thurlby, Caroline S. Langensiepen, John Haggerty, Robert Ranson:
Understanding User Knowledge of Computer Security and Risk: A Comparative Study. HAISA 2015: 194-203 - [c22]John Haggerty, Thomas Hughes-Roberts, Robert Hegarty:
Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices. HCI (22) 2015: 506-516 - 2014
- [j13]John Haggerty, Sheryllynne Haggerty, Mark John Taylor:
Forensic triage of email network narratives through visualisation. Inf. Manag. Comput. Secur. 22(4): 358-370 (2014) - [j12]Mark John Taylor, John Haggerty, David Gresty, Peter Almond, Tom Berry:
Forensic investigation of social networking applications. Netw. Secur. 2014(11): 9-16 (2014) - [c21]John Haggerty, Thomas Hughes-Roberts:
Visualization of System Log Files for Post-incident Analysis and Response. HCI (24) 2014: 23-32 - [c20]Albandari Fahad Alsumayt, John Haggerty:
A Taxonomy of Defence Mechanisms to Mitigate DoS Attacks in MANETs. INC 2014: 3-12 - [c19]John Haggerty, Mark John Taylor:
Retrieval and Analysis of Web Search Narratives for Digital Investigations. INC 2014: 153-162 - 2013
- [c18]John Haggerty, Sheryllynne Haggerty, Mark John Taylor:
Visual Triage of Email Network Narratives for Digital Investigations. EISMC 2013: 102-111 - [c17]Matthew Roberts, John Haggerty:
MetaFor: Metadata Signatures for Automated Remote File Identification in Forensic Investigations. EISMC 2013: 123-132 - 2012
- [j11]Mark Taylor, Glyn Hughes, John Haggerty, David Gresty, Peter Almond:
Digital evidence from mobile telephone applications. Comput. Law Secur. Rev. 28(3): 335-339 (2012) - [j10]John Haggerty, Mark C. Casson, Sheryllynne Haggerty, Mark John Taylor:
A Framework for the Forensic Analysis of User Interaction with Social Media. Int. J. Digit. Crime Forensics 4(4): 15-30 (2012) - [c16]John Haggerty, Mark C. Casson, Sheryllynne Haggerty, Mark John Taylor:
Forensic Analysis of User Interaction with Social Media: A Methodology. WDFIA 2012: 66-75 - 2011
- [j9]Mark Taylor, John Haggerty, David Gresty, Tom Berry:
Digital evidence from peer-to-peer networks. Comput. Law Secur. Rev. 27(6): 647-652 (2011) - [j8]John Haggerty, Alexander John Karran, David J. Lamb, Mark John Taylor:
A Framework for the Forensic Investigation of Unstructured Email Relationship Data. Int. J. Digit. Crime Forensics 3(3): 1-18 (2011) - [j7]Mark John Taylor, John Haggerty, David Gresty, David J. Lamb:
Forensic investigation of cloud computing systems. Netw. Secur. 2011(3): 4-10 (2011) - [c15]Paul Fergus, Mark Taylor, Madjid Merabti, John Haggerty, L. Bracegirdle:
Expanding Tele-care: Using Motion Sensors for Monitoring Purposes. DeSE 2011: 19-23 - [c14]John Haggerty, Sheryllynne Haggerty:
Temporal Social Network Analysis for Historians - A Case Study. IMAGAPP/IVAPP 2011: 207-217 - [c13]Alexander John Karran, John Haggerty, David J. Lamb, Mark John Taylor, David Llewellyn-Jones:
A Social Network Discovery Model for Digital Forensics Investigations. WDFIA 2011: 160-170 - [p1]Paul Fergus, John Haggerty, Mark John Taylor, L. Bracegirdle:
Towards a Whole Body Sensing Platform for Healthcare Applications. Whole Body Interaction 2011: 135-149 - 2010
- [j6]Mark Taylor, John Haggerty, David Gresty:
The legal aspects of corporate computer usage policies. Comput. Law Secur. Rev. 26(1): 72-76 (2010) - [j5]Mark Taylor, John Haggerty, David Gresty, Robert Hegarty:
Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3): 304-308 (2010) - [j4]Mark John Taylor, John Haggerty, David Gresty, Paul Fergus:
Forensic investigation of peer-to-peer networks. Netw. Secur. 2010(9): 12-15 (2010) - [c12]Sudath Indrasinghe, Rubem Pereira, John Haggerty:
Efficient Address Management for Mobile Ad Hoc Networks. BWCCA 2010: 1-8
2000 – 2009
- 2009
- [j3]Mark Taylor, John Haggerty, David Gresty:
The legal aspects of corporate e-mail investigations. Comput. Law Secur. Rev. 25(4): 372-376 (2009) - [c11]Sudath Indrasinghe, Rubem Pereira, John Haggerty:
Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks. NBiS 2009: 343-349 - [c10]John Haggerty, David J. Lamb, Mark John Taylor:
Social Network Visualization for Forensic Investigation of E-mail. WDFIA 2009: 81-92 - 2008
- [c9]Sudath Indrasinghe, Rubem Pereira, John Haggerty:
Protocol Specification for Conflict Free MANET Address Allocation Mechanisms. AINA Workshops 2008: 1434-1439 - [c8]John Haggerty, David Llewellyn-Jones, Mark John Taylor:
FORWEB: file fingerprinting for automated network forensics investigations. e-Forensics 2008: 29 - 2007
- [j2]Mark Taylor, John Haggerty, David Gresty:
The legal aspects of corporate computer forensic investigations. Comput. Law Secur. Rev. 23(6): 562-566 (2007) - [c7]Sudath Indrasinghe, Rubem Pereira, John Haggerty:
Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks. AINA Workshops (1) 2007: 852-857 - [c6]John Haggerty, Mark John Taylor:
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. SEC 2007: 1-12 - 2005
- [j1]John Haggerty, Qi Shi, Madjid Merabti:
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE J. Sel. Areas Commun. 23(10): 1994-2002 (2005) - [c5]John Haggerty, Qi Shi, Madjid Merabti:
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. SEC 2005: 327-342 - 2004
- [b1]John Haggerty:
DiDDeM : a system for early detection of denial-of-services attacks. University of York, UK, 2004 - [c4]John Haggerty, Tom Berry, Qi Shi, Madjid Merabti:
DiDDeM: a system for early detection of TCP SYN flood attacks. GLOBECOM 2004: 2037-2042 - 2002
- [c3]John Haggerty, Qi Shi, Madjid Merabti:
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. ACSAC 2002: 413-422 - [c2]John Haggerty, Qi Shi, Madjid Merabti:
The Threat From Within -An Analysis of Attacks on anInternal Network. SEC 2002: 133-146
1980 – 1989
- 1987
- [c1]Jacques J. Vidal, John Haggerty:
Synchronization in Neural Nets. NIPS 1987: 824-829
Coauthor Index
aka: Mark John Taylor
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint