default search action
Robert Hegarty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j4]Robert Hegarty, Mark Taylor:
Digital evidence in fog computing systems. Comput. Law Secur. Rev. 41: 105576 (2021) - 2020
- [c8]Robert Hegarty, John Haggerty:
Presence Metadata in the Internet of Things: Challenges and Opportunities. ICISSP 2020: 631-638
2010 – 2019
- 2018
- [j3]Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil, Liangxiu Han, Robert Hegarty, Khaled M. Rabie, Francisco J. Aparicio-Navarro:
Detection of advanced persistent threat using machine-learning correlation analysis. Future Gener. Comput. Syst. 89: 349-359 (2018) - 2017
- [c7]Steve Moffat, Mohammad Hammoudeh, Robert Hegarty:
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT. ICFNDS 2017: 34 - [c6]J. K. Mohsin, Liangxiu Han, Mohammad Hammoudeh, Robert Hegarty:
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments. ICFNDS 2017: 39:1-39:10 - 2015
- [j2]Robert Hegarty, John Haggerty:
Extrusion detection of illegal files in cloud-based systems. Int. J. Space Based Situated Comput. 5(3): 150-158 (2015) - [c5]Robert Hegarty, John Haggerty:
SlackStick: Signature-Based File Identification for Live Digital Forensics Examinations. EISIC 2015: 24-29 - [c4]John Haggerty, Thomas Hughes-Roberts, Robert Hegarty:
Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices. HCI (22) 2015: 506-516 - 2014
- [c3]Robert Hegarty, David J. Lamb, Andrew Attwood:
Digital Evidence Challenges in the Internet of Things. INC 2014: 163-172 - 2012
- [c2]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
Scalable Distributed Signature Detection. WDFIA 2012: 27-37 - 2011
- [c1]Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
A Signature Detection Scheme for Distributed Storage. WDFIA 2011: 122-132 - 2010
- [j1]Mark Taylor, John Haggerty, David Gresty, Robert Hegarty:
Digital evidence in cloud computing systems. Comput. Law Secur. Rev. 26(3): 304-308 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint