Publications (1990 onwards)

(please email for the 35 pre-1990 publications)

High Performance Computing

  1. Overill R E, A family of fully vectorisable sorting algorithms. Supercomputer, 7 (6), 71-76 (1990)
  2. Overill R E, On the efficient vectorisation of the general first order linear recurrence relation. Supercomputer, 8 (2), 31-36 (1991)
  3. Overill R E, On the rapid parallel evaluation of power series. Supercomputer, 8 (4), 38-41 (1991)
  4. Overill R E, Bitonic sorting for vector processors. Supercomputer, 9 (2), 4-8 (1992)
  5. Overill R E, Cross-comparisons of vector processor and processor array performance. Proceedings of the NPL/BCS Conference on Parallel Processors - Benchmarking & Assessment, 18 March 1992, final 8pp.
  6. Overill R E, Hypercube performance revisited. Supercomputer, 9 (5), 4-8 (1992)
  7. Overill R E, Data parallel evaluation of power series: a comparison of vector processor and processor array performance. Proceedings of the ESPRIT Workshop on Performance Evaluation of Parallel Systems (PEPS'93), 29-30 November 1993, pp.219-224
  8. Overill R E & (Wilson S), Performance of parallel algorithms for the evaluation of power series. Parallel Computing, 20 (8), 1205-1213 (1994)
  9. (Moncrieff D), Overill R E & (Wilson S), Alpha(critical) for parallel processors, Parallel Computing 21 (3), 467-471 (1995)
  10. (Moncrieff D), Overill R E & (Wilson S), Heterogeneous computing machines and Amdahl's law, Parallel Computing, 22 (3), 407-413 (1996)
  11. Overill R E & (Wilson S), Data parallel evaluation of univariate polynomials by the Knuth-Eve algorithm. Parallel Computing, 23 (13), 2115-2127 (1997)
  12. Overill R E, Architectural Algorithmetrics: some recent results, in London Algorithmics and Stringology 2006 (eds. J W Daykin, K Steinhoefel & M Mohamed), Texts in Algorithmics Vol.8, College Publications (2007) 43-63.
  13. Overill R E, Emam. A & Hyatt D, Use of Animation Techniques to Facilitate the Visualisation of Systolic Architectures, in Proc. Excellence in Teaching Conference 2008 (eds. L Gourlay & S Saxby-Smith), King's Learning Institute (2008) ISBN 978-0-9558633-1-8, pp.71-75.

Cyber Security

  1. (Rathmell A), Overill R & (Valeri L), Information warfare attack assessment system (IWAAS), Proc. 1st DERA Quadripartite Information Warfare Seminar, London, 21-23 Oct.1997.
  2. (Rathmell A), Overill R, (Valeri L & Gearson J), The IW threat from sub-state groups: an interdisciplinary approach. Proceedings of the Third International Command & Control Research and Technology Symposium, National Defense University, Washington DC, 17-20 June 1997, pp.164-178; reprinted in J Financial Crime 6 (2), 146-156 (1998).
  3. Overill R E, Computer crime - an historical survey. Defence Systems International (Autumn 1997) pp.102-103.
  4. Overill R E, Intrusion detection systems: threats, taxonomy, tuning. J Financial Crime, 6 (1) 49-51 (1998) [presented at the 15th International Symposium on Economic Crime, Jesus College, Cambridge, 14-20 Sept.1997].
  5. Overill R E, Trends in Computer Crime, J Financial Crime, 6 (2), 157-162 (1998) [presented at the International Centre for Security Analysis, King's College London, 3 March 1998].
  6. Overill R E, Denial of Service Attacks: Threats and Methodologies. J Financial Crime, 6 (4) 351-354 (1999) [presented at the 16th International Symposium on Economic Crime, Jesus College, Cambridge, 13-19 Sept.1998].
  7. Overill R E, How Re(Pro)active should an IDS be? in Proc. 1st International Workshop on Recent Advances in Intrusion Detection (RAID'98), Louvain-la-Neuve, 14-15 Sept.1998, available online here
  8. Overill R E, Information Warfare: Battles in Cyberspace, Computing & Control Engineering J. 12 (3) (June 2001) 125-128.
  9. Overill R E, Reacting to Cyber-intrusions: the Technical, Legal and Ethical Dimensions, J Financial Crime, 11 (2) 163-167 (2003).
  10. Kim J, Ong A & Overill R E, Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector, in Proc. Congress on Evolutionary Computation (CEC-2003), Canberra, Australia, 8-12 December 2003, pp.405-412.
  11. Coles-Kemp L & Overill R E, The Information Security Ownership Question in ISO/IEC 27001 - an Implementation Perspective, in Proc. 4th Australian Information Security Conference, Perth, Australia, 5 December 2006, ISBN 0-7298-0625-1, pp.49-56, available online here
  12. Coles-Kemp L & Overill R E, On the Role of the Facilitator in Information Security Risk Assessment, J Computer Virology 3 (2) 143-148 (2007).
  13. Coles-Kemp L & Overill R E, Triangulating the Views of Human and Non-human Stakeholders in Information Security Risk Assessment, in Proc. 2007 Conference on Security and Management (SAM'07), Las Vegas, USA, 25-28 June 2007, pp.172-178.
  14. Coles-Kemp E & Overill R E, The Design of Information Management Security Systems for Small-to-Medium Size Enterprises, in Proc. 6th European Conference on Information Warfare and Security (ECIW 2007), Shrivenham, UK, 2-3 July 2007, pp.47-54.
  15. Overill R E, Integration of Cyberforensics into a Forensic Science Masters Programme, in Proc. 1st International Conference on Cybercrime Forensics Education & Training (CFET 2007), Canterbury, UK, 6-7 September 2007.
  16. Overill R E & Ferguson R I, Does Computer Forensics belong to Computer Science or Forensic Science? in Proc. 3rd Annual HEA ICS Teaching Computer Forensics Workshop, Northumria, UK, 22-23 November 2007, available online here
  17. Overill R E, Computational Immunology and Anomaly Detection, Information Security Technical Report, 12 (4) 188-191 (2007).
  18. Overill R E, Development of a Masters module in Computer Forensics and Cybercrime, in Proc. 2nd International Conference on Cybercrime Forensics Education & Training (CFET 2008), Canterbury, UK, 1-2 September 2008.
  19. Overill R E, ISMS Insider Intrusion Prevention and Detection, Information Security Technical Report, 13 (4) 216-219 (2008).
  20. Overill R E, (Kwan Y K, Chow K-P, Lai K Y & Law Y W), A Cost-Effective Digital Forensics Investigation Model, Proc. 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, 25-28 January 2009, Advances in Digital Forensics V, Ch.15, pp.193-202, Springer (2009).
  21. Overill R E, Development of Masters Modules in Computer Forensics and Cybercrime for Computer Science and Forensic Science Students, Int. J. Electronic Security & Digital Forensics 2 (2) 132-140 (2009).
  22. (Kwan Y K), Overill R E, (Chow K-P), Silomon J A M, (Tse H, Law Y W & Lai K Y), Evaluation of Evidence in Internet Auction Fraud Investigations, Proc.6th Annual IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, 3-6 January 2010, Advances in Digital Forensics VI, Ch.7, pp.95-106, Springer (2010).
  23. Overill R E, Silomon J A M & (Chow K-P), A Complexity Based Model for Quantifying Forensic Evidential Probabilities, Proc. 3rd International Workshop on Digital Forensics (WSDF 2010), Krakow, Poland, 15-18 February 2010, pp.671-676.
  24. Overill R E, Silomon J A M, (Kwan Y K, Chow K-P, Law Y W  & Lai K Y), Sensitivity Analysis of a Bayesian Network for Reasoning about Digital Forensic Evidence, 4th  International Workshop on Forensics for Future Generation Communication Environments (F2GC-2010), in Proc. HumanCom-2010: 3rd International Conference on Human-Centric Computing, Cebu, Philippines, 11-13 August 2010, IEEE Press, pp.228-232.
  25. Overill R E & Silomon J A M, Digital Meta-Forensics: Quantifying the Investigation, Proc. 4th International Conference on Cybercrime Forensics Education & Training (CFET 2010), Canterbury, UK, 2-3 September 2010.
  26. (Kwan M), Overill R, (Chow K-P, Tse H, Law F & Lai P), Sensitivity Analysis of Digital Forensic Reasoning in Bayesian Network Models, Advances in Digital Forensics VII, pp.213-244, Springer (2011), Proc. 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, 30 January - 2 February 2011.
  27. Overill R E & Silomon J A M, Six Simple Schemata for Approximating Bayesian Belief Networks, in Cyberforensics: Issues and Perspectives, Proc 1st International Conference on Cybercrime, Security and Digital Forensics (ed. GRS Weir), Glasgow, UK, 27-28 June 2011, pp.65–72.
  28. Overill R E, Digital Quantum Forensics: Challenges and Responses, 5th International Workshop on Forensics for Future Generation Communication Environments (F2GC-2011), in Future Information Technology (Part 2): Proc. 6th International Conference FutureTech-2011 (Part II), Springer Communications in Computer & Information Science #185, Loutraki, Greece 28-30 June 2011, pp.110-114.
  29. Overill R E & Silomon J A M, A Complexity Based Forensic Analysis of the Trojan Horse Defence, Proc. 4th International Workshop on Digital Forensics (WSDF 2011), Vienna, Austria, 22-26 August 2011, pp.764-768.
  30. Overill R E & Silomon J A M, Digital Cosmo-Forensics: the Final Frontier?, Proc 5th International Conference on Cybercrime Forensics Education & Training (CFET 2011), Canterbury, UK, 1-2 September 2011.
  31. Overill R E, The ‘Inverse CSI Effect’ in Digital Forensics, Proc. 7th Annual HEA ICS Teaching Computer Forensics Workshop, Sunderland, UK, 10 November 2011.
  32. Overill R E & Silomon J A M, Single and Double Power Laws for Cyber-Crimes, J Information Warfare, 10 (3) 29-36 (December 2011).
  33. Overill R E, The ‘Inverse CSI Effect’: Evidence from e-Crime Data, in Issues in Cybercrime, Security and Digital Forensics, Proc. 2nd International Conference on Cybercrime, Security and Digital Forensics (eds. GRS Weir & A Al-Nemrat)), London, UK, 14-15 May 2012, pp.133137.
  34. Overill R E, (Zhang P & Chow K-P), Multi-parameter Sensitivity Analysis of a Bayesian Network from a Digital Forensic Investigation, Proc. 2012 ADFSL Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA, 3031 May 2012.
  35. Overill R E & Silomon J A M, Uncertainty Bounds for Digital Forensic Evidence and Hypotheses, Proc. 5th International Workshop on Digital Forensics (WSDF 2012), Prague, Czech Republic, 2024 August 2012, pp.590595.
  36. (Stamati-Koromina V, Ilioudis C, Stamatis D, Georgiadis C) & Overill R E, Insider Threats in Corporate Environments: A Case Study for Data Leakage Prevention, Proc. 5th Balkan Conference on Informatics (BCI 2012), Novi Sad, Serbia, 1620 September 2012, pp.271274.
  37. Overill R E, Silomon J A M, (Chow K-P & Law Y W), Quantitative Plausibility of the Trojan Horse Defence against Possession of Child Pornography, Proc. 1st International Conference on Digital Forensics and Investigation (ICDFI 2012), Beijing, China, 2123 September 2012, available online here.
  38. Silomon J A M & Overill R E, Cyber Security's Can of Worms, J Information Warfare, 11 (1) 1221 (May 2012).
  39. Overill R E, The ‘Inverse CSI Effect’: Further Evidence from e-Crime Data, Int. J. Electronic Security & Digital Forensics, 5 (2) 81–89 (2013); publisher’s press release; Forensic Focus interview.
  40. Overill R E, Digital Quantum Forensics: Future Challenges and Prospects, Int. J. Information Technology, Communications & Convergence, 2 (3) 205211 (2012); publisher’s press release; Technology Review interview.
  41. Overill R E, Silomon J A M & (Roscoe, K A), Triage Template Pipelines in Digital Forensic Investigations, Digital Investigation 10 (2) 168174 (2013).
  42. Overill R E, Digital Forensonomics - the Economics of Digital Forensics, Proc. 2nd International Workshop on Cyberpatterns (Cyberpatterns 2013), Abingdon, UK, 89 July 2013.
  43. Overill R E, Silomon J A M, (Chow K-P & Tse H), Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence against Possession of Child Pornography, Proc. 2nd International Conference on Digital Forensics and Investigation (ICDFI 2013), Wuhan, China, 12-13 September 2013, Journal of Harbin Institute of Technology 21 (6) (December 2014) 9-15.
  44. Aljamea M, Ghanaei V, Iliopoulos C S & Overill R E, Static Analysis and Clustering of Malware Applying Text-Based Search, in Proc. International Conference on Digital Information Processing, E-Business and Cloud Computing (DIPECC 2013), Dubai, UAE, 23-25 October 2013.
  45. Overill R E, Silomon J A M, (Chow K-P & Tse H), Quantification of Digital Forensic Hypotheses Using Probability Theory, Proc. 8th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2013), Hong Kong, 21-22 November 2013, pp.71-75.
  46. Saied A, Overill R E & Radzik T, Artificial Neural Networks in the Detection of Known and Unknown DDoS Attacks: Proof of Concept, in J.M. Corchado et al. (Eds.): Highlights of Practical Applications of Heterogeneous Multi-Agent Systems (PAAMS'14) International Workshop Proceedings, 4-6 June 2014, Salamanca, Spain, CCIS Vol. 430, pp. 309–320, Springer International Publishing, Switzerland, (2014).
  47. Brady O, Overill R E & Keppens J, Addressing the Increasing Volume and Variety of Digital Evidence Using an Ontology, IEEE Joint Intelligence and Security Informatics Conference (ISI-EISIC-2014), September 24-26, 2014, The Hague, Netherlands, pp.176185.
  48. Ghanaei V, Iliopoulos C S & Overill R E, A Statistical Approach for Discovering Critical Malicious Patterns in Malware Families, Proc. 7th International Conference on Pervasive Patterns and Applications (PATTERNS 2015), 22–27 March 2015, Nice, France, pp.21–26.
  49. Saied A, Overill R E & Radzik T, Detection of known and unknown DDoS attacks using Artificial Neural Networks, Neurocomputing 172 (2016) pp.385393.
  50. Brady O, Overill R E & Keppens J, DESO: Addressing Volume and Variety in Large-Scale Criminal Cases, Digital Investigation 15 (2015) 7282.
  51. Al Khater N & Overill R E, Network Traffic Classification Techniques and Challenges, Proc. 10th International Conference on Digital Information Management (ICDIM 2015), Jeju, S.Korea, 21–23 October 2015,  pp.43–48.
  52. Al Khater N & Overill R E, Forensic Network Traffic Analysis, Proc. 2nd  International Conference on Information Security and Cyber Forensics, Cape Town (1517 November 2015) pp.1–9.
  53. Ghanaei V, Iliopoulos C & Overill R E, Statistical approach towards malware classification and detection, Proc. 2016 SAI Computing Conference, SAI 2016, London, (13–15 July 2016) pp.1093–1099.
  54. Overill R E & (Chow K-P), An approach to quantifying the plausibility of the Inadvertent Download Defence, Forensic Sciences Research 1 (1) 2832 (December 2016).
  55. Overill R E & (Chow K-P), Measuring Evidential Weight in Digital Forensic Investigations: a Role for Bayesian Networks in Digital Forensic Triage, Proc. 14th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, 3-5 January 2018 (accepted).

Chaos theory, Computation, Information theory, Music analysis, Computer history, Computer graphics, and Computational Quantum Theory

  1. Overill R E, On the computational complexity of fuzzy pattern matching in music analysis. Computers and the Humanities, 27 (2), 105110 (1993).
  2. Wells A L J & Overill R E, The extension of the FeigenbaumCvitanovic function to the complex plane. International Journal of Bifurcation and Chaos, 4 (4), 10411051 (1994)
  3. Overill R E, Information Theory, The New Grove Dictionary of Music and Musicians, 2nd.Edition, Ed.Stanley Sadie, Vol.12, pp.377-379, Macmillan (Jan.2001); updated online (2011)
  4. Overill R E, Computers and Computation, Handbook of Molecular Physics and Quantum Chemistry, Ed.Stephen Wilson, Vol.2, Pt.6, Ch.27, pp.571-584, John Wiley & Sons (Jan.2003)
  5. Overill R E, Parallelism of Paradigms in Non-Classical Computation, in Proc. Grand Challenge in Non-Classical Computation (GC-7) Workshop, 18-19 April 2005, York, UK, available online here
  6. Overill R E & Silomon J A M, King's College London Computing Museum, Computer Resurrection, No.46 (Spring 2009) 25-28, ISSN 0958-7403, available online here
  7. Rady M A & Overill R E, Towards Rendering Optical Phenomena, in Proc. URC* 2010, Eds.M Fernandez & K Steinhofel, 24-26 March 2010, London, College Publications (2010), pp.55-71. ISBN:978-1-84890-026-4
  8. Overill R E, Towards the truly non-empirical computation of hyperfine interactions: a contribution to the debate on the t-butyl radical. Journal of Computational Chemistry, 12 (2), 231-236 (1991)
  9. (Tranter G E, Macdermott A J), Overill R E & (Speers P), Computational studies of the electroweak origin of biomolecular handedness in natural sugars. Proceedings of the Royal Society of London A, 436 (1898), 603-615 (1992)
  10. (Dixon W J, Hibbert F) & Overill R E, Theoretical calculations of minimum energy structures and thermodynamics for the formation of cyclic amidines and imidates by intramolecular nucleophilic addition/elimination reactions, J.C.S. Perkin Trans.II (1998) 635-638

Invited Keynote Address

1.      Keynote #1: “Quantifying Likelihood in Digital Forensic Investigations”, 2nd International Conference on Digital Forensics and Investigation (ICDFI 2013), Wuhan, China, 12-13 September 2013,  Journal of Harbin Institute of Technology 21 (6) (December 2014) 1-4.

Invited Web Articles

1.      Overill, Richard E, Image Steganography: Digital Images as Covert, Subliminal Channels, The Operative Image (curator, Ingrid Hoetzl), February 2014. http://mediacommons.futureofthebook.org/tne/cluster/operative-image/

2.      Overill, Richard E, Alexander Scriabin’s Use of French Directions to the Pianist, The Scriabin Association (editor, Darren Leaper), April 2015. http://www.scriabin-association.com/articles/

Keyboard Music Studies

  1. Overill R & Likhina E, On the musical roles of the chromatic organ in renaissance Italy, Proc. 8th Biennial Congress on Organology, Institute of Art History, St Petersburg, Russia, 24 December 2013, pp.190–194.
  2. Overill R E, The Chayre Organ Revisited, BIOS Reporter, 39 (4) 90–93 (October 2015)
  3. Overill R E, The transition from Italian to French expressive markings in the piano scores of A N Scriabin, in Proc. International Symposium & Festival “Two Legends of Russian Music”, Herzen Pedagogical State University of Russia, St Petersburg (29–31 October 2015) to appear Nov.– Dec. 2017.

Martial Arts Studies

  1. Overill R & Silomon J, The Shaolin Temples, Journal of the International Ryukyu Karate Research Society, No.52 (Q3, 2008), pp.27–33
  2. Overill R E, Was Jesus a Martial Artist? Journal of Asian Martial Arts, 18 (2) (2009), pp.20–27
  3. Overill R, Standing on One Leg: Ippon Ashi Dachi in Shotokan Karate, Shotokan Karate Magazine, No.123 (April 2015), pp.32–34
  4. Overill R, The Shotokan Zodiac: Animal Styles in Shotokan Karate, Shotokan Karate Magazine, No.125 (October 2015), pp.32–34
  5. Overill R, The Different Yoi Positions in Shotokan Kata, Shotokan Karate Magazine, No.129 (October 2016) pp.30–31.
  6. Overill R, Bo Dori: “Grasping the Staff” in Shotokan Kata, Shotokan Karate Magazine, No.130 (December 2016), pp.26–28.