Publications
(1990 onwards)
(please email for the 35 pre-1990 publications)
High Performance Computing
- Overill R E, A
family of fully vectorisable sorting algorithms. Supercomputer, 7 (6), 71-76 (1990)
- Overill R E, On the efficient
vectorisation of the general first order linear recurrence relation.
Supercomputer, 8 (2), 31-36
(1991)
- Overill R E, On the rapid parallel
evaluation of power series. Supercomputer, 8 (4), 38-41 (1991)
- Overill R E, Bitonic sorting for vector
processors. Supercomputer, 9
(2), 4-8 (1992)
- Overill R E, Cross-comparisons of vector
processor and processor array performance. Proceedings of the NPL/BCS
Conference on Parallel Processors - Benchmarking & Assessment, 18
March 1992, final 8pp.
- Overill R E, Hypercube performance
revisited. Supercomputer, 9 (5),
4-8 (1992)
- Overill R E, Data parallel evaluation of
power series: a comparison of vector processor and processor array
performance. Proceedings of the ESPRIT Workshop on Performance Evaluation
of Parallel Systems (PEPS'93), 29-30 November 1993, pp.219-224
- Overill R E & (Wilson S), Performance
of parallel algorithms for the evaluation of power series. Parallel
Computing, 20 (8), 1205-1213 (1994)
- (Moncrieff D), Overill R E & (Wilson S), Alpha(critical)
for parallel processors, Parallel Computing 21 (3), 467-471 (1995)
- (Moncrieff D), Overill R E & (Wilson S),
Heterogeneous computing machines and Amdahl's law, Parallel Computing, 22
(3), 407-413 (1996)
- Overill R E & (Wilson S), Data
parallel evaluation of univariate polynomials by the Knuth-Eve algorithm.
Parallel Computing, 23 (13), 2115-2127 (1997)
- Overill R E, Architectural
Algorithmetrics: some recent results, in London Algorithmics and
Stringology 2006 (eds. J W Daykin, K Steinhoefel & M Mohamed), Texts
in Algorithmics Vol.8, College Publications (2007) 43-63.
- Overill R E, Emam. A & Hyatt D, Use of
Animation Techniques to Facilitate the Visualisation of Systolic
Architectures, in Proc. Excellence in Teaching Conference 2008 (eds. L
Gourlay & S Saxby-Smith), King's Learning Institute (2008) ISBN
978-0-9558633-1-8, pp.71-75.
Cyber Security
- (Rathmell A), Overill R & (Valeri L),
Information warfare attack assessment system (IWAAS), Proc. 1st DERA
Quadripartite Information Warfare Seminar, London, 21-23 Oct.1997.
- (Rathmell A), Overill R, (Valeri L & Gearson
J), The IW threat from sub-state groups: an interdisciplinary approach.
Proceedings of the Third International Command & Control Research and
Technology Symposium, National Defense University, Washington DC, 17-20
June 1997, pp.164-178; reprinted in J Financial Crime 6 (2), 146-156
(1998).
- Overill R E, Computer crime - an
historical survey. Defence Systems International (Autumn 1997) pp.102-103.
- Overill R E, Intrusion detection systems:
threats, taxonomy, tuning. J Financial Crime, 6 (1) 49-51 (1998)
[presented at the 15th International Symposium on Economic Crime, Jesus
College, Cambridge, 14-20 Sept.1997].
- Overill R E, Trends in Computer Crime, J
Financial Crime, 6 (2), 157-162 (1998) [presented at the International
Centre for Security Analysis, King's College London, 3 March 1998].
- Overill R E, Denial of Service Attacks:
Threats and Methodologies. J Financial Crime, 6 (4) 351-354 (1999)
[presented at the 16th International Symposium on Economic Crime, Jesus
College, Cambridge, 13-19 Sept.1998].
- Overill R E, How Re(Pro)active should an
IDS be? in Proc. 1st International Workshop on Recent Advances in
Intrusion Detection (RAID'98), Louvain-la-Neuve, 14-15 Sept.1998,
available online here
- Overill R E, Information Warfare: Battles
in Cyberspace, Computing & Control Engineering J. 12 (3) (June 2001)
125-128.
- Overill R E, Reacting to Cyber-intrusions:
the Technical, Legal and Ethical Dimensions, J Financial Crime, 11 (2)
163-167 (2003).
- Kim J, Ong A
& Overill R E, Design of an
Artificial Immune System as a Novel Anomaly Detector for Combating
Financial Fraud in the Retail Sector, in Proc. Congress on Evolutionary
Computation (CEC-2003), Canberra, Australia, 8-12 December 2003,
pp.405-412.
- Coles-Kemp L
& Overill R E, The Information
Security Ownership Question in ISO/IEC 27001 - an Implementation
Perspective, in Proc. 4th Australian Information Security Conference,
Perth, Australia, 5 December 2006, ISBN 0-7298-0625-1, pp.49-56, available
online here
- Coles-Kemp L
& Overill R E, On the Role
of the Facilitator in Information Security Risk Assessment, J Computer
Virology 3 (2) 143-148 (2007).
- Coles-Kemp L
& Overill R E,
Triangulating the Views of Human and Non-human Stakeholders in Information
Security Risk Assessment, in Proc. 2007 Conference on Security and
Management (SAM'07), Las Vegas, USA, 25-28 June 2007, pp.172-178.
- Coles-Kemp E
& Overill R E, The Design
of Information Management Security Systems for Small-to-Medium Size
Enterprises, in Proc. 6th European Conference on Information Warfare and
Security (ECIW 2007), Shrivenham, UK, 2-3 July 2007, pp.47-54.
- Overill R E, Integration of Cyberforensics
into a Forensic Science Masters Programme, in Proc. 1st International
Conference on Cybercrime Forensics Education & Training (CFET 2007),
Canterbury, UK, 6-7 September 2007.
- Overill R E & Ferguson R I, Does
Computer Forensics belong to Computer Science or Forensic Science? in
Proc. 3rd Annual HEA ICS Teaching Computer Forensics Workshop,
Northumbria, UK, 22-23 November 2007, available online here
- Overill R E, Computational Immunology and
Anomaly Detection, Information Security Technical Report, 12 (4) 188-191
(2007).
- Overill R E, Development of a Masters
module in Computer Forensics and Cybercrime, in Proc. 2nd International
Conference on Cybercrime Forensics Education & Training (CFET 2008),
Canterbury, UK, 1-2 September 2008.
- Overill R E, ISMS Insider Intrusion
Prevention and Detection, Information Security Technical Report, 13 (4)
216-219 (2008).
- Overill R E, (Kwan Y K, Chow K-P, Lai K Y
& Law Y W), A Cost-Effective Digital Forensics Investigation Model,
Proc. 5th Annual IFIP WG 11.9 International Conference on Digital
Forensics, Orlando, Florida, USA, 25-28 January 2009, Advances in Digital
Forensics V, Ch.15, pp.193-202, Springer (2009).
- Overill R E, Development of Masters
Modules in Computer Forensics and Cybercrime for Computer Science and
Forensic Science Students, Int. J. Electronic Security & Digital
Forensics 2 (2) 132-140 (2009).
- (Kwan Y K), Overill R E, (Chow K-P), Silomon J
A M, (Tse H, Law Y W & Lai K Y), Evaluation of Evidence in Internet
Auction Fraud Investigations, Proc.6th Annual IFIP WG 11.9 International
Conference on Digital Forensics, Hong Kong, 3-6 January 2010, Advances in
Digital Forensics VI, Ch.7, pp.95-106, Springer (2010).
- Overill R E, Silomon J A M & (Chow
K-P), A Complexity Based Model for Quantifying Forensic Evidential
Probabilities, Proc. 3rd International Workshop on Digital Forensics (WSDF
2010), Krakow, Poland, 15-18 February 2010, pp.671-676.
- Overill R E, Silomon J A M, (Kwan Y K,
Chow K-P, Law Y W & Lai K Y), Sensitivity Analysis of a Bayesian
Network for Reasoning about Digital Forensic Evidence, 4th International Workshop on Forensics
for Future Generation Communication Environments (F2GC-2010), in Proc.
HumanCom-2010: 3rd International Conference on Human-Centric
Computing, Cebu, Philippines, 11-13 August 2010, IEEE Press, pp.228-232.
- Overill R E & Silomon J A M, Digital
Meta-Forensics: Quantifying the Investigation, Proc. 4th International
Conference on Cybercrime Forensics Education & Training (CFET 2010),
Canterbury, UK, 2-3 September 2010.
- (Kwan M), Overill R, (Chow K-P, Tse H, Law F
& Lai P), Sensitivity Analysis of Digital Forensic Reasoning in
Bayesian Network Models, Advances in Digital Forensics VII, pp.213-244,
Springer (2011), Proc. 7th Annual IFIP WG 11.9 International Conference on
Digital Forensics, Orlando, Florida, USA, 30 January - 2 February 2011.
- Overill R E & Silomon J A M,
Six Simple Schemata for Approximating Bayesian Belief Networks, in
Cyberforensics: Issues and Perspectives, Proc 1st International
Conference on Cybercrime, Security and Digital Forensics (ed. GRS Weir),
Glasgow, UK, 27-28 June 2011, pp.65–72.
- Overill R E, Digital Quantum Forensics: Challenges and
Responses, 5th International Workshop on Forensics for Future
Generation Communication Environments (F2GC-2011), in Future Information
Technology (Part 2): Proc. 6th International Conference
FutureTech-2011 (Part II), Springer Communications in Computer &
Information Science #185, Loutraki, Greece 28-30 June 2011, pp.110-114.
- Overill R E & Silomon J A M, A Complexity Based Forensic
Analysis of the Trojan Horse Defence, Proc. 4th International Workshop on
Digital Forensics (WSDF 2011), Vienna, Austria, 22-26 August 2011,
pp.764-768.
- Overill R E & Silomon J A M, Digital Cosmo-Forensics: the
Final Frontier?, Proc 5th
International Conference on Cybercrime Forensics Education & Training
(CFET 2011), Canterbury, UK, 1-2 September 2011.
- Overill R E, The ‘Inverse CSI Effect’
in Digital Forensics, Proc. 7th Annual HEA ICS Teaching Computer Forensics
Workshop, Sunderland, UK, 10 November 2011.
- Overill R E & Silomon J A M, Single and Double
Power Laws for Cyber-Crimes, J Information Warfare, 10 (3) 29-36 (December 2011).
- Overill R E, The ‘Inverse CSI Effect’:
Evidence from e-Crime Data, in Issues in Cybercrime, Security and Digital
Forensics, Proc. 2nd International Conference on Cybercrime,
Security and Digital Forensics (eds. GRS Weir & A Al-Nemrat)), London,
UK, 14-15 May 2012, pp.133–137.
- Overill R E, (Zhang P & Chow K-P),
Multi-parameter Sensitivity Analysis of a Bayesian Network from a Digital
Forensic Investigation, Proc. 2012 ADFSL Conference on Digital
Forensics, Security and Law,
Richmond, Virginia, USA, 30–31 May 2012.
- Overill R E & Silomon J A M, Uncertainty Bounds for
Digital Forensic Evidence and Hypotheses, Proc. 5th
International Workshop on Digital Forensics (WSDF 2012), Prague, Czech
Republic, 20–24 August
2012, pp.590–595.
- (Stamati-Koromina V,
Ilioudis C, Stamatis D, Georgiadis C) & Overill R E, Insider Threats in Corporate Environments: A Case
Study for Data Leakage Prevention, Proc. 5th Balkan Conference
on Informatics (BCI 2012), Novi Sad, Serbia, 16–20 September 2012, pp.271–274.
- Overill R E, Silomon J A M, (Chow K-P & Law Y W),
Quantitative Plausibility of the Trojan Horse Defence against Possession
of Child Pornography, Proc. 1st International Conference on
Digital Forensics and Investigation (ICDFI 2012), Beijing, China, 21–23 September
2012, available online here.
- Silomon J A M & Overill R E, Cyber Security's Can
of Worms, J Information Warfare, 11
(1) 12–21
(May 2012).
- Overill R E, The ‘Inverse CSI Effect’: Further
Evidence from e-Crime Data, Int. J. Electronic Security & Digital Forensics, 5 (2) 81–89 (2013);
publisher’s press
release; Forensic Focus interview.
- Overill R E, Digital Quantum
Forensics: Future Challenges and Prospects, Int. J. Information
Technology, Communications & Convergence, 2 (3) 205–211
(2012); publisher’s press
release;
Technology Review interview.
- Overill R E, Silomon J A M & (Roscoe, K A), Triage
Template Pipelines in Digital Forensic Investigations, Digital
Investigation 10 (2) 168–174 (2013).
- Overill R E, Digital Forensonomics - the Economics of Digital
Forensics, Proc. 2nd International Workshop on Cyberpatterns (Cyberpatterns
2013), Abingdon, UK, 8–9
July 2013.
- Overill R E, Silomon J A M, (Chow K-P & Tse H), Effects of
Motivation and Demography on the Quantitative Plausibility of the Trojan
Horse Defence against Possession of Child Pornography, Proc. 2nd
International Conference on Digital Forensics and Investigation (ICDFI
2013), Wuhan, China, 12-13 September 2013, Journal of Harbin Institute of
Technology 21 (6) (December
2014) 9-15.
- Aljamea M, Ghanaei V,
Iliopoulos C S & Overill R E,
Static Analysis and Clustering of Malware Applying Text-Based Search, in
Proc. International Conference on Digital Information Processing,
E-Business and Cloud Computing (DIPECC 2013), Dubai, UAE, 23-25 October
2013.
- Overill R E, Silomon J A M, (Chow K-P & Tse H),
Quantification of Digital Forensic Hypotheses Using Probability Theory,
Proc. 8th IEEE International Workshop on Systematic Approaches
to Digital Forensic Engineering (SADFE 2013), Hong Kong, 21-22 November
2013, pp.71-75.
- Saied A, Overill R E & Radzik T,
Artificial Neural Networks in the Detection of Known and Unknown DDoS
Attacks: Proof of Concept, in J.M. Corchado et al. (Eds.): Highlights of Practical Applications of
Heterogeneous Multi-Agent Systems (PAAMS'14) International Workshop
Proceedings, 4-6 June 2014, Salamanca, Spain, CCIS Vol. 430, pp.
309–320, Springer International Publishing, Switzerland, (2014).
- Brady O, Overill R E & Keppens J, Addressing
the Increasing Volume and Variety of Digital Evidence Using an Ontology,
IEEE Joint Intelligence and Security Informatics Conference
(ISI-EISIC-2014), September 24-26, 2014, The Hague, Netherlands, pp.176–185.
- Ghanaei V, Iliopoulos C S
& Overill R E, A
Statistical Approach for Discovering Critical Malicious Patterns in
Malware Families, Proc. 7th International Conference on
Pervasive Patterns and Applications (PATTERNS 2015), 22–27 March
2015, Nice, France, pp.21–26.
- Saied A, Overill R E & Radzik T,
Detection of known and unknown DDoS attacks using Artificial Neural
Networks, Neurocomputing 172
(2016) pp.385–393.
- Brady O, Overill R E & Keppens J, DESO:
Addressing Volume and Variety in Large-Scale Criminal Cases, Digital
Investigation 15 (2015) 72–82.
- Al Khater N & Overill R E, Network Traffic
Classification Techniques and Challenges, Proc. 10th International
Conference on Digital Information Management (ICDIM 2015), Jeju, S.Korea,
21–23 October 2015,
pp.43–48.
- Al Khater N & Overill R E, Forensic Network
Traffic Analysis, Proc. 2nd International Conference on
Information Security and Cyber Forensics, Cape Town (15–17
November 2015) pp.1–9.
- Ghanaei V, Iliopoulos C
& Overill R E, Statistical
approach towards malware classification and detection, Proc.
2016 SAI Computing Conference, SAI 2016, London, (13–15 July 2016)
pp.1093–1099.
- Overill R E & (Chow K-P), An approach to quantifying the
plausibility of the Inadvertent Download Defence, Forensic Sciences
Research 1 (1) 28–32
(December 2016).
- Overill R E & (Chow K-P), Measuring Evidential Weight in
Digital Forensic Investigations: a Role for Bayesian Networks in Digital
Forensic Triage, Proc. 14th
Annual IFIP WG 11.9 International Conference on Digital Forensics, New
Delhi, India, 3-5 January 2018, Advances in Digital Forensics XIV,
Springer (2018), pp.3 – 10.
- Homayounnejad M & Overill R E, Preventing Autonomous
Weapon Systems from Being Used to Perpetrate Intentional Violations of the
Laws of War, Transnational Law Institute TLI Think! Paper 7/2018, Social
Science Research Network, available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3123254
- Schneps L, Overill R & Lagnado D, Ranking
the impact of different tests on a hypothesis in a Bayesian network,
Entropy 20 (11) 856 – 870 (November 2018).
- Stevens, T C, Overill, R E, Wilkinson, B J,
O'Brien, K A, Hill, S. & Pildegovics, T, UK Active Cyber Defence: A
public good for the private sector, King’s Policy Institute (January
2019).
- Homayounnejad M & Overill R E, The ‘robots
don’t rape’ controversy, Routledge Handbook of Law, War &
Technology (eds: Gow J, Dijxhoorn E, Kerr R & Verdirame G), ch.14,
Routledge (April 2019), pp.169 – 181.
- Homayounnejad M, Overill R E & Gow J, Future
war crimes and prosecution: gathering digital evidence, Routledge Handbook
of Law, War & Technology (eds: Gow J, Dijxhoorn E, Kerr R &
Verdirame G), ch.25, Routledge (April 2019), pp.329 – 336.
61.
Overill R E, Cosmic Rays: a Neglected Potential Threat to Evidential
Integrity in Digital Forensic Investigations? in Proc. 15th ARES international
conference (August 2020), ACM Digital Library: https://dl.acm.org/doi/pdf/10.1145/3407023.3409188
62.
Collie J & Overill R E, DEEP: Extending the Digital
Forensics Process Model for Criminal Investigations, Athens Journal of Science,
7 (4) 225 – 240 (2020).
63.
Overill R E & Chow K P, Bayesian Networks and Cyber-Crime Investigations,
in Crime Science and Digital Forensics: a Holistic View (eds. Ijeh A C &
Curran K) CRC Press, 2021, pp.167 – 183.
64.
Overill R E & Collie J, Quantitative Evaluation of the Results of Digital
Forensic Investigations: a Review of Progress, Forensic Sciences Research, 6
(1) 13 – 18 (2021).
Chaos theory, Computation,
Information theory, Music analysis, Computer history, Computer graphics, and Computational
Quantum Theory
- Overill R E, On the computational complexity of fuzzy pattern
matching in music analysis. Computers and the Humanities, 27 (2), 105–110
(1993).
- Wells A L J & Overill R E, The extension of the
Feigenbaum–Cvitanovic
function to the complex plane. International Journal of Bifurcation and
Chaos, 4 (4), 1041–1051
(1994)
- Overill R E, Information Theory, The New
Grove Dictionary of Music and Musicians, 2nd.Edition, Ed.Stanley Sadie, Vol.12, pp.377-379, Macmillan
(Jan.2001); updated online (2011)
- Overill R E, Computers and Computation,
Handbook of Molecular Physics and Quantum Chemistry, Ed.Stephen Wilson, Vol.2, Pt.6, Ch.27, pp.571-584,
John Wiley & Sons (Jan.2003)
- Overill R E, Parallelism of Paradigms in
Non-Classical Computation, in Proc. Grand Challenge in Non-Classical
Computation (GC-7) Workshop, 18-19 April 2005, York, UK, available online here
- Overill R E & Silomon J A M, King's
College London Computing Museum, Computer Resurrection, No.46 (Spring
2009) 25-28, ISSN 0958-7403, available online here
- Rady M A & Overill R E, Towards Rendering Optical Phenomena, in Proc.
URC* 2010, Eds.M Fernandez & K Steinhofel, 24-26 March 2010, London,
College Publications (2010), pp.55-71. ISBN:978-1-84890-026-4
- Overill R E, Towards the truly
non-empirical computation of hyperfine interactions: a contribution to the
debate on the t-butyl radical.
Journal of Computational Chemistry, 12
(2), 231-236 (1991)
- (Tranter G E,
Macdermott A J), Overill R E
& (Speers P), Computational studies of the electroweak origin of
biomolecular handedness in natural sugars. Proceedings of the Royal
Society of London A, 436
(1898), 603-615 (1992)
- (Dixon W J,
Hibbert F) & Overill R E,
Theoretical calculations of minimum energy structures and thermodynamics
for the formation of cyclic amidines and imidates by intramolecular
nucleophilic addition/elimination reactions, J.C.S. Perkin Trans.II (1998)
635-638
Invited
Keynote Addresses
1. Keynote #1: “Quantifying
Likelihood in Digital Forensic Investigations”, 2nd International
Conference on Digital Forensics and Investigation (ICDFI 2013), Wuhan, China,
12-13 September 2013, Journal of Harbin Institute of Technology 21
(6) (December 2014) 1-4.
2. Keynote #2:
“The Sky: a Neglected Source of Error in Digital Forensic
Investigations?”10th International Workshop on Digital Forensics (WSDF
2017), Reggio Calabria, Italy, 29 August – 1 September 2017.
Invited
Web Articles
1. Overill, Richard E, Image Steganography: Digital Images as Covert,
Subliminal Channels, The Operative Image (curator, Ingrid Hoetzl), February
2014. http://mediacommons.futureofthebook.org/tne/cluster/operative-image/
2. Overill, Richard E, Alexander Scriabin’s
Use of French Directions to the Pianist, The Scriabin Association (editor,
Darren Leaper), April 2015. http://www.scriabin-association.com/articles/
Keyboard
Music Studies
- Overill R & Likhina E, On the musical roles of
the chromatic organ in renaissance Italy, Proc. 8th
Biennial Congress on Organology, Institute of Art History, St Petersburg,
Russia, 2–4
December 2013, pp.190–194.
- Overill R E, The Chayre Organ Revisited,
BIOS Reporter, 39 (4)
90–93 (October 2015)
- Overill R E, The transition from Italian
to French expressive markings in the piano scores of A N Scriabin, in
Proc. International Symposium & Festival “Two Legends of Russian
Music: A.K.Glazunov and A.N.Scriabin Today”, Herzen Pedagogical
State University of Russia, St Petersburg (29–31 October 2015), Monograph, Herzen University Press,
St Petersburg (2021), ISBN: 978-5-8064-2969-9, Ch.II, Sec.19, pp.192–206.
- Overill R E, English
Restoration Organ Compositions: some Implications for Temperament and
Construction, BIOS Reporter, 47 (1) 12–15
(February 2023)
Martial
Arts Studies
- Overill R & Silomon J, The Shaolin Temples,
Journal of the International Ryukyu Karate Research Society, No.52 (Q3,
2008), pp.27–33.
- Overill R E, Was Jesus a Martial Artist?
Journal of Asian Martial Arts, 18
(2) (2009), pp.20–27.
- Overill R, Standing on One Leg: Ippon Ashi Dachi in Shotokan
Karate, Shotokan Karate Magazine, No.123 (April 2015), pp.32–34.
- Overill R, The Shotokan Zodiac: Animal
Styles in Shotokan Karate, Shotokan Karate Magazine, No.125 (October
2015), pp.32–34.
- Overill R, The Different Yoi Positions in Shotokan Kata,
Shotokan Karate Magazine, No.129 (October 2016) pp.30–31.
- Overill R, Bo Dori: “Grasping the Staff” in Shotokan Kata,
Shotokan Karate Magazine, No.130 (December 2016), pp.26–28.
- Overill R, Why
some Shotokan Kata names were changed, Shotokan Karate Magazine, No.141
(September 2019), pp.30–31.