|
Search the dblp DataBase
Andrew Clark:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:25-39 [Conf]
- Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd
An Improved Execution Integrity Solution for Mobile Agents. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:170-183 [Conf]
- Jovan Dj. Golic, Andrew Clark, Ed Dawson
Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:88-102 [Conf]
- Lauren May, Lyta Penna, Andrew Clark
An Implementation of Bitsliced DES on the Pentium MMXTM Processor. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:112-122 [Conf]
- Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
A Three-Party HTTP Proxy to Support Internet Content Regulation. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:89-96 [Conf]
- William Millan, Andrew Clark, Ed Dawson
Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:1-11 [Conf]
- Stig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:49-58 [Conf]
- Nathan Carey, George M. Mohay, Andrew Clark
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:245-254 [Conf]
- Rupinder Gill, Jason Smith, Andrew Clark
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:221-230 [Conf]
- David Duncombe, George M. Mohay, Andrew Clark
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2006, pp:135-144 [Conf]
- Gary Carter, Andrew Clark, Lauren Nielsen
DESV-1: A Variation of the Data Encryption Standard (DES). [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1994, pp:427-430 [Conf]
- George M. Mohay, Kevin Chen, Andrew Clark
ECF - Event Correlation for Forensics. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2003, pp:- [Conf]
- Bradley Schatz, George M. Mohay, Andrew Clark
Generalising Event Forensics Across Multiple Domains. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:136-144 [Conf]
- Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew Clark
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. [Citation Graph (0, 0)][DBLP] Cryptographic Algorithms and their Uses, 2004, pp:125-139 [Conf]
- Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
Discrete Optimisation and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP] Cryptography: Policy and Algorithms, 1995, pp:186-200 [Conf]
- William Millan, Andrew Clark, Ed Dawson
Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:489-499 [Conf]
- Andrew Clark, Jovan Dj. Golic, Ed Dawson
A Comparison of Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1996, pp:145-157 [Conf]
- Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:230-237 [Conf]
- Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:343-357 [Conf]
- Nathan Carey, Andrew Clark, George M. Mohay
IDS Interoperability and Correlation Using IDMEF and Commodity Systems. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:252-264 [Conf]
- William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:263-274 [Conf]
- William Millan, Andrew Clark, Ed Dawson
An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:149-158 [Conf]
- Chris Wullems, Mark Looi, Andrew Clark
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:1251-1258 [Conf]
- Rajiv Chakravorty, Andrew Clark, Ian Pratt
GPRSWeb: Optimizing the Web for GPRS Links. [Citation Graph (0, 0)][DBLP] MobiSys, 2003, pp:- [Conf]
- Chris Wullems, Mark Looi, Andrew Clark
Towards Context-aware Security: An Authorization Architecture for Intranet Environments. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2004, pp:132-137 [Conf]
- Jonathon Abbott, Jim Bell, Andrew Clark, Olivier Y. de Vel, George M. Mohay
Automated recognition of event scenarios for digital forensics. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:293-300 [Conf]
- Lyta Penna, Andrew Clark, George M. Mohay
Challenges of Automating the Detection of Paedophile Activity on the Internet. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:206-222 [Conf]
- Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP] SADFE, 2005, pp:89-104 [Conf]
- Jovan Dj. Golic, Andrew Clark, Ed Dawson
Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP] Australian Computer Journal, 1999, v:31, n:2, pp:44-53 [Journal]
- Bradley Schatz, George M. Mohay, Andrew Clark
A correlation method for establishing provenance of timestamps in digital evidence. [Citation Graph (0, 0)][DBLP] Digital Investigation, 2006, v:3, n:Supplement-1, pp:98-107 [Journal]
- Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
- Jovan Dj. Golic, Andrew Clark, Ed Dawson
Generalized Inversion Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2000, v:49, n:10, pp:1100-1109 [Journal]
- Rupinder Gill, Jason Smith, Andrew Clark
Specification-Based Intrusion Detection in WLANs. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:141-152 [Conf]
- Ed Dawson, Andrew Clark, Mark Looi
Key management in a non-trusted distributed environment. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2000, v:16, n:4, pp:319-329 [Journal]
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. [Citation Graph (, )][DBLP]
A Model for Computer Profiling. [Citation Graph (, )][DBLP]
Continuous Biometric Authentication: Can It Be More Practical? [Citation Graph (, )][DBLP]
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. [Citation Graph (, )][DBLP]
A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. [Citation Graph (, )][DBLP]
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. [Citation Graph (, )][DBLP]
A Framework for Improved Adolescent and Child Safety in MMOs. [Citation Graph (, )][DBLP]
Search in 0.085secs, Finished in 0.088secs
|