The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew Clark: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
    The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:25-39 [Conf]
  2. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd
    An Improved Execution Integrity Solution for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:170-183 [Conf]
  3. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:88-102 [Conf]
  4. Lauren May, Lyta Penna, Andrew Clark
    An Implementation of Bitsliced DES on the Pentium MMXTM Processor. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:112-122 [Conf]
  5. Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
    A Three-Party HTTP Proxy to Support Internet Content Regulation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:89-96 [Conf]
  6. William Millan, Andrew Clark, Ed Dawson
    Boolean Function Design Using Hill Climbing Methods. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:1-11 [Conf]
  7. Stig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann
    A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:49-58 [Conf]
  8. Nathan Carey, George M. Mohay, Andrew Clark
    Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:245-254 [Conf]
  9. Rupinder Gill, Jason Smith, Andrew Clark
    Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:221-230 [Conf]
  10. David Duncombe, George M. Mohay, Andrew Clark
    Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:135-144 [Conf]
  11. Gary Carter, Andrew Clark, Lauren Nielsen
    DESV-1: A Variation of the Data Encryption Standard (DES). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:427-430 [Conf]
  12. George M. Mohay, Kevin Chen, Andrew Clark
    ECF - Event Correlation for Forensics. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2003, pp:- [Conf]
  13. Bradley Schatz, George M. Mohay, Andrew Clark
    Generalising Event Forensics Across Multiple Domains. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:136-144 [Conf]
  14. Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew Clark
    A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:125-139 [Conf]
  15. Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson
    Discrete Optimisation and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:186-200 [Conf]
  16. William Millan, Andrew Clark, Ed Dawson
    Heuristic Design of Cryptographically Strong Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:489-499 [Conf]
  17. Andrew Clark, Jovan Dj. Golic, Ed Dawson
    A Comparison of Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:145-157 [Conf]
  18. Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan
    Denial of Service Issues in Voice Over IP Networks. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:230-237 [Conf]
  19. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
    Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:343-357 [Conf]
  20. Nathan Carey, Andrew Clark, George M. Mohay
    IDS Interoperability and Correlation Using IDMEF and Commodity Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:252-264 [Conf]
  21. William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
    Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:263-274 [Conf]
  22. William Millan, Andrew Clark, Ed Dawson
    An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:149-158 [Conf]
  23. Chris Wullems, Mark Looi, Andrew Clark
    Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1251-1258 [Conf]
  24. Rajiv Chakravorty, Andrew Clark, Ian Pratt
    GPRSWeb: Optimizing the Web for GPRS Links. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2003, pp:- [Conf]
  25. Chris Wullems, Mark Looi, Andrew Clark
    Towards Context-aware Security: An Authorization Architecture for Intranet Environments. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:132-137 [Conf]
  26. Jonathon Abbott, Jim Bell, Andrew Clark, Olivier Y. de Vel, George M. Mohay
    Automated recognition of event scenarios for digital forensics. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:293-300 [Conf]
  27. Lyta Penna, Andrew Clark, George M. Mohay
    Challenges of Automating the Detection of Paedophile Activity on the Internet. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:206-222 [Conf]
  28. Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
    The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:89-104 [Conf]
  29. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Inversion Attack and Branching. [Citation Graph (0, 0)][DBLP]
    Australian Computer Journal, 1999, v:31, n:2, pp:44-53 [Journal]
  30. Bradley Schatz, George M. Mohay, Andrew Clark
    A correlation method for establishing provenance of timestamps in digital evidence. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:Supplement-1, pp:98-107 [Journal]
  31. Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
    Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
  32. Jovan Dj. Golic, Andrew Clark, Ed Dawson
    Generalized Inversion Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:10, pp:1100-1109 [Journal]
  33. Rupinder Gill, Jason Smith, Andrew Clark
    Specification-Based Intrusion Detection in WLANs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:141-152 [Conf]
  34. Ed Dawson, Andrew Clark, Mark Looi
    Key management in a non-trusted distributed environment. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:319-329 [Journal]

  35. Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. [Citation Graph (, )][DBLP]


  36. A Model for Computer Profiling. [Citation Graph (, )][DBLP]


  37. Continuous Biometric Authentication: Can It Be More Practical? [Citation Graph (, )][DBLP]


  38. A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. [Citation Graph (, )][DBLP]


  39. A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  40. Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. [Citation Graph (, )][DBLP]


  41. FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. [Citation Graph (, )][DBLP]


  42. A Framework for Improved Adolescent and Child Safety in MMOs. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002