Adrian Waller

According to our database1, Adrian Waller authored at least 18 papers between 2004 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Image Classification using non-linear Support Vector Machines on Encrypted Data.
IACR Cryptol. ePrint Arch., 2017

2016
Fixed Point Arithmetic in SHE Scheme.
IACR Cryptol. ePrint Arch., 2016

"Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law.
CoRR, 2016

Natural Laws as a Baseline for Network Anomaly Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fixed-Point Arithmetic in SHE Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Using Benford's Law Divergence and Neural Networks for Classification and Source Identification of Biometric Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Secure architectures of future emerging cryptography <i>SAFEcrypto</i>.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Security Risk Assessment and Risk Treatment for Integrated Modular Communication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2014
Editorial: Special issue on Identity Protection and Management.
J. Inf. Secur. Appl., 2014

2013
Policy templates for relationship-based access control.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
Integration and Management of Multiple Radios in Satellite-Terrestrial based Aeronautical Communication Networks.
EAI Endorsed Trans. Ubiquitous Environ., 2012

2011
Managing runtime re-engineering of a System-of-Systems for cyber security.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Policy Based Management for Security in Cloud Computing.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

2010
Towards adaptive security for convergent wireless sensor networks in beyond 3G environments.
Wirel. Commun. Mob. Comput., 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

2008
RECOUP: efficient reconfiguration for wireless sensor networks.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Formal Analysis of Two Buyer-Seller Watermarking Protocols.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

2004
Policy based network management in high assurance environments.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...