Andrew J. Clark

According to our database1, Andrew J. Clark authored at least 59 papers between 1987 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2013
Enhancing Child Safety in MMOGs.
Proceedings of the Influence of Technology on Social Network Analysis and Mining, 2013

2011
Data preprocessing for anomaly based network intrusion detection: A review.
Computers & Security, 2011

User-representative feature selection for keystroke dynamics.
Proceedings of the 5th International Conference on Network and System Security, 2011

Detecting Collusive Fraud in Enterprise Resource Planning Systems.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Defending Web Services against Denial of Service Attacks Using Client Puzzles.
Proceedings of the IEEE International Conference on Web Services, 2011

Detection of Anomalies from User Profiles Generated from System Logs.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2010
Fraud Detection in ERP Systems Using Scenario Matching.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Overcoming Reputation and Proof-of-Work Systems in Botnets.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Validating Denial of Service Vulnerabilities in Web Services.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Continuous Biometric Authentication: Can It Be More Practical?
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

A Distributed Denial of Service Testbed.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

A Framework for Improved Adolescent and Child Safety in MMOs.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

A Model for Computer Profiling.
Proceedings of the ARES 2010, 2010

2009
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.
Proceedings of the Identity and Privacy in the Internet Age, 2009

FIA: An Open Forensic Integration Architecture for Composing Digital Evidence.
Proceedings of the Forensics in Telecommunications, 2009

2008
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks.
Proceedings of the The Third International Conference on Availability, 2008

2006
A correlation method for establishing provenance of timestamps in digital evidence.
Digital Investigation, 2006

Automated recognition of event scenarios for digital forensics.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Specification-Based Intrusion Detection in WLANs.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Challenges of Automating the Detection of Paedophile Activity on the Internet.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

An Improved Execution Integrity Solution for Mobile Agents.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Optimal Policies for a Multi-Echelon Inventory Problem.
Management Science, 2004

Comments on "Optimal Policies for a Multi-Echelon Inventory Problem".
Management Science, 2004

Simpler methods for generating better Boolean functions with good cryptographic properties.
Australasian J. Combinatorics, 2004

Towards Context-aware Security: An Authorization Architecture for Intranet Environments.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Denial of Service Issues in Voice Over IP Networks.
Proceedings of the ICETE 2004, 2004

A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Generalising Event Forensics Across Multiple Domains.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004

2003
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

ECF - Event Correlation for Forensics.
Proceedings of the 1st Australian Computer, 2003

Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Key recovery for the commercial environment.
Int. J. Inf. Sec., 2002

IDS Interoperability and Correlation Using IDMEF and Commodity Systems.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

The LILI-II Keystream Generator.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2000
Generalized Inversion Attack on Nonlinear Filter Generators.
IEEE Trans. Computers, 2000

Key management in a non-trusted distributed environment.
Future Generation Comp. Syst., 2000

A Three-Party HTTP Proxy to Support Internet Content Regulation.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

An Implementation of Bitsliced DES on the Pentium MMXTM Processor.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Boolean Function Design Using Hill Climbing Methods.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

Inversion Attack and Branching.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
Heuristic Design of Cryptographically Strong Balanced Boolean Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher.
Cryptologia, 1997

Key recovery - why, how, who?.
Computers & Security, 1997

An effective genetic algorithm for finding highly nonlinear Boolean Functions.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Combinatorial Optimization and the Knapsack Cipher.
Cryptologia, 1996

Cryptographic controls - the eternal triangle, .
Computers & Security, 1996

A Comparison of Fast Correlation Attacks.
Proceedings of the Fast Software Encryption, 1996

1995
Discrete Optimisation and Fast Correlation Attacks.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Divide and Conquer Attacks on Certain Classes of Stream Ciphers.
Cryptologia, 1994

DESV-1: A Variation of the Data Encryption Standard (DES).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1987
Physical Protection of Cryptographic Devices.
Proceedings of the Advances in Cryptology, 1987


  Loading...