Barry Irwin
Orcid: 0000-0002-2727-2124
  According to our database1,
  Barry Irwin
  authored at least 68 papers
  between 2005 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Cloud Telescope: An Ephemeral, Distributed, and Cloud-Native Architecture for Collecting Internet Background Radiation.
    
  
    IEEE Access, 2025
    
  
  2024
    Dataset, September, 2024
    
  
  2023
Cloud Telescope: A distributed architecture for capturing Internet Background Radiation.
    
  
    Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
    
  
  2019
    South Afr. Comput. J., 2019
    
  
Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets.
    
  
    Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019
    
  
  2018
    Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018
    
  
    Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018
    
  
Exploration and Design of a Synchronous Message Passing Framework for a CPU-NPU Heterogeneous Architecture.
    
  
    Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018
    
  
  2017
Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable.
    
  
    Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2017
    
  
    Proceedings of the 2017 Information Security for South Africa, 2017
    
  
    Proceedings of the 2017 Information Security for South Africa, 2017
    
  
    Proceedings of the 2017 Information Security for South Africa, 2017
    
  
Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise.
    
  
    Proceedings of the 9th International Conference on Signal Processing Systems, 2017
    
  
  2016
    Int. J. Cyber Warf. Terror., 2016
    
  
    Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
    
  
    Proceedings of the 2016 Information Security for South Africa, 2016
    
  
    Proceedings of the 2016 Information Security for South Africa, 2016
    
  
    Proceedings of the 2016 Information Security for South Africa, 2016
    
  
    Proceedings of the 2016 Information Security for South Africa, 2016
    
  
Investigating Multi-Thread Utilization as a Software Defence Mechanism Against Side Channel Attacks.
    
  
    Proceedings of the 8th International Conference on Signal Processing Systems, 2016
    
  
    Proceedings of the 2nd International Conference on Frontiers of Signal Processing, 2016
    
  
  2015
    Proceedings of the 2015 Information Security for South Africa, 2015
    
  
    Proceedings of the 2015 Information Security for South Africa, 2015
    
  
  2014
On the viability of pro-active automated PII breach detection: A South African case study.
    
  
    Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, 2014
    
  
    Proceedings of the 2014 Information Security for South Africa, 2014
    
  
    Proceedings of the 2014 Information Security for South Africa, 2014
    
  
    Proceedings of the 2014 Information Security for South Africa, 2014
    
  
    Proceedings of the 2014 Information Security for South Africa, 2014
    
  
    Proceedings of the ICT and Society, 2014
    
  
  2013
Towards a GPU accelerated virtual machine for massively parallel packet classification and filtering.
    
  
    Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013
    
  
    Proceedings of the 2013 Information Security for South Africa, 2013
    
  
    Proceedings of the 2013 Information Security for South Africa, 2013
    
  
    Proceedings of the 2013 Information Security for South Africa, 2013
    
  
Real-time distributed malicious traffic monitoring for honeypots and network telescopes.
    
  
    Proceedings of the 2013 Information Security for South Africa, 2013
    
  
    Proceedings of the 2013 Information Security for South Africa, 2013
    
  
    Proceedings of the 5th International Conference on Cyber Conflict, 2013
    
  
  2012
    Proceedings of the 2012 South African Institute of Computer Scientists and Information Technologists Conference, 2012
    
  
Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains.
    
  
    Proceedings of the 2012 Information Security for South Africa, 2012
    
  
    Proceedings of the 2012 Information Security for South Africa, 2012
    
  
    Proceedings of the 2012 Information Security for South Africa, 2012
    
  
Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model.
    
  
    Proceedings of the ICT Critical Infrastructures and Society, 2012
    
  
  2011
    Proceedings of the Information Security South Africa Conference 2011, 2011
    
  
  2010
    Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010
    
  
Data classification for artificial intelligence construct training to aid in network incident identification using network telescope data.
    
  
    Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010
    
  
  2009
    Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2009
    
  
GPU packet classification using OpenCL: a consideration of viable classification methods.
    
  
    Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2009
    
  
    Proceedings of the Information Security South Africa Conference 2009, 2009
    
  
Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers.
    
  
    Proceedings of the Information Security South Africa Conference 2009, 2009
    
  
    Proceedings of the Information Security South Africa Conference 2009, 2009
    
  
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems.
    
  
    Proceedings of the Information Security South Africa Conference 2009, 2009
    
  
A comparison of the resource requirements of SNORT and BRO in production networks.
  
    Proceedings of the IADIS International Conference Applied Computing 2009, 2009
    
  
  2008
    Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008
    
  
    Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
    
  
    Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering, 2008
    
  
  2007
    Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007
    
  
    Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007
    
  
An Investigation into the Performance of General Sorting on Graphics Processing Units.
    
  
    Proceedings of the Advances in Computer and Information Sciences and Engineering, 2007
    
  
  2006
    Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
    
  
Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot.
    
  
    Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
    
  
    Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
    
  
    Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
    
  
    Proceedings of the 4th International Conference on Virtual Reality, 2006
    
  
  2005
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams.
  
    Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
    
  
    Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
    
  
    Proceedings of the Advances in Digital Forensics, 2005