Barry Irwin

Orcid: 0000-0002-2727-2124

According to our database1, Barry Irwin authored at least 63 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Design and Evaluation of Bulk Data Transfer Extensions for the NFComms Framework.
South Afr. Comput. J., 2019

Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019

2018
Extending the NFComms framework for bulk data transfers.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018

Toward distributed key management for offline authentication.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018

Exploration and Design of a Synchronous Message Passing Framework for a CPU-NPU Heterogeneous Architecture.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018

2017
Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2017

Design and application of link: A DSL for network frame manipulation.
Proceedings of the 2017 Information Security for South Africa, 2017

A privacy and security threat assessment framework for consumer health wearables.
Proceedings of the 2017 Information Security for South Africa, 2017

Investigating the electromagnetic side channel leakage from a Raspberry Pi.
Proceedings of the 2017 Information Security for South Africa, 2017

Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise.
Proceedings of the 9th International Conference on Signal Processing Systems, 2017

2016
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion.
Int. J. Cyber Warf. Terror., 2016

Towards a Software Approach to Mitigate Correlation Power Analysis.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

The pattern-richness of Graphical passwords.
Proceedings of the 2016 Information Security for South Africa, 2016

Dridex: Analysis of the traffic and automatic generation of IOCs.
Proceedings of the 2016 Information Security for South Africa, 2016

SHA-1 and the Strict Avalanche Criterion.
Proceedings of the 2016 Information Security for South Africa, 2016

Adaptable exploit detection through scalable NetFlow analysis.
Proceedings of the 2016 Information Security for South Africa, 2016

Investigating Multi-Thread Utilization as a Software Defence Mechanism Against Side Channel Attacks.
Proceedings of the 8th International Conference on Signal Processing Systems, 2016

A Multi-threading approach to Secure VERIFYPIN.
Proceedings of the 2nd International Conference on Frontiers of Signal Processing, 2016

2015
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis.
Proceedings of the 2015 Information Security for South Africa, 2015

Characterization and analysis of NTP amplification based DDoS attacks.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
On the viability of pro-active automated PII breach detection: A South African case study.
Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, 2014

Towards a sandbox for the deobfuscation and dissection of PHP malware.
Proceedings of the 2014 Information Security for South Africa, 2014

Towards a platform to visualize the state of South Africa's information security.
Proceedings of the 2014 Information Security for South Africa, 2014

An exploration of geolocation and traffic visualisation using network flows.
Proceedings of the 2014 Information Security for South Africa, 2014

Testing antivirus engines to determine their effectiveness as a security layer.
Proceedings of the 2014 Information Security for South Africa, 2014

Human Perception of the Measurement of a Network Attack Taxonomy in Near Real-Time.
Proceedings of the ICT and Society, 2014

2013
Towards a GPU accelerated virtual machine for massively parallel packet classification and filtering.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013

Visualization of a data leak.
Proceedings of the 2013 Information Security for South Africa, 2013

A high-level architecture for efficient packet trace analysis on GPU co-processors.
Proceedings of the 2013 Information Security for South Africa, 2013

Classification of Security Operation Centers.
Proceedings of the 2013 Information Security for South Africa, 2013

Real-time distributed malicious traffic monitoring for honeypots and network telescopes.
Proceedings of the 2013 Information Security for South Africa, 2013

A kernel-driven framework for high performance internet routing simulation.
Proceedings of the 2013 Information Security for South Africa, 2013

A baseline study of potentially malicious activity across five network telescopes.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

2012
A Computer Network Attack Taxonomy and Ontology.
Int. J. Cyber Warf. Terror., 2012

CaptureFoundry: a GPU accelerated packet capture analysis tool.
Proceedings of the 2012 South African Institute of Computer Scientists and Information Technologists Conference, 2012

Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains.
Proceedings of the 2012 Information Security for South Africa, 2012

A network telescope perspective of the Conficker outbreak.
Proceedings of the 2012 Information Security for South Africa, 2012

Remote fingerprinting and multisensor data fusion.
Proceedings of the 2012 Information Security for South Africa, 2012

Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model.
Proceedings of the ICT Critical Infrastructures and Society, 2012

2011
Tartarus: A honeypot based malware tracking and mitigation framework.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Parallel packet classification using GPU co-processors.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010

Data classification for artificial intelligence construct training to aid in network incident identification using network telescope data.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010

2009
Evaluating text preprocessing to improve compression on maillogs.
Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2009

GPU packet classification using OpenCL: a consideration of viable classification methods.
Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2009

Automated Firewall Rule Set Generation Through Passive Traffic Inspection.
Proceedings of the Information Security South Africa Conference 2009, 2009

Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers.
Proceedings of the Information Security South Africa Conference 2009, 2009

Management, Processing and Analysis of Cryptographic Network Protocols.
Proceedings of the Information Security South Africa Conference 2009, 2009

A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009

A comparison of the resource requirements of SNORT and BRO in production networks.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

2008
Towards a taxonomy of network scanning techniques.
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008

Spam Construction Trends.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

Performance Effects of Concurrent Virtual Machine Execution in VMware Workstation 6.
Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering, 2008

2007
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007

High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007

An Investigation into the Performance of General Sorting on Graphics Processing Units.
Proceedings of the Advances in Computer and Information Sciences and Engineering, 2007

2006
Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks?
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

The Need for Centralised, Cross Platform Information Aggregation.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Integrating Secure RTP into the Open Source VoIP PBX Asterisk.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

InetVis, a visual tool for network telescope traffic analysis.
Proceedings of the 4th International Conference on Virtual Reality, 2006

2005
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

Trust on the Web.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

In-Kernel Cryptographic Executable Verification.
Proceedings of the Advances in Digital Forensics, 2005


  Loading...