Lynn Margaret Batten

According to our database1, Lynn Margaret Batten authored at least 87 papers between 1983 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A Novel Approach for Information Discovery in Wireless Sensor Grids.
J. Network Syst. Manage., 2018

IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks.
IEEE Access, 2018

Efficiencies in Binary Elliptic Curves.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

2017
Cyber security attacks to modern vehicular systems.
J. Inf. Sec. Appl., 2017

Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change.
IACR Cryptology ePrint Archive, 2017

Aggregating privatized medical data for secure querying applications.
Future Generation Comp. Syst., 2017

Curbing collusive cyber-gossips for business brand management.
Enterprise IS, 2017

New advances in securing cyberspace and curbing crowdturfing.
Concurrency and Computation: Practice and Experience, 2017

Introduction to the Special section on Aadvanced Computing in Networking and Intelligent Systems.
Computers & Electrical Engineering, 2017

A Testbed for Security Analysis of Modern Vehicle Systems.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Securing cyberspace.
Concurrency and Computation: Practice and Experience, 2016

New directions in IoT privacy using attribute-based authentication.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Mobile Money in the Australasian Region - A Technical Security Perspective.
Proceedings of the Applications and Techniques in Information Security, 2016

A New Sign-Change Attack on the Montgomery Ladders.
Proceedings of the Applications and Techniques in Information Security, 2016

2015
Cloud omnibus system for evaluating cloud market services.
IJCC, 2015

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

2014
Special issue on behavior data security issues in network information propagation.
Future Generation Comp. Syst., 2014

A solution for privacy-preserving, remote access to sensitive data.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Android applications: Data leaks via advertising libraries.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Sharing sensitive medical data sets for research purposes - A case study.
Proceedings of the International Conference on Data Science and Advanced Analytics, 2014

An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Classification of malware based on integrated static and dynamic features.
J. Network and Computer Applications, 2013

e-Learning Content Authentication Using Bipartite Matching.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Contrasting Permission Patterns between Clean and Malicious Android Applications.
Proceedings of the Security and Privacy in Communication Networks, 2013

Can Smartphone Users Turn Off Tracking Service Settings?
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Information discovery in multidimensional wireless sensor networks.
Proceedings of the International Conference on Information Networking 2013, 2013

2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
JNW, 2012

Towards an understanding of the impact of advertising on data leaks.
IJSN, 2012

Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations.
IJDCF, 2012

Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations.
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012

Securing Data Privacy on Mobile Devices in Emergency Health Situations.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

Analysis of Malicious and Benign Android Applications.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Microsoft and Amazon: A comparison of approaches to cloud security.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
E-commerce: protecting purchaser privacy to enforce trust.
Electronic Commerce Research, 2011

Feature Reduction to Speed Up Malware Classification.
Proceedings of the Information Security Technology for Applications, 2011

Dealing with Rogue Virtual Machines in a Cloud Services Environment.
Proceedings of the CLOSER 2011, 2011

Prevention of Information Harvesting in a Cloud Services Environment.
Proceedings of the CLOSER 2011, 2011

2010
Testing Digital Forensic Software Tools Used in Expert Testimony.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Wireless broadcast encryption based on smart cards.
Wireless Networks, 2010

Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure.
IACR Cryptology ePrint Archive, 2010

Network Resilience in Low-Resource Mobile Wireless Sensor Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Differentiating malware from cleanware using behavioural analysis.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Using Relationship-Building in Event Profiling for Digital Forensic Investigations.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks.
J. Network and Computer Applications, 2009

Robust performance testing for digital forensic tools.
Digital Investigation, 2009

Fast Recovery from Node Compromise in Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

Lightweight Authentication for Recovery in Wireless Sensor Networks.
Proceedings of the MSN 2009, 2009

An automated classification system based on the strings of trojan and virus families.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

A Privacy Preserving E-Payment Scheme.
Proceedings of the Intelligent Distributed Computing III, Proceedings of the 3rd International Symposium on Intelligent Distributed Computing, 2009

Robust Correctness Testing for Digital Forensic Tools.
Proceedings of the Forensics in Telecommunications, 2009

2008
Efficient broadcast key distribution with dynamic revocation.
Security and Communication Networks, 2008

Teaching Digital Forensics to Undergraduate Students.
IEEE Security & Privacy, 2008

A Trusted Approach to E-Commerce.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Function length as a tool for malware classification.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

An Anonymity Revocation Technology for Anonymous Communication.
Proceedings of the Information Systems Development, 2008

Measure of Integrity Leakage in Live Forensic Context.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Designing Information Systems Which Manage or Avoid Privacy Incidents.
Proceedings of the Intelligence and Security Informatics, 2008

2007
A Lower Bound on Effective Performance Testing for Digital Forensic Tools.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Monitoring Employees' Emails without Violating Their Privacy Right.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Algebraic Attacks on Clock-Controlled Cascade Ciphers.
Proceedings of the Progress in Cryptology, 2006

Algebraic Attacks on Clock-Controlled Stream Ciphers.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Reproducibility of Digital Evidence in Forensic Investigations.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

2004
Algebraic Attacks Over GF(q).
Proceedings of the Progress in Cryptology, 2004

eCommerce Strategy In A Multi-Sector Trading Environment . Quandaries For SMEs.
Proceedings of the 17th Bled eConference: eGlobal, 2004

2003
Permutations with a distinct difference property.
Discrete Mathematics, 2003

A New Method for Locating the Global Optimum: Application of the Cutting Angle Method to Molecular Structure Prediction.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
Fast Algorithm for the Cutting Angle Method of Global Optimization.
J. Global Optimization, 2002

Security Management: An Information Systems Setting.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Blocking Semiovals of Type (1, m+1, n+1).
SIAM J. Discrete Math., 2001

Broadcast anti-jamming systems.
Computer Networks, 2001

2000
An analysis of Chen's construction of minimum-distance five codes.
IEEE Trans. Information Theory, 2000

Determining sets.
Australasian J. Combinatorics, 2000

1999
Some Sets of Type in Cubic Order Planes.
Des. Codes Cryptography, 1999

1997
Blocking Sets in (v, {2, 4}, 1)-Designs.
Des. Codes Cryptography, 1997

Equitable colourings in the Witt designs.
Australasian J. Combinatorics, 1997

1993
A characterization of finite linear spaces on v points, n2<=v<(n+1)2, andb=n2+n+3 lines, n>=10.
Discrete Mathematics, 1993

The nonexistence of finite linear spaces with v=n2 points and b=n2+n+2 lines.
Discrete Mathematics, 1993

The theory of finite linear spaces - combinatorics of points and lines.
Cambridge University Press, ISBN: 978-0-521-33317-7, 1993

1991
An extension of Wagner's theorem.
Discrete Mathematics, 1991

1989
Minimally projectively embeddable Steiner systems.
Discrete Mathematics, 1989

1988
Embedding pseudo-complements of quadrics in PG(n, q), n geq 3, q geq 2.
J. Comb. Theory, Ser. A, 1988

1984
Rank functions of closure spaces of finite rank.
Discrete Mathematics, 1984

Embedding the complement of a minimal blocking set in a projective plane.
Discrete Mathematics, 1984

1983
Geodesic subgraphs.
Journal of Graph Theory, 1983


  Loading...