2008 |
38 | EE | Mehdi Kiani,
Andrew Clark,
George M. Mohay:
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks.
ARES 2008: 47-55 |
2007 |
37 | | Christopher Krügel,
Richard Lippmann,
Andrew Clark:
Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings
Springer 2007 |
2006 |
36 | EE | Rupinder Gill,
Jason Smith,
Andrew Clark:
Specification-Based Intrusion Detection in WLANs.
ACSAC 2006: 141-152 |
35 | EE | David Duncombe,
George M. Mohay,
Andrew Clark:
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS.
ACSW Frontiers 2006: 135-144 |
34 | EE | Rupinder Gill,
Jason Smith,
Andrew Clark:
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.
ACSW Frontiers 2006: 221-230 |
33 | EE | Jonathon Abbott,
Jim Bell,
Andrew Clark,
Olivier Y. de Vel,
George M. Mohay:
Automated recognition of event scenarios for digital forensics.
SAC 2006: 293-300 |
32 | EE | Bradley Schatz,
George M. Mohay,
Andrew Clark:
A correlation method for establishing provenance of timestamps in digital evidence.
Digital Investigation 3(Supplement-1): 98-107 (2006) |
2005 |
31 | EE | Michelangelo Giansiracusa,
Selwyn Russell,
Andrew Clark,
John Hynd:
An Improved Execution Integrity Solution for Mobile Agents.
ACISP 2005: 170-183 |
30 | EE | Stig Andersson,
Andrew Clark,
George M. Mohay,
Bradley Schatz,
Jacob Zimmermann:
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX.
ACSAC 2005: 49-58 |
29 | EE | Lyta Penna,
Andrew Clark,
George M. Mohay:
Challenges of Automating the Detection of Paedophile Activity on the Internet.
SADFE 2005: 206-222 |
28 | EE | Jacob Zimmermann,
Andrew Clark,
George M. Mohay,
Fabien Pouget,
Marc Dacier:
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
SADFE 2005: 89-104 |
27 | EE | Rajiv Chakravorty,
Andrew Clark,
Ian Pratt:
Optimizing Web delivery over wireless links: design, implementation, and experiences.
IEEE Journal on Selected Areas in Communications 23(2): 402-416 (2005) |
2004 |
26 | | Bradley Schatz,
George M. Mohay,
Andrew Clark:
Generalising Event Forensics Across Multiple Domains.
Australian Computer, Network & Information Forensics Conference 2004: 136-144 |
25 | | Chris Wullems,
Harikrishna Vasanta,
Mark Looi,
Andrew Clark:
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Cryptographic Algorithms and their Uses 2004: 125-139 |
24 | | Jason Reid,
Andrew Clark,
Juan Manuel González Nieto,
Jason Smith,
Kapali Viswanathan:
Denial of Service Issues in Voice Over IP Networks.
ICETE (2) 2004: 230-237 |
23 | EE | Michelangelo Giansiracusa,
Selwyn Russell,
Andrew Clark,
Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
ICICS 2004: 343-357 |
22 | EE | Chris Wullems,
Mark Looi,
Andrew Clark:
Towards Context-aware Security: An Authorization Architecture for Intranet Environments.
PerCom Workshops 2004: 132-137 |
2003 |
21 | EE | Nathan Carey,
George M. Mohay,
Andrew Clark:
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS.
ACSAC 2003: 245-254 |
20 | | George M. Mohay,
Kevin Chen,
Andrew Clark:
ECF - Event Correlation for Forensics.
Australian Computer, Network & Information Forensics Conference 2003 |
19 | EE | Chris Wullems,
Mark Looi,
Andrew Clark:
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location.
ISCC 2003: 1251-1258 |
18 | EE | Rajiv Chakravorty,
Andrew Clark,
Ian Pratt:
GPRSWeb: Optimizing the Web for GPRS Links.
MobiSys 2003 |
2002 |
17 | EE | Andrew Clark,
Ed Dawson,
Joanne Fuller,
Jovan Dj. Golic,
Hoon Jae Lee,
William Millan,
Sang-Jae Moon,
Leone Simpson:
The LILI-II Keystream Generator.
ACISP 2002: 25-39 |
16 | EE | Nathan Carey,
Andrew Clark,
George M. Mohay:
IDS Interoperability and Correlation Using IDMEF and Commodity Systems.
ICICS 2002: 252-264 |
15 | EE | Juan Manuel González Nieto,
Kapali Viswanathan,
Colin Boyd,
Andrew Clark,
Ed Dawson:
Key recovery for the commercial environment.
Int. J. Inf. Sec. 1(3): 161-174 (2002) |
2000 |
14 | | Ed Dawson,
Andrew Clark,
Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings
Springer 2000 |
13 | | Lauren May,
Lyta Penna,
Andrew Clark:
An Implementation of Bitsliced DES on the Pentium MMXTM Processor.
ACISP 2000: 112-122 |
12 | | Agung Prasetijo,
Paul Ashley,
Mark Looi,
Andrew Clark,
Gary Gaskell:
A Three-Party HTTP Proxy to Support Internet Content Regulation.
ACISP 2000: 89-96 |
11 | EE | Ed Dawson,
Andrew Clark,
Mark Looi:
Key management in a non-trusted distributed environment.
Future Generation Comp. Syst. 16(4): 319-329 (2000) |
10 | EE | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Generalized Inversion Attack on Nonlinear Filter Generators.
IEEE Trans. Computers 49(10): 1100-1109 (2000) |
1999 |
9 | EE | William Millan,
Andrew Clark,
Ed Dawson:
Boolean Function Design Using Hill Climbing Methods.
ACISP 1999: 1-11 |
8 | EE | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Inversion Attack and Branching.
ACISP 1999: 88-102 |
7 | | William Millan,
L. Burnett,
Gary Carter,
Andrew Clark,
Ed Dawson:
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes.
ICICS 1999: 263-274 |
6 | | Jovan Dj. Golic,
Andrew Clark,
Ed Dawson:
Inversion Attack and Branching.
Australian Computer Journal 31(2): 44-53 (1999) |
1998 |
5 | EE | William Millan,
Andrew Clark,
Ed Dawson:
Heuristic Design of Cryptographically Strong Balanced Boolean Functions.
EUROCRYPT 1998: 489-499 |
1997 |
4 | | William Millan,
Andrew Clark,
Ed Dawson:
An effective genetic algorithm for finding highly nonlinear Boolean Functions.
ICICS 1997: 149-158 |
1996 |
3 | | Andrew Clark,
Jovan Dj. Golic,
Ed Dawson:
A Comparison of Fast Correlation Attacks.
FSE 1996: 145-157 |
1995 |
2 | | Jovan Dj. Golic,
Mahmoud Salmasizadeh,
Andrew Clark,
Abdollah Khodkar,
Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks.
Cryptography: Policy and Algorithms 1995: 186-200 |
1994 |
1 | | Gary Carter,
Andrew Clark,
Lauren Nielsen:
DESV-1: A Variation of the Data Encryption Standard (DES).
ASIACRYPT 1994: 427-430 |