dblp.uni-trier.dewww.uni-trier.de

Andrew Clark

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
38EEMehdi Kiani, Andrew Clark, George M. Mohay: Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. ARES 2008: 47-55
2007
37 Christopher Krügel, Richard Lippmann, Andrew Clark: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings Springer 2007
2006
36EERupinder Gill, Jason Smith, Andrew Clark: Specification-Based Intrusion Detection in WLANs. ACSAC 2006: 141-152
35EEDavid Duncombe, George M. Mohay, Andrew Clark: Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. ACSW Frontiers 2006: 135-144
34EERupinder Gill, Jason Smith, Andrew Clark: Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. ACSW Frontiers 2006: 221-230
33EEJonathon Abbott, Jim Bell, Andrew Clark, Olivier Y. de Vel, George M. Mohay: Automated recognition of event scenarios for digital forensics. SAC 2006: 293-300
32EEBradley Schatz, George M. Mohay, Andrew Clark: A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation 3(Supplement-1): 98-107 (2006)
2005
31EEMichelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd: An Improved Execution Integrity Solution for Mobile Agents. ACISP 2005: 170-183
30EEStig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann: A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. ACSAC 2005: 49-58
29EELyta Penna, Andrew Clark, George M. Mohay: Challenges of Automating the Detection of Paedophile Activity on the Internet. SADFE 2005: 206-222
28EEJacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier: The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. SADFE 2005: 89-104
27EERajiv Chakravorty, Andrew Clark, Ian Pratt: Optimizing Web delivery over wireless links: design, implementation, and experiences. IEEE Journal on Selected Areas in Communications 23(2): 402-416 (2005)
2004
26 Bradley Schatz, George M. Mohay, Andrew Clark: Generalising Event Forensics Across Multiple Domains. Australian Computer, Network & Information Forensics Conference 2004: 136-144
25 Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew Clark: A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. Cryptographic Algorithms and their Uses 2004: 125-139
24 Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan: Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237
23EEMichelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth: Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. ICICS 2004: 343-357
22EEChris Wullems, Mark Looi, Andrew Clark: Towards Context-aware Security: An Authorization Architecture for Intranet Environments. PerCom Workshops 2004: 132-137
2003
21EENathan Carey, George M. Mohay, Andrew Clark: Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. ACSAC 2003: 245-254
20 George M. Mohay, Kevin Chen, Andrew Clark: ECF - Event Correlation for Forensics. Australian Computer, Network & Information Forensics Conference 2003
19EEChris Wullems, Mark Looi, Andrew Clark: Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. ISCC 2003: 1251-1258
18EERajiv Chakravorty, Andrew Clark, Ian Pratt: GPRSWeb: Optimizing the Web for GPRS Links. MobiSys 2003
2002
17EEAndrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson: The LILI-II Keystream Generator. ACISP 2002: 25-39
16EENathan Carey, Andrew Clark, George M. Mohay: IDS Interoperability and Correlation Using IDMEF and Commodity Systems. ICICS 2002: 252-264
15EEJuan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002)
2000
14 Ed Dawson, Andrew Clark, Colin Boyd: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Springer 2000
13 Lauren May, Lyta Penna, Andrew Clark: An Implementation of Bitsliced DES on the Pentium MMXTM Processor. ACISP 2000: 112-122
12 Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell: A Three-Party HTTP Proxy to Support Internet Content Regulation. ACISP 2000: 89-96
11EEEd Dawson, Andrew Clark, Mark Looi: Key management in a non-trusted distributed environment. Future Generation Comp. Syst. 16(4): 319-329 (2000)
10EEJovan Dj. Golic, Andrew Clark, Ed Dawson: Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000)
1999
9EEWilliam Millan, Andrew Clark, Ed Dawson: Boolean Function Design Using Hill Climbing Methods. ACISP 1999: 1-11
8EEJovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. ACISP 1999: 88-102
7 William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson: Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. ICICS 1999: 263-274
6 Jovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. Australian Computer Journal 31(2): 44-53 (1999)
1998
5EEWilliam Millan, Andrew Clark, Ed Dawson: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. EUROCRYPT 1998: 489-499
1997
4 William Millan, Andrew Clark, Ed Dawson: An effective genetic algorithm for finding highly nonlinear Boolean Functions. ICICS 1997: 149-158
1996
3 Andrew Clark, Jovan Dj. Golic, Ed Dawson: A Comparison of Fast Correlation Attacks. FSE 1996: 145-157
1995
2 Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson: Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200
1994
1 Gary Carter, Andrew Clark, Lauren Nielsen: DESV-1: A Variation of the Data Encryption Standard (DES). ASIACRYPT 1994: 427-430

Coauthor Index

1Jonathon Abbott [33]
2Stig Andersson [30]
3Paul Ashley [12]
4Jim Bell [33]
5Colin Boyd [14] [15]
6L. Burnett [7]
7Nathan Carey [16] [21]
8Gary Carter [1] [7]
9Rajiv Chakravorty [18] [27]
10Kevin Chen [20]
11Marc Dacier [28]
12Ed Dawson [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [14] [15] [17]
13David Duncombe [35]
14Joanne Fuller [17]
15Gary Gaskell [12]
16Michelangelo Giansiracusa [23] [31]
17Rupinder Gill [34] [36]
18Jovan Dj. Golic [2] [3] [6] [8] [10] [17]
19John Hynd [31]
20Abdollah Khodkar [2]
21Mehdi Kiani [38]
22Christopher Krügel (Christopher Kruegel) [37]
23Hoon Jae Lee [17]
24Richard Lippmann [37]
25Mark Looi [11] [12] [19] [22] [25]
26Lauren May [13]
27William Millan [4] [5] [7] [9] [17]
28George M. Mohay [16] [20] [21] [26] [28] [29] [30] [32] [33] [35] [38]
29Sang-Jae Moon [17]
30Lauren Nielsen [1]
31Juan Manuel González Nieto (Juanma González Nieto) [15] [24]
32Lyta Penna [13] [29]
33Fabien Pouget [28]
34Agung Prasetijo [12]
35Ian Pratt (Ian A. Pratt) [18] [27]
36Jason Reid [24]
37Volker Roth [23]
38Selwyn Russell [23] [31]
39Mahmoud Salmasizadeh [2]
40Bradley Schatz [26] [30] [32]
41Leone Simpson [17]
42Jason Smith [24] [34] [36]
43Harikrishna Vasanta [25]
44Olivier Y. de Vel [33]
45Kapali Viswanathan [15] [24]
46Chris Wullems [19] [22] [25]
47Jacob Zimmermann [28] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)