2008 | ||
---|---|---|
38 | EE | Mehdi Kiani, Andrew Clark, George M. Mohay: Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. ARES 2008: 47-55 |
2007 | ||
37 | Christopher Krügel, Richard Lippmann, Andrew Clark: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings Springer 2007 | |
2006 | ||
36 | EE | Rupinder Gill, Jason Smith, Andrew Clark: Specification-Based Intrusion Detection in WLANs. ACSAC 2006: 141-152 |
35 | EE | David Duncombe, George M. Mohay, Andrew Clark: Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. ACSW Frontiers 2006: 135-144 |
34 | EE | Rupinder Gill, Jason Smith, Andrew Clark: Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. ACSW Frontiers 2006: 221-230 |
33 | EE | Jonathon Abbott, Jim Bell, Andrew Clark, Olivier Y. de Vel, George M. Mohay: Automated recognition of event scenarios for digital forensics. SAC 2006: 293-300 |
32 | EE | Bradley Schatz, George M. Mohay, Andrew Clark: A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation 3(Supplement-1): 98-107 (2006) |
2005 | ||
31 | EE | Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd: An Improved Execution Integrity Solution for Mobile Agents. ACISP 2005: 170-183 |
30 | EE | Stig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann: A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. ACSAC 2005: 49-58 |
29 | EE | Lyta Penna, Andrew Clark, George M. Mohay: Challenges of Automating the Detection of Paedophile Activity on the Internet. SADFE 2005: 206-222 |
28 | EE | Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier: The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. SADFE 2005: 89-104 |
27 | EE | Rajiv Chakravorty, Andrew Clark, Ian Pratt: Optimizing Web delivery over wireless links: design, implementation, and experiences. IEEE Journal on Selected Areas in Communications 23(2): 402-416 (2005) |
2004 | ||
26 | Bradley Schatz, George M. Mohay, Andrew Clark: Generalising Event Forensics Across Multiple Domains. Australian Computer, Network & Information Forensics Conference 2004: 136-144 | |
25 | Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew Clark: A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. Cryptographic Algorithms and their Uses 2004: 125-139 | |
24 | Jason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan: Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237 | |
23 | EE | Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth: Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. ICICS 2004: 343-357 |
22 | EE | Chris Wullems, Mark Looi, Andrew Clark: Towards Context-aware Security: An Authorization Architecture for Intranet Environments. PerCom Workshops 2004: 132-137 |
2003 | ||
21 | EE | Nathan Carey, George M. Mohay, Andrew Clark: Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. ACSAC 2003: 245-254 |
20 | George M. Mohay, Kevin Chen, Andrew Clark: ECF - Event Correlation for Forensics. Australian Computer, Network & Information Forensics Conference 2003 | |
19 | EE | Chris Wullems, Mark Looi, Andrew Clark: Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. ISCC 2003: 1251-1258 |
18 | EE | Rajiv Chakravorty, Andrew Clark, Ian Pratt: GPRSWeb: Optimizing the Web for GPRS Links. MobiSys 2003 |
2002 | ||
17 | EE | Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson: The LILI-II Keystream Generator. ACISP 2002: 25-39 |
16 | EE | Nathan Carey, Andrew Clark, George M. Mohay: IDS Interoperability and Correlation Using IDMEF and Commodity Systems. ICICS 2002: 252-264 |
15 | EE | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) |
2000 | ||
14 | Ed Dawson, Andrew Clark, Colin Boyd: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Springer 2000 | |
13 | Lauren May, Lyta Penna, Andrew Clark: An Implementation of Bitsliced DES on the Pentium MMXTM Processor. ACISP 2000: 112-122 | |
12 | Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell: A Three-Party HTTP Proxy to Support Internet Content Regulation. ACISP 2000: 89-96 | |
11 | EE | Ed Dawson, Andrew Clark, Mark Looi: Key management in a non-trusted distributed environment. Future Generation Comp. Syst. 16(4): 319-329 (2000) |
10 | EE | Jovan Dj. Golic, Andrew Clark, Ed Dawson: Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000) |
1999 | ||
9 | EE | William Millan, Andrew Clark, Ed Dawson: Boolean Function Design Using Hill Climbing Methods. ACISP 1999: 1-11 |
8 | EE | Jovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. ACISP 1999: 88-102 |
7 | William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson: Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. ICICS 1999: 263-274 | |
6 | Jovan Dj. Golic, Andrew Clark, Ed Dawson: Inversion Attack and Branching. Australian Computer Journal 31(2): 44-53 (1999) | |
1998 | ||
5 | EE | William Millan, Andrew Clark, Ed Dawson: Heuristic Design of Cryptographically Strong Balanced Boolean Functions. EUROCRYPT 1998: 489-499 |
1997 | ||
4 | William Millan, Andrew Clark, Ed Dawson: An effective genetic algorithm for finding highly nonlinear Boolean Functions. ICICS 1997: 149-158 | |
1996 | ||
3 | Andrew Clark, Jovan Dj. Golic, Ed Dawson: A Comparison of Fast Correlation Attacks. FSE 1996: 145-157 | |
1995 | ||
2 | Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew Clark, Abdollah Khodkar, Ed Dawson: Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200 | |
1994 | ||
1 | Gary Carter, Andrew Clark, Lauren Nielsen: DESV-1: A Variation of the Data Encryption Standard (DES). ASIACRYPT 1994: 427-430 |