| 2009 |
| 7 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Markus Hagenbuchner,
Willy Susilo,
Jeffrey Horton,
Sweah Liang Yong,
Ah Chung Tsoi:
Ranking Attack Graphs with Graph Neural Networks.
ISPEC 2009: 345-359 |
| 2007 |
| 6 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
ACNS 2007: 65-86 |
| 5 | EE | Liang Lu,
Jeffrey Horton,
Reihaneh Safavi-Naini,
Willy Susilo:
Transport Layer Identification of Skype Traffic.
ICOIN 2007: 465-481 |
| 2006 |
| 4 | EE | Jeffrey Horton,
Reihaneh Safavi-Naini:
Detecting Policy Violations through Traffic Analysis.
ACSAC 2006: 109-120 |
| 2005 |
| 3 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
On Securing RTP-Based Streaming Content with Firewalls.
CANS 2005: 304-319 |
| 1999 |
| 2 | EE | Jeffrey Horton,
Jennifer Seberry:
Companion Viruses and the Macintosh: Threats and Countermeasures.
ACISP 1999: 202-212 |
| 1998 |
| 1 | EE | Jeffrey Horton,
Jennifer Seberry:
Covert Distributed Computing Using Java Through Web Spoofing.
ACISP 1998: 48-57 |