2009 |
7 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Markus Hagenbuchner,
Willy Susilo,
Jeffrey Horton,
Sweah Liang Yong,
Ah Chung Tsoi:
Ranking Attack Graphs with Graph Neural Networks.
ISPEC 2009: 345-359 |
2007 |
6 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme.
ACNS 2007: 65-86 |
5 | EE | Liang Lu,
Jeffrey Horton,
Reihaneh Safavi-Naini,
Willy Susilo:
Transport Layer Identification of Skype Traffic.
ICOIN 2007: 465-481 |
2006 |
4 | EE | Jeffrey Horton,
Reihaneh Safavi-Naini:
Detecting Policy Violations through Traffic Analysis.
ACSAC 2006: 109-120 |
2005 |
3 | EE | Liang Lu,
Reihaneh Safavi-Naini,
Jeffrey Horton,
Willy Susilo:
On Securing RTP-Based Streaming Content with Firewalls.
CANS 2005: 304-319 |
1999 |
2 | EE | Jeffrey Horton,
Jennifer Seberry:
Companion Viruses and the Macintosh: Threats and Countermeasures.
ACISP 1999: 202-212 |
1998 |
1 | EE | Jeffrey Horton,
Jennifer Seberry:
Covert Distributed Computing Using Java Through Web Spoofing.
ACISP 1998: 48-57 |