QUT ePrints

Past > Institutes > Information Security Institute

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items at this level: 741.

Book

Jung, Hoe-Kyung, Tae Kim, Jung, Sahama, Tony, & Yang, Chung-Huang (Eds.) (2013) Future Information Communication Technology and Applications : ICFICE 2013. Lecture Notes in Electrical Engineering, 235. Springer, Germany Berlin Heidelberg.

Butler-Henderson, Kerryn & Sahama, Tony (Eds.) (2011) Proceedings of the Fourth Australasian Workshop on Health Informatics and Knowledge Management [Volume 120]. Australian Computer Society, Inc. , Darlinghurst, NSW.

Dawson, Edward P., Duncan, William D., Christensen, Sharon A., Black, Peter J., Foo, Ernest, Du, Rong, et al. (2006) eTendering - Security and Legal Issues. Cooperative Research Centre for Construction Innovation, for Icon.Net Pty Ltd., Brisbane. (Unpublished)
Number of full-text downloads 1,183

Book Chapter

Baker, Brendan J., Vogt, Robert J., McLaren, Mitchell L., & Sridharan, Sridha (2009) Scatter difference NAP for SVM speaker recognition. In Massimo, Tistarelli & Nixon, Mark S. (Eds.) Advances in Biometrics : Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings. Springer , Berlin Heidelberg, pp. 464-473.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.

Camtepe, Seyit A. & Yener, Bulent (2008) Key Management in Wireless Sensor Networks. In Lopez , Javier & Zhou, Jianying (Eds.) Wireless Sensor Network Security. IOS Press, pp. 110-141.

Dawson, Ed, Henricksen, Matthew, & Simpson, Leonie (2008) The Dragon stream cipher: Design, analysis and implementation issues. In Robshaw, M & OBillet, O (Eds.) New Stream Cipher Designs: The eSTREAM Finalists. Springer, Germany, Heidelberg, pp. 20-38.

Flew, Terry, Leisten, Susanna H., & Hearn, Gregory N. (2006) Alternative systems for Intellectual Property in the digital age. In Servaes, Jan & Thomas, Pradip (Eds.) Intellectual Property Rights Communication in Asia: Conflicting Traditions. SAGE Publications, New Delhi, India, pp. 226-240.
Number of full-text downloads 512

Fookes, Clinton, Maeder, Anthony, Sridharan, Sridha, & Mamic, George (2010) Gaze based personal identification. In Behavioral Biometrics for Human Identification: Intelligent Applications. IGI Global.

Himawan, Ivan, Mccowan, Iain, & Lincoln, Mike (2008) Microphone array beamforming approach to blind speech separation. In Popescu-Belis, Andrei, Renals, Steve, & Bourlard, Hervé (Eds.) Machine Learning for Multimodal Interaction. Springer Berlin, pp. 295-308.
Number of citations in Scopus 4
Number of citations in Web of Science® 3

Lucey, Patrick, Potamianos, Gerasimos, & Sridharan, Sridha (2008) Visual speech recognition across multiple views. In Liew, A & Wang, S (Eds.) Visual Speech Recognition. Lip Segmentation and Mapping. Information Science Reference (IGI Global), United States of America, Pennsylvania, Hershey, pp. 294-325.

McLaren, Mitchell L., Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2009) Data-driven impostor selection for T-norm score normalisation and the background dataset in SVM-based speaker verification. In Massimo, Tistarelli & Nixon, Mark S. (Eds.) Advances in Biometrics : Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings. Springer , Berlin Heidelberg, pp. 474-483.
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Ryan, David, Denman, Simon, Sridharan, Sridha, & Fookes, Clinton B. (2012) Scene invariant crowd counting and crowd occupancy analysis. In Video Analytics for Business Intelligence [Studies in Computational Intelligence, Volume 409]. Springer-Verlag, Germany, pp. 161-198.
Number of citations in Scopus 1

Willis, Jenny, Sahama, Tony, & Hargreaves, Megan (2010) Assessing performance and capability in work placements. In Jackson, Norman (Ed.) Learning to be Professional through a Higher Education e-book. University of Surrey, Guildford, Surrey, England, UK, pp. 1-15.
Number of full-text downloads 62

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Journal Article

Acar, Evrim, Camtepe, Seyit A., Krishnamoorthy, Mukkai S., & Yener, Bulent (2005) Modeling and multiway analysis of chatroom tensors. Lecture Notes in Computer Science : Intelligence and Security Informatics, 3495, pp. 256-268.
Number of citations in Scopus 23
Number of citations in Web of Science® 21

Acar, Evrim, Camtepe, Seyit A., & Yener, Bulent (2006) Collective sampling and analysis of high order tensors for chatroom communications. Lecture Notes in Computer Science : Intelligence and Security Informatics, 3975, pp. 213-224.
Number of citations in Scopus 10
Number of citations in Web of Science® 9

Acharya, Rajendra, Chandran, Vinod, Chua, K, & Lim, C.M. (2008) Computer-based analysis of cardiac state using entropies, recurrence plots and poincare geometry. Journal of Medical Engineering & Technology, 32(4), pp. 263-272.
Number of citations in Scopus 10

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2005) Two Models of Efficient Mixnet-Based Receipt-Free Voting Using (Threshold) Re-encryption. International Journal of Computer Systems Science & Engineering, 20(6), pp. 463-472.

Ahmed, Irfan & Lhee, Kyung-suk (2011) Classification of packet contents for malware detection. Journal in Computer Virology, 7(4), pp. 279-295.
Number of citations in Scopus 2

Al Omari, Loai & Barnes, Paul (2014) IT governance stability in a political changing environment : exploring potential impacts in the public sector. Journal of Information Technology Management, 25(3), pp. 41-55.

Al Omari, Loai, Barnes, Paul H., & Pitman, Grant (2013) A Delphi study into the audit challenges of IT governance in the Australian public sector. electronic Journal of Computer Science and Information Technology, 4(1).
Number of full-text downloads 430

Alhaqbani, Bandar S. & Fidge, Colin J. (2007) Access Control Requirements for Processing Electronic Health Records. Business Process Management Workshops, 4928, pp. 371-382.
Number of full-text downloads 477
Number of citations in Scopus 4

Alhaqbani, Bandar S., Josang, Audun, & Fidge, Colin J. (2009) A medical data reliability assessment model. Journal of Theoretical and Applied Electronic Commerce Research, 4(2), pp. 64-78.
Number of full-text downloads 120
Number of citations in Scopus 3

Annadurai, Suganya, Gauravaram, Praveen, & Hirose, Shoichi (2008) An update on the analysis and design of NMAC and HMAC functions. International Journal of Network Security, 7(1), pp. 49-60.

Baker, Brendan, Martin, Terry, Sridharan, Sridha, & Wong, Eddie (2006) A Syllable-Scale Framework for Language Identification. Computer Speech & Language, 20(2-3), pp. 276-302.
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Bao, Feng, Dawson, Ed, & Peng, Kun (2008) Correct, private, flexible and efficient range test. Journal of Research and Practice in Information Technology, 40(4), pp. 267-281.
Number of full-text downloads 27
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Barnes, Paul H. (2008) Going to Extremes. Fire Risk Management, August, pp. 28-31.
Number of full-text downloads 68

Barnes, Paul H., Charles, Michael B., Branagan, Mark A., & Knight, Alistair (2007) Intelligence and Anticipation: Issues in Security, Risk and Crisis Management. International Journal of Risk Assessment & Management, 7(8), pp. 1209-1223.
Number of full-text downloads 461

Batyuk, Leonid, Schmidt, Aubrey-Derrick, Schmidt, Hans-Gunther, Camtepe, Seyit A., & Albayrak, Sahin (2009) Developing and benchmarking native Linux applications on Android. MobileWireless Middleware, Operating Systems, and Applications: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 7, pp. 381-392.
Number of citations in Scopus 11
Number of citations in Web of Science® 7

Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243.
Number of full-text downloads 106
Number of citations in Scopus 22
Number of citations in Web of Science® 25

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. International Journal of Applied Cryptography, 1, pp. 181-199.
Number of full-text downloads 108
Number of citations in Scopus 19

Boyd, Colin, Cliff, Yvonne, & Tin, Yiu (2006) Password Based Server Aided Key Exchange. Applied Cryptography and Network Security (LNCS), 3989, pp. 146-161.
Number of full-text downloads 101
Number of citations in Scopus 6
Number of citations in Web of Science® 5

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 145
Number of citations in Scopus 3

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 70
Number of citations in Scopus 13
Number of citations in Web of Science® 10

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 115
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Boyd, Colin, Du, Rong, & Foo, Ernest (2008) Designing a secure e-tender submission protocol. Electronic Commerce Research, 8(3), pp. 115-142.
Number of citations in Scopus 1

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, Kim, Hwan-Koo, Moon, Sang-Jae, & Park, Jea-Hoon (2007) HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System. Lecture Notes in Computer Science, 4809, pp. 557-567.

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, & Moon, Sang-Jae (2007) Low Cost and Strong-Security RFID Authentication Protocol. Lecture Notes in Computer Science, 4809, pp. 795-807.
Number of citations in Scopus 10
Number of citations in Web of Science® 13

Boyd, Colin, Gonzalez Nieto, Juan, Okamoto, Eiji, Okamoto, Takeshi, & Tso, Raylin (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Number of citations in Web of Science® 2

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Number of full-text downloads 43
Number of citations in Scopus 1

Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Burdon, Mark (2009) Commercializing public sector information : privacy and security concerns. IEEE Technology and Society Magazine, 28(1), pp. 34-40.
Number of full-text downloads 234
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Burdon, Mark (2010) Contextualizing the tensions and weaknesses of information privacy and data breach notification laws. Santa Clara Computer and High Technology Law Journal, 27(1), pp. 63-129.
Number of full-text downloads 172

Burdon, Mark (2009) Privacy invasive geo-mashups : privacy 2.0 and the limits of first generation information privacy laws. University of Illinois Journal of Law Technology & Policy, 2010(1), pp. 1-50.

Burdon, Mark, Lane, William B., & von Nessen, Paul (2010) The mandatory notification of data breaches : issues arising for Australian and EU legal developments. Computer Law & Security Review, 26(2), pp. 115-129.
Number of full-text downloads 115
Number of citations in Scopus 3

Burdon, Mark, Reid, Jason F., & Low, Rouhshi (2010) Encryption safe harbours and data breach notification laws. Computer Law and Security Review, 26(5), pp. 520-534.
Number of full-text downloads 131
Number of citations in Scopus 2

Burdon, Mark & Telford, Paul W. (2010) The Conceptual Basis of Personal Information in Australian Privacy Law. ELaw Journal, 17(1), pp. 1-27.
Number of full-text downloads 207

Bye, Rainer, Luther, Katja, Camtepe, Seyit A., Alpcan, Tansu, Albayrak, Sahin, & Yener, Bulent (2007) Decentralized detector generation in cooperative intrusion detection system. Lecture Notes in Computer Science : Stabilization, Safety, and Security of Distributed Systems, 4838, pp. 37-51.
Number of citations in Scopus 1

Caelli, William (2007) Application Security - Myth or Reality? Lecture Notes in Computer Science, 4464, pp. 1-10.

Caelli, William, Gaskell, Gary, Kwok, Lam For, & Longley, Dennis (2006) A Model to Support Information Security Governance. Information Risk Management & Audit Journal, 16(1), pp. 7-24.

Caelli, William, Gaskell, Gary, & Longley, Dennis (2005) High Trust Integrity Controls. Information Risk Management & Audit (IRMS) Journal, 15(3), pp. 5-8.

Camtepe, Seyit A. (2013) Complexity of increasing the secure connectivity in wireless ad hoc networks. Lecture Notes in Computer Science : Information Security and Privacy, 7959, pp. 363-378.
Number of full-text downloads 132

Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.
Number of full-text downloads 94

Camtepe, Seyit A. & Yener, Bulent (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), pp. 346-358.
Number of citations in Scopus 89
Number of citations in Web of Science® 41

Camtepe, Seyit Ahmet, Krishnamoorthy, Mukkai, & Yener, Bulent (2004) A tool for internet chatroom surveillance. Lecture Notes in Computer Science: Intelligence and Security Informatics, 3073, pp. 252-265.
Number of citations in Scopus 4

Chen, Daniel, Mamic, George, Fookes, Clinton B., & Sridharan, Sridha (2009) Scale-space volume descriptors for automatic 3D facial feature extraction. International Journal of Signal Processing, 5(4), pp. 264-269.
Number of full-text downloads 155

Choo, Kim (2006) Revisiting Lee, Kim & Yoo (2005) Authenticated Key Agreement Protocol. International Journal of Network Security (IJNS), 2(1), pp. 64-68.

Christensen, Sharon, Duncan, William, Caelli, Bill, & Georgiades, Jenny (2010) An achilles heel: Denial of service attacks on Australian critical information infrastructures. Information and Communication Technology Law, 19(1), pp. 61-85.

Chua, K.C., Chandran, V., Acharya, R., & Lim, C.M. (2008) Cardiac state diagnosis using higher order spectra of heart rate variability. Journal of Medical Engineering & Technology, 32(2), pp. 145-155.
Number of citations in Scopus 57

Clapperton, Dale M. (2007) The Elusive 'Link' to Infringement in the Copyright Amendment Bill 2006: Now You See It, Now You Don't. Australian Intellectual Property Law Bulletin, 19(9), pp. 141-144.
Number of full-text downloads 397

Clark, Andrew, Dacier, Marc, Mohay, George, Pouget, Fabien, & Zimmermann, Jakub (2006) Internet Attack Knowledge Discovery Via Clusters and Cliques of Attack Traces. Journal of Information Assurance and Security, 1(1), pp. 21-32.

Clutterbuck, Peter, Mohay, George, & Seamons, Owen (2006) Exploring Transport Layer Solutions for Parallelism and Load Balancing Within Internet Services Clusters. International Transactions on Systems Science and Applications, 2(3), pp. 273-280.

Cobb-Moore, Charlotte, Danby, Susan J., & Farrell, Ann (2010) Locking the unlockable : children's invocation of pretense to define and manage place. Childhood, 17(3), pp. 376-395.
Number of full-text downloads 226
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Cohen, Michael, Schatz, Bradley, & Garfinkel, Simson (2009) Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. Digital Investigation, 6(Supplement), S57-S68.
Number of citations in Scopus 6
Number of citations in Web of Science® 6

Cook, Jamie A., Chandran, Vinod, & Sridharan, Sridha (2007) Multi-Scale Representation for 3D Face Recognition. IEEE Transactions on Information Forensics and Security, 2(3), pp. 529-536.
Number of citations in Scopus 7
Number of citations in Web of Science® 3

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the Authors of Suspect Email. .
Number of full-text downloads 1,119

Corones, Stephen & Lane, Bill (2010) Shielding critical infrastructure information- sharing schemes from competition law. Deakin Law Review, 15(1), pp. 1-36.

Costello, Craig, Hisil, Huseyin, Boyd, Colin, Gonzalez Nieto, Juan Manuel, & Wong, Kenneth Koon-Ho (2009) Faster pairings on special Weierstrass curves. Lecture Notes in Computer Science, LNCS 5, pp. 89-101.
Number of full-text downloads 111
Number of citations in Scopus 12
Number of citations in Web of Science® 12

Costello, Craig & Lauter, Kristin (2012) Group law computations on Jacobians of hyperelliptic Curves. Lecture Notes in Computer Science, 7118, pp. 92-117.
Number of full-text downloads 65
Number of citations in Scopus 3

Costello, Craig, Lauter, Kristin, & Naehrig, Michael (2011) Attractive subfamilies of BLS curves for implementing high-security pairings. Lecture Notes in Computer Science : Progress in Cryptology - INDOCRYPT 2011, 7017, pp. 320-342.
Number of full-text downloads 41
Number of citations in Scopus 6
Number of citations in Web of Science® 2

Cradduck, Lucy, Caelli, Bill, & McCullagh, Adrian (2008) Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions. Forum on Public Policy Online, Spring, pp. 1-43.

Croll, Peter R. & Croll, Jasmine (2007) Investigating risk exposure in e-health systems. International Journal of Medical Informatics, 76(5-6), pp. 460-465.
Number of full-text downloads 413
Number of citations in Scopus 17
Number of citations in Web of Science® 5

Cumming, Joy & Dickson, Elizabeth (2007) Equity in Assessment: Discrimination and Disability Issues from an Australian Legal Perspective. Education and the Law, 19(3/4), pp. 201-220.
Number of full-text downloads 97

Davis, Jonathan Jeremy & Clark, Andrew J. (2011) Data preprocessing for anomaly based network intrusion detection : a review. Computers & Security, 30(6-7), pp. 353-375.
Number of citations in Scopus 27
Number of citations in Web of Science® 9

Dawson, Ed, Henricksen, Matthew, Raddum, Havard, & Z'Aba, Muhammad (2008) Bit-pattern based integral attack. Fast Software Encryption (LNCS), 5086, pp. 363-381.
Number of citations in Scopus 14
Number of citations in Web of Science® 14

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) The Legal & Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions. First Monday, 11(1), pp. 17-35.
Number of citations in Scopus 1

Dawson, Edward, Lopez, Javier, Montenegro, Jose, Okamoto, Eiji, & Vivas, Jose (2005) Specification and Design of Advanced Authentication and Authorisation Services. Computer Standards and Interfaces, 27(5), pp. 467-478.
Number of citations in Scopus 17
Number of citations in Web of Science® 13

Dawson, Edward P., Clark, Andrew J., & Looi, Mark H. (2000) Key management in a non-trusted distributed environment. Future Generation Computer Systems, 16(4), pp. 319-329.
Number of full-text downloads 186
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Dean, David B. & Sridharan, Sridha (2010) Dynamic visual features for audio-visual speaker verification. Computer Speech and Language, 24(2), 136 - 149.
Number of full-text downloads 63
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Denman, Simon, Lamb, Todd, Fookes, Clinton B., Chandran, Vinod, & Sridharan, Sridha (2008) Multi-spectral fusion for surveillance systems. Computers and Electrical Engineering.
Number of full-text downloads 112
Number of citations in Scopus 7

Denman, Simon P., Chandran, Vinod, & Sridharan, Sridha (2007) An adaptive optical flow technique for person tracking systems. Pattern Recognition Letters, 28(10), pp. 1232-1239.
Number of full-text downloads 844
Number of citations in Scopus 44
Number of citations in Web of Science® 21

Dickson, Elizabeth (2007) Disability Standards for Education and Reasonable Adjustment in the Tertiary Education Sector. Australian & New Zealand Journal of Law & Education, 12(2), pp. 25-41.

Djamaludin, Chris, Foo, Ernest, & Corke, Peter (2013) Establishing initial trust in autonomous delay tolerant networks without centralised PKI. Computers & Security.
Number of full-text downloads 24
Number of citations in Scopus 1

Foo, Ernest, Looi, Mark, & Tham, Wen Kaye (2006) Ubiquitous Authorization Scheme Based On Device Profile. Emerging Directions in Embedded and Ubiquitous Computing (LNCS 4097), 4097, pp. 312-321.

Fuller, Joanne, Millan, William, & Dawson, Edward (2005) Multi-objective optimisation of bijective s-boxes. New Generation Computing: computing paradigms and computational intelligence, 23(3), pp. 201-218.
Number of citations in Scopus 3

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2011) Sharing with care : an information accountability perspective. IEEE Internet Computing, 15(4), pp. 31-38.
Number of full-text downloads 270
Number of citations in Scopus 11
Number of citations in Web of Science® 2

Gajanayake, Randike, Lane, William B., Iannella, Renato, & Sahama, Tony R. (2013) Accountable-eHealth systems : the next step forward for privacy. Electronic Journal of Health Informatics. (In Press)

Gajanayake, Randike, Sahama, Tony R., & Iannella, Renato (2014) Access control requirements for accountable-eHealth systems. Electronic Journal of Health Informatics. (In Press)

Gajanayake, Randike, Sahama, Tony R., & Iannella, Renato (2013) Principles of information accountability : an eHealth perspective. International Journal of E-Health and Medical Communications. (In Press)

Gajanayake, Randike, Sahama, Tony R., & Iannella, Renato (2013) eHealth in Australia and elsewhere : a comparison and lessons for the near future. Studies in Health Technology and Informatics [Health Informatics: Digital Health Service Delivery - The Future Is Now! Proceedings of the 21st Australian National Health Informatics Conference (HIC 2013)], 188, pp. 26-32.

Gajanayake, Randike, Sahama, Tony R., & Iannella, Renato (2014) The role of perceived usefulness and attitude on electronic health record acceptance. International Journal of E-Health and Medical Communications. (In Press)

Gajanayake, Randike, Sahama, Tony R., Iannella, Renato, & Lane, Bill (2013) Designing an information accountability framework for eHealth. e-Health Technical Committee Newsletter, 2(2).
Number of full-text downloads 75

Gajanayake, Randike, Sahama, Tony R., & Lane, William B. (2013) The role of human factors when evaluating information accountability for eHealth systems. Studies in Health Technology and Informatics [Context Sensitive Health Informatics: Human and Sociotechnical Approaches - Proceedings of the 2013 Context Sensitive Health Informatics Conference], 194, pp. 97-102.

Georgiades, Jenny (2010) Copyright liability for users and distribution. Information and Communication Technology Law, 19(1), pp. 1-26.
Number of citations in Scopus 1

Goebbels, A.F.G., Nicholson, Jan M., Walsh, Kerryann M., & De Vries, Hein (2008) Teachers' reporting of suspected child abuse and neglect: behaviour and determinants. Health Education Research, 23(6), pp. 941-951.
Number of full-text downloads 55
Number of citations in Scopus 14
Number of citations in Web of Science® 10

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Detecting attacks in encrypted networks using secret-sharing schemes. International Journal of Cryptology Research, 2(1), pp. 89-99.
Number of full-text downloads 63

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Number of full-text downloads 473

Goldberg, Ian, Ustaoglu, Berkant, & Stebila, Douglas (2012) Anonymity and one-way authentication in key exchange protocols. Designs, Codes and Cryptography, 67(2), pp. 245-269.
Number of full-text downloads 136
Number of citations in Scopus 5

Golic, Jovan Dj, Clark, Andrew J., & Dawson, Edward P. (2000) Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers, 49(10), pp. 1100-1109.
Number of full-text downloads 180
Number of citations in Scopus 18
Number of citations in Web of Science® 13

Gonzalez Nieto, Juan M., Boyd, Colin A., & Dawson, Edward P. (2005) A Public Key Cryptosystem Based On A Subgroup Membership Problem. Designs, Codes and Cryptography, 36(3), pp. 301-316.
Number of citations in Scopus 9
Number of citations in Web of Science® 2

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2011) Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security, 14(4), 28:1-28:24.
Number of citations in Web of Science® 2

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan Manuel (2007) On the Connection Between Signcryption and One-pass Key Establishment. Cryptography and Coding (LNCS), 4887, pp. 277-301.
Number of full-text downloads 144
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Gray, Elizabeth, Josang, Audun, & Kinateder, Michael (2006) Simplification and Analysis of Transitive Trust Networks. Web Intelligence and Agent Systems, 4(2), pp. 139-161.
Number of citations in Scopus 95

Himawan, Ivan, Mccowan, Iain, & Sridharan, Sridha (2010) Clustered blind beamforming from ad-hoc microphone arrays. IEEE Transactions on Audio, Speech, and Language Processing, 19(4), pp. 661-676.
Number of full-text downloads 308
Number of citations in Scopus 15
Number of citations in Web of Science® 10

Hisil, Huseyin, Carter, Gary P., & Dawson, Edward P. (2007) New Formulae for Efficient Elliptic Curve Arithmetic. Progress in Cryptology – INDOCRYPT 2007 (LNCS), 4859, pp. 138-151.
Number of full-text downloads 587
Number of citations in Scopus 18
Number of citations in Web of Science® 11

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Jacobi quartic curves revisited. Lecture Notes in Computer Science, LNCS 5594, pp. 452-468.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2008) Twisted Edwards curves revisited. Lecture Notes in Computer Science, LNCS 5350, pp. 326-343.
Number of citations in Scopus 29
Number of citations in Web of Science® 16

Jackson, Sheryl (2009) Reflection not rejection: Harnessing the benefits of trial technology. Queensland lawyer, 29(3), pp. 139-157.
Number of full-text downloads 41

Josang, Audun (2002) The consensus operator for combining beliefs. Artificial Intelligence Journal, 142(1-2), pp. 157-170.
Number of full-text downloads 191
Number of citations in Scopus 90
Number of citations in Web of Science® 59

Josang, Audun (2001) A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3), pp. 279-311.
Number of full-text downloads 1,711
Number of citations in Scopus 489
Number of citations in Web of Science® 239

Josang, Audun, Ismail, Roslan, & Boyd, Colin A. (2007) A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), pp. 618-644.
Number of full-text downloads 5,391
Number of citations in Scopus 1,175
Number of citations in Web of Science® 555

Kanagasundaram, A., Dean, D., Sridharan, S., Gonzalez-Dominguez, J., Gonzalez-Rodriguez, J., & Ramos, D. (2014) Improving short utterance i-vector speaker verification using utterance variance modelling and compensation techniques. Speech Communication, 59, pp. 69-82.

Kanagasundaram, Ahilan, Dean, David, Sridharan, Sridha, McLaren, Mitchell L., & Vogt, Robbie (2014) I-vector based speaker recognition using advanced channel compensation techniques. Computer Speech and Language, 28(1), pp. 121-140.

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software, 82(2), pp. 270-273.
Number of citations in Scopus 43
Number of citations in Web of Science® 23

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Computers and Electrical Engineering, 35(1), p. 9.
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35(1), pp. 49-53.
Number of citations in Scopus 27
Number of citations in Web of Science® 11

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 504

Kleinschmidt, Tristan, Sridharan, Sridha, & Mason, Michael W. (2011) The use of phase in complex spectrum subtraction for robust speech recognition. Computer Speech & Language, 25(3), pp. 585-600.
Number of full-text downloads 173
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Lakemond, Ruan, Sridharan, Sridha, & Fookes, Clinton B. (2011) Wide baseline correspondence extraction beyond local features. IET Computer Vision, 5(4), pp. 222-231.
Number of full-text downloads 74
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Lane, Bill, Burdon, Mark, Miller, Evonne, & von Nessen, Paul (2010) Stakeholder perspectives regarding the mandatory notification of Australian data breaches. Media and Arts Law Review, 15(2), pp. 149-168.
Number of full-text downloads 49

Lane, Tim & May, Lauren (2006) A Model for Improving E-Security in Australian Universities. Journal of Theoretical and Applied Electronic Commerce Research (JTAER), 1(2), pp. 90-97.

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) Strongly Secure Certificateless Key Agreement. Lecture Notes in Computer Science (LNCS), 5671, pp. 206-230.
Number of full-text downloads 435
Number of citations in Scopus 16
Number of citations in Web of Science® 14

Liu, Jinzhang, Motta, Nunzio, & Lee, Soonil (2012) Ultraviolet photodetection of flexible ZnO nanowire sheets in polydimethylsiloxane polymer. Beilstein Journal of Nanotechnology, 3, pp. 353-359.
Number of full-text downloads 192
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Liu, Vicky, Caelli, William, & Chen, Yu-Nien Maggie (2013) Using a public key registry for improved trust and scalability in national E-health systems. International Journal of E-Health and Medical Communications, 4(4), pp. 66-83.

Liu, Vicky, May, Lauren J., Caelli, William J., & Croll, Peter R. (2008) Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis. electronic Journal of Health Informatics, 3(1), pp. 1-14.

Low, Rouhshi & Foo, Ernest (2009) The susceptibility of digital signatures to fraud in the National Electronic Conveyancing System : an analysis. Australian Property Law Journal, 17(3), pp. 303-325.
Number of full-text downloads 281

Low, Rouhshi & Griggs, Lynden (2011) Immediate indefeasibility : is it under threat? Australian Property Law Journal, 19(2), pp. 222-230.
Number of full-text downloads 1,307

Lucey, Simon, Navarathna, Rajitha, Ahmed, Ashraf, & Sridharan, Sridha (2012) Fourier Lucas-Kanade Algorithm. IEEE Transactions on Pattern Analysis and Machine Intelligence.
Number of full-text downloads 148
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Maganti, Hari Krishna, Gatica-Perez, Daniel, & McCowan, Iain A. (2007) Speech enhancement and recognition in meetings with an audio–visual sensor array. IEEE Transactions on Audio, Speech and Language Processing, 15(8), 2257 -2269.
Number of full-text downloads 320
Number of citations in Scopus 20
Number of citations in Web of Science® 17

Marrington, Andrew, Baggili, Ibrahim, Mohay, George M., & Clark, Andrew J. (2011) CAT Detect (Computer Activity Timeline Detection) : a tool for detecting inconsistency in computer activity timelines. Digital Investigation, 8(Sup), S52-S61.

Mason, Michael, Sridharan, Sridha, & Vogt, Robert (2010) Making confident speaker verification decisions with minimal speech. IEEE Transactions on Audio, Speech and Language Processing, 18(6), pp. 1182-1192.
Number of citations in Scopus 6
Number of citations in Web of Science® 1

May, Lauren J. & Burdon, Mark (2006) Information protection management structures in Australian E-courts. Journal of Theoretical and Applied Electronic Commerce Research, 1(3), pp. 58-67.

McCool, Christopher, Chandran, Vinod, Sridharan, Sridha, & Fookes, Clinton (2008) 3D face verification using a free-parts approach. Pattern Recognition Letters, 29, pp. 1190-1196.
Number of citations in Scopus 10
Number of citations in Web of Science® 4

McCowan, Iain, Dean, David B., McLaren, Mitchell L., Vogt, Robert J., & Sridharan, Sridha (2011) The delta-phase spectrum with application to voice activity detection and speaker recognition. IEEE Transactions on Audio, Speech, and Language Processing, 19(7), pp. 2026-2038.
Number of full-text downloads 238
Number of citations in Scopus 9
Number of citations in Web of Science® 4

McCowan, Iain, Lincoln, Mike, & Himawan, Ivan (2008) Microphone array shape calibration in diffuse noise fields. IEEE Transactions on Audio, Speech, and Language Processing, 16(3), pp. 666-670.
Number of citations in Scopus 29
Number of citations in Web of Science® 14

McLaren, Mitchell L., Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2010) Data-driven background dataset selection for SVM-based speaker verification. IEEE Transactions on Audio, Speech and Language Processing, 18(6), pp. 1496-1506.
Number of full-text downloads 99
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Mcardle, Felicity A. & Black, Alison L. (2006) Editorial. The Australian Journal of Early Childhood, 31(2), i-ii.
Number of full-text downloads 232

Mclaren, Mitchell, Vogt, Robert, Baker, Brendan, & Sridharan, Sridha (2010) A comparison of session variability compensation approaches for speaker verification. IEEE Transactions on Information Forensics and Security, 5(4), pp. 802-809.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Muhlbauer, Adam, Salim, Farzad, Safavi-Naini, Reihaneh, Sheppard, Nicholas P., & Surminen, Martin (2008) Location constraints in digital rights management. Computer Communications, 31(6), pp. 1173-1180.
Number of full-text downloads 107
Number of citations in Scopus 9
Number of citations in Web of Science® 1

Nguyen, Anthony, Chandran, Vinod, & Sridharan, Sridha (2006) Gaze-J2K: Gaze-influenced image voding using eye trackers and JPEG 2000. Journal of Telecommunications and Information Technology, 1, pp. 1-8.

Nyeem, Hussain, Wageeh, Boles, & Boyd, Colin (2013) A review of medical image watermarking requirements for teleradiology. Journal of Digital Imaging, 26(2), pp. 326-343.
Number of full-text downloads 29
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 14
Number of citations in Web of Science® 6

Peng, Kun, Dawson, Ed, & Bao, Feng (2011) Modification and optimisation of a shuffling scheme : stronger security, formal analysis and higher efficiency. International Journal of Information Security, 10(1), pp. 33-47.
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2009) On a taxonomy of delegation. Computers & Security, 29(5), pp. 565-579.
Number of full-text downloads 90
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Raddum, Havard & Semaev, Igor (2008) Solving MRHS linear equations. Designs, Codes and Cryptography, 49(1-3), pp. 147-160.

Ryan, David, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2014) Scene invariant multi camera crowd counting. Pattern Recognition Letters, 44, pp. 98-112.

Salehi Shahraki, Ahmad, Sayyadi, Hamed, Hussein Amri, Mohamad, & Nikmaram, Mehrnaz (2013) Survey : video forensic tools. Journal of Theoretical and Applied Information Technology, 47(1), pp. 98-107.

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) Towards authorisation models for secure information sharing : a survey and research agenda. ISeCure, The ISC International Journal of Information Security, 2(2), pp. 69-87.
Number of full-text downloads 269

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) Access control : allocating resources to selfish agents. SPECIAL ISSUE ON DECISION AND GAME THEORY FOR SECURITY, 6(4), pp. 18-21.

Schatz, Bradley, Mohay, George, & Clark, Andrew (2005) Generalising event correlation across multiple domains. Journal of Information Warfare, 4(1), pp. 69-79.

Schatz, Bradley, Mohay, George M., & Clark, Andrew J. (2006) A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation, 3(Supplement 1), S98-S107.
Number of full-text downloads 337
Number of citations in Scopus 15

Schmidt, Aubrey-Derrick, Peters, Frank, Lamour, Florian, Scheel, Christian, Camtepe, Seyit A., & Albayrak, Sahin (2009) Monitoring smartphones for anomaly detection. Mobile Networks and Applications, 14(1), pp. 92-106.
Number of citations in Scopus 25
Number of citations in Web of Science® 12

Schmidt, Desmond (2012) The role of markup in the digital humanities. Historical Social Research, 37(3), pp. 125-146.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Schmidt, Desmond & Fiormonte, Domenico (2010) Multi-version documents : A digitisation solution for textual cultural artefacts. Intelligenza artificiale, IV(1), pp. 57-61.
Number of full-text downloads 203

Schmidt, Desmond Allan (2010) The inadequacy of embedded markup for cultural heritage texts. Literary and Linguistic Computing, 25(3), pp. 337-356.
Number of full-text downloads 251
Number of citations in Scopus 9
Number of citations in Web of Science® 3

Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Number of citations in Scopus 8
Number of citations in Web of Science® 1

Shen, Pei Yuan, Tang, Maolin, Liu, Vicky, & Caelli, William (2012) Performance and scalability assessment for non-certificate-based public key management in VANETS. International Journal of Information Security and Privacy, 6(1), pp. 33-56.
Number of citations in Scopus 1

Simpson, Leonie & Boztas, Serdar (2012) State cycles, initialization and the Trivium stream cipher. Cryptography and Communications, 4(3-4), pp. 245-258.

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 194
Number of citations in Scopus 5

Stebila, Douglas & Ustaoglu, Berkant (2009) Towards denial-of-service-resilient key agreement protocols. Information Security and Privacy (LNCS), 5594, pp. 389-406.
Number of full-text downloads 193
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2009) A User-centric Federated Single Sign-on System. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Number of full-text downloads 438
Number of citations in Scopus 24
Number of citations in Web of Science® 14

Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Number of full-text downloads 114

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. International Journal of Cryptology Research, 2(1), pp. 27-37.
Number of full-text downloads 116

Thorpe, Karen J., Rutter, Michael, & Greenwood, Rosemary (2003) Twins as a Natural Experiment to Study the Cause of Language Delay: II: Family Interaction Risk Factors. Journal of Child Psychology and Psychiatry, 44(3), pp. 342-355.
Number of citations in Scopus 60
Number of citations in Web of Science® 55

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Toward Non-parallelizable Client Puzzles. Cryptology and Network Security (LNCS), 4856, pp. 247-264.
Number of full-text downloads 621
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Vidas, Stephen, Lakemond, Ruan, Denman, Simon, Fookes, Clinton B., Sridharan, Sridha, & Wark, Tim (2012) A mask-based approach for the geometric calibration of thermal-infrared cameras. IEEE Transactions on Instrumentation and Measurement, 61(6), pp. 1625-1635.
Number of full-text downloads 643
Number of citations in Scopus 14
Number of citations in Web of Science® 7

Viet Triem Tong, Valérie, Clark, Andrew J., & Mé, Ludovic (2010) Specifying and enforcing a fine-grained information flow policy : model and experiments. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1), pp. 56-71.
Number of full-text downloads 194

Vogt, Robert J. & Sridharan, Sridha (2008) Explicit Modelling of Session Variability for Speaker Verification. Computer Speech & Language, 22(1), pp. 17-38.
Number of full-text downloads 586
Number of citations in Scopus 45
Number of citations in Web of Science® 32

Wallace, R., Baker, B., Vogt, R., & Sridharan, S. (2011) Discriminative optimisation of the figure of merit for phonetic spoken term detection. IEEE Transactions on Audio, Speech, and Language Processing, 19(6), pp. 1677-1687.
Number of full-text downloads 158
Number of citations in Web of Science® 1

Wang, David, Vogt, Robert J., & Sridharan, Sridha (2013) Eigenvoice modeling for cross likelihood ratio based speaker clustering : a Bayesian approach. Computer Speech and Language, 27(4), pp. 1011-1027.
Number of full-text downloads 22

Wong, Kok Loon & Barnes, Paul H. (2011) Enhancing business continuity management capacities in the insurance industry : a Southeast Asian perspective. International Journal of Business Continuity and Risk Management, 2(2), pp. 139-166.

Z'aba, Muhammad Reza, Wong, Kenneth Koon-Ho, Dawson, Edward Pyle, & Simpson, Leonie Ruth (2010) Algebraic analysis of small Scale LEX-BES. International Journal of Cryptology Research, 2(1), pp. 51-62.

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 2,686
Number of citations in Scopus 148
Number of citations in Web of Science® 67

Conference Paper

ALMashrafi, Mufeed, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) Analysis of indirect message injection for MAC generation using stream ciphers. In Susilo, Willy, Mu, Yi, & Seberry, Jennifer (Eds.) Information Security and Privacy (LNCS), Springer, University of Wollongong, Wollongong, NSW, pp. 138-151.
Number of full-text downloads 50

Afara, Isaac O., Sahama, Tony R., & Oloyede, Adekunle (2013) Near infrared for non-destructive testing of articular cartilage. In Nondestructive Testing of Materials and Structures: Proceedings of NDTMS-2011 [RILEM Bookseries, 2013, Volume 6], Springer , Istanbul, Turkey, pp. 399-404.
Number of full-text downloads 174

Agudo, Isaac, Dawson, Edward, Lopez, Javier, Montenegro, Jose, & Okamoto, Eiji (2005) Delegation Perspective of Practical Authorization Schemes. In Furnell, S, Dowland, P, & Kormentzas, G (Eds.) Proceedings of the Fifth International Network Conference - INC2005, July 2005, Greece, Samos Island.

Ahmad Khalid, Shamsul K., Zimmermann, Jacob, Fidge, Colin J., & Corney, Diane (2010) Automatic generation of assertions to detect potential security vulnerabilities in C programs that use union and pointer types. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) Proceedings of 2010 Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne, pp. 351-357.
Number of full-text downloads 120

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 286

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 135
Number of citations in Scopus 2

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 428
Number of citations in Scopus 9
Number of citations in Web of Science® 3

Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland. (In Press)
Number of full-text downloads 298
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Ahmed, Ejaz, Samad, Kashan, & Mahmood, Waqar (2006) Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks. In 5th Conference, AusCERT2006 Gold Coast, Australia, May 2006 Proceedings, Gold Coast, Australia.
Number of full-text downloads 249

Ahmed, Irfan, Lhee, Kyung-Suk, Shin, Hyun-Jung, & Hong, Man-Pyo (2011) Fast content-based file type identification. In Sujeet, Shenoi & Peterson, Bert (Eds.) 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, January 30 - February 2, 2011, Orlando, Florida.

Al Fayyadh, Bander & Josang, Audun (2008) Robust WYSIWYS: A method of ensuring that what you see is what you sign. In Brankovic, L & Miller, M (Eds.) Information Security 2008, 22-25 January 2008, Australia, New South Wales, Wollongong.

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Cascade Ciphers. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.
Number of citations in Web of Science® 4

Al Hinai, Sultan, Batten, Lynn, Colbert, Bernard, & Wong, Kenneth (2006) Algebraic Attacks on Clock-Controlled Stream Ciphers. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 8
Number of citations in Web of Science® 11

Al Mashrafi, Mufeed (2011) A different algebraic analysis of the ZUC stream cipher. In Proceedings of the 4th International Conference on Security of Information and Networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 191-198.
Number of full-text downloads 187

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth, Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
Number of full-text downloads 69

Al Omari, Loai, Barnes, Paul H., & Pitman, Grant (2012) Optimising COBIT 5 for IT governance : examples from the public sector. In Proceedings of the ATISR 2012 : 2nd International Conference on Applied and Theoretical Information Systems Research (2nd. ATISR2012), Academy of Taiwan Information Systems Research, Taipei, Taiwan.
Number of full-text downloads 1,446

Al Omari, Loai, Barnes, Paul H., & Pitman, Grant (2012) An exploratory study into audit challenges in IT governance : a Delphi approach. In Symposium on IT Governance, Management and Audit (SIGMA2012), Universiti Tenaga Nasional, Malaysia, University of Tenaga Nasional, Kuala Lumpur.
Number of full-text downloads 469

Al solami, Eesa, Boyd, Colin, Clark, Andrew, & Khandoker, Asadul Islam (2010) Continuous biometric authentication : can it be more practical? In 12th IEEE International Conference on High Performance Computing and Communications, 1-3 September 2010, Melbourne.
Number of full-text downloads 362
Number of citations in Scopus 2

Al-Hinai, Sultan Z., Dawson, Edward P., Henricksen, Matt, & Simpson, Leonie R. (2007) On the security of the LILI family of stream ciphers against algebraic attacks. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 213
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Albeshri, Aiiad Ahmad & Caelli, William (2010) Mutual protection in a cloud computing environment. In IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010), IEEE Computer Society, Melbourne, 641-646 .
Number of full-text downloads 341
Number of citations in Scopus 2

Alfawaz, Salahuddin, May, Lauren J., & Mohannak, Kavoos (2008) E-government security in developing countries : a managerial conceptual framework. In International Research Society for Public Management Conference, 26-28 March 2008, Queensland University of Technology, Brisbane.
Number of full-text downloads 945

Alfawaz, Salahuddin, Nelson, Karen, & Mohannak, Kavoos (2010) Information security culture : a behaviour compliance conceptual framework. In Australasian Information Security Conference (AISC), 2010, Brisbane, Australia.
Number of full-text downloads 826

Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2012) State convergence in the initialisation of the Sfinks stream cipher. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc., RMIT University, Melbourne, VIC, pp. 32-27.

Alhaqbani, Bandar S. & Fidge, Colin J. (2008) Privacy-Preserving Electronic Health Record Linkage Using Pseudonym Identifiers. In 10th International Conference on e-health Networking, Applications and Services, 2008. HealthCom 2008, 7-9 July 2008, Singapore.
Number of full-text downloads 370
Number of citations in Scopus 8
Number of citations in Web of Science® 4

Alhaqbani, Bandar S. & Fidge, Colin J. (2009) A time-variant medical data trustworthiness assessment model. In Proceedings of the 11th International Conference on e-Health Networking, Applications and Services, 15-18 December 2009, Sydney. (In Press)
Number of full-text downloads 133

Alkaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Alan N. (2010) Money laundering and FATF compliance by the international community. In Berleur, Jacques, Hercheui, Magda David, & Hilty, Lorenz M (Eds.) IFIP Advances in Information and Communication Technology, Springer Verlag, Brisbane, Australia, pp. 86-97.
Number of full-text downloads 809

Alkaabi, Ali, Mohay, George M., McCullagh, Adrian J., & Chantler, Alan N. (2010) Dealing with the problem of cybercrime. In Baggili, Ibrahim (Ed.) Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, ICST, Abu Dhabi.
Number of full-text downloads 782

Alkhaldi, Bidah, Sahama, Tony R., Huxley, Craig, & Gajanayake, Randike (2014) Barriers to implementing eHealth : a multi-dimensional perspective. In Studies in Health Technology and Informatics [e-Health - For Continuity of Care], IOS Press, Istanbul, Turkey, pp. 875-879.
Number of full-text downloads 13

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 342
Number of citations in Scopus 1

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE Computer Society, Shanghai, China, pp. 147-154.
Number of full-text downloads 350
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May 2009, Venice/Mestre, Italy.
Number of full-text downloads 395
Number of citations in Scopus 4

Alnatheer, Mohammed & Nelson, Karen J. (2009) A Proposed Framework for Understanding Information Security Culture and Practices in the Saudi Context. In 7th Australian Information Security Management Conference, 1-3 December 2009, Kings Perth Hotel, Perth. (In Press)
Number of full-text downloads 533
Number of citations in Scopus 3

Alpcan, Tansu, Kesici, Sinan, Bicher, Daniel, Mihcak, M. Kivanc, Bauckhage, Christian, & Camtepe, Seyit A. (2008) A lightweight biometric signature scheme for user authentication over networks. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ACM, Istanbul, Turkey, 33:1-33:6.
Number of full-text downloads 59

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2012) Security assessment of code refactoring rules. In Proceedings of the Saudi Arabian National Workshop on Information Assurance Research (WIAR 2012), IEEE (Institute of Electrical and Electronics Engineers, Inc.) & IET (The Institution of Engineering and Technology), Riyadh, Saudi Arabia.
Number of full-text downloads 32

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2009) Security metrics for object-oriented class designs. In Choi, Byoungju (Ed.) Proceeding of QSIC 2009 : Ninth International Conference on Quality Software, 24-25 August, Jeju, Korea. (In Press)
Number of full-text downloads 547
Number of citations in Scopus 8
Number of citations in Web of Science® 1

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2012) An automated tool for assessing security-critical designs and programs. In Proceedings of WIAR '2012; National Workshop on Information Assurance Research, Riyadh, Saudi Arabia.
Number of full-text downloads 45

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2011) A hierarchical security assessment model for object-oriented programs. In Hierons, Rob & Merayo, Mercedes (Eds.) Proceedings of the 11th International Conference on Quality Software (QSIC 2011), IEEE Computer Society, University Complutense of Madrid, Madrid. (In Press)
Number of full-text downloads 201
Number of citations in Scopus 2

Alsolami, Eesa, Boyd, Colin, Clark, Andrew J., & Ahmed, Irfan (2011) User-representative feature selection for keystroke dynamics. In De Capitani di Vimercati , Sabrina & Samarati , Pierangela (Eds.) International Conference on Network and System Security, 6-8 September 2011, Università degli Studi di Milano, Milan.
Number of full-text downloads 143

Alzaid, Hani, Abanmi, Suhail, Kanhere, Salil, & Chou, Chun Tung (2008) BANAID: A Sensor Network Test-bed for Wormhole Attacks. In AusCERT 2008, 18 - 23 May 2008, Gold Coast, Australia.
Number of full-text downloads 503

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan (2008) RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks. In 1st International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI 2008), December 1-4, 2008, Dunedin, New Zealand. (In Press)
Number of full-text downloads 348
Number of citations in Scopus 10
Number of citations in Web of Science® 8

Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan M. (2008) Secure Data Aggregation in Wireless Sensor Networks: A survey. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia, pp. 93-105.
Number of full-text downloads 3,676
Number of citations in Scopus 1

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest (2009) A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa. (In Press)
Number of full-text downloads 501
Number of citations in Scopus 1

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., & Foo, Ernest (2010) Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In Proceedings of The 24th International Conference on Advanced Information Networking and Applications, IEEE, Perth, Western Australia. (In Press)
Number of full-text downloads 154
Number of citations in Scopus 3

Alzomai, Mohammed, Al Fayyadh, Bander, Josang, Audun, & McCullagh, Adrian (2008) An experimental investigation of the usability of transaction authorization in online bank security systems. In Brankovic, L & Miller, M (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), 22-25 January 2008, Australia, New South Wales, Wollongong.

Alzomai, Mohammed, Foo, Ernest, Josang, Audun, & McCullagh, Adrian (2008) Strengthening SMS-based authentication through usability. In Werner, B (Ed.) Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, 10-12 December 2008, Australia, New South Wales, Sydney.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Alzomai, Mohammed & Josang, Audun (2010) The mobile phone as a multi OTP device using trusted computing. In Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Crown Conference Centre, Melbourne, Victoria, pp. 75-82.
Number of full-text downloads 238
Number of citations in Scopus 4

Amoah, Raphael, Suriadi, Suriadi, Camtepe, Seyit A., & Foo, Ernest (2014) Security analysis of the non-aggressive challenge response of the DNP3 Protocol using a CPN Model. In IEEE International Conference on Communications (ICC 2014), 10-14 June 2014, Sydney, NSW.
Number of full-text downloads 30

Anantharajah, Kaneswaran, Denman, Simon, Sridharan, Sridha, Fookes, Clinton B., & Tjondronegoro, Dian W. (2012) Quality based frame selection for video face recognition. In Proceedings of 6th International Conference on Signal Processing and Communication Systems (ICSPCS'2012), IEEE Xplore, Gold Coast, Qld.

Andersson, Gunnar, Sahama, Tony R., Willett, Graham, & Hauge, Bjørn Gitle (2013) Bringing skills and general competences back into technological education. In Proceedings of the 8th International Conference on New Horizons in Industry, Business and Education, Technological Educational Institute of Crete, Crete Island, Greece, pp. 221-226.
Number of full-text downloads 25

Andersson, Stig, Clark, Andrew, & Mohay, George (2004) Network based buffer overflow detection by exploit code analysis. In Mohay, George M., Clark, Andrew J., & Kerr, Kathryn (Eds.) AusCERT Asia Pacific Information Technology Security Conference: R&D Stream, 23-27 May 2004, Gold Coast, Australia.
Number of full-text downloads 468

Andersson, Stig, Clark, Andrew J., & Mohay, George M. (2005) Detecting network-based obfuscated code injection attacks using sandboxing. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 22-26 May 2005, Gold Coast, Queensland.
Number of full-text downloads 267

Andersson, Stig, Clark, Andrew J., Mohay, George M., Schatz, Bradley, & Zimmermann, Jacob (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In Proceedings of the 21st Annual Computer Security Applications Conference, 5-9 December 2005, Tucson, Arizona.
Number of full-text downloads 144
Number of citations in Scopus 4

Au, Wai & Croll, Peter (2008) Consumer-centric and privacy-preserving identity management for distributed e-health systems. In Sprague, R (Ed.) Proceedings of the 41st Annual Hawaii International Conference on System Sciences, 7-10 January 2008, Waikoloa, Big Island, Hawaii, United States of America.
Number of citations in Scopus 1

Au, Wai, Gollmann, Dieter, & Josang, Audun (2006) A Method for Access Authorisation Through Delegation Networks. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.

Au, Wai-Ki, Choo, Kim-Kwang, & Looi, Mark (2005) A Secure Anonymous Authorisation Architecture for E-Commerce. In Cheung, W & Hsu, J (Eds.) Proceedings: The 2005 IEEE International Conference on E-Technology, E-Commerce and E-Service, 29 March - 1 April, 2005, China, Hong Kong.
Number of citations in Scopus 1

Babbage, Steve, Cid, Carlos, Pramstaller, Norbert, & Raddum, Havard (2007) An Analysis of the Hermes8 Stream Ciphers. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 64

Baker, Brendan & Sridharan, Sridha (2006) Speaker Verification Using Hidden Markov Models in a Multilingual Text-Constrained Framework. In Berkling, K & Torres Carrasquillo, P (Eds.) 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop, 28 - 30 June 2006, Puerto Rico, San Juan.

Baker, Brendan J., Vogt, Robert J., & Sridharan, Sridha (2005) Gaussian mixture modelling of broad phonetic and syllabic events for text-independent speaker verification. In Eurospeech/Interspeech : Proceedings of the 9th European Conference on Speech Communication and Technology 2005, 4-8 September 2005, Lisbon, Portugal.
Number of full-text downloads 235
Number of citations in Scopus 6

Barger, Peter & Sridharan, Sridha (2006) Application Specific Bounds on Detection Cost Using Game Theory. In Berkling, K & Torres Carrasquillo, P (Eds.) 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop, 28 - 30 June 2006, Puerto Rico, San Juan.

Batyuk, Leonid, Camtepe, Seyit A., & Albayrak, Sahin (2011) Multi-device key management using visual side channels in pervasive computing environments. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), IEEE Conference Publications, Barcelona, Spain, pp. 207-214.

Batyuk, Leonid, Herpich, Markus, Camtepe, Seyit A., Raddatz, Karsten, Schmidt, Aubrey-Derrick, & Albayrak, Sahin (2011) Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. In Proceedings of the 6th International Conference on Malicious and Unwanted Software (MALWARE 2011), IEEE Conference Publications, Fajardo, Puerto Rico, USA, pp. 66-72.
Number of citations in Scopus 11

Batyuk, Leonid, Scheel, Christian, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2011) Context-aware device self-configuration using self-organizing maps. In Proceedings of the 2011 Workshop on Organic Computing, ACM, Karlsruhe, Germany , pp. 13-22.
Number of citations in Scopus 2

Bhatia, Sajal, Mohay, George M., Schmidt, Desmond, & Tickle, Alan (2012) Modelling web-server Flash Events. In 2012 IEEE 11th International Symposium on Network Computing and Applications, Conference Publishing Services, Cambridge, MA, USA, pp. 79-86.
Number of full-text downloads 210
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Number of full-text downloads 187
Number of citations in Scopus 3

Bhatia, Sajal, Schmidt, Desmond, & Mohay, George M. (2012) Ensemble-based DDoS detection and mitigation model. In 2012 Fifth International Conference On Security of Information and Networks, Jaipur, India, pp. 79-86.
Number of full-text downloads 234
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Birkett, James & Stebila, Douglas (2010) Predicate-based key exchange. In Hawkes, Philip & Steinfeld, Ron (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 185
Number of citations in Scopus 8
Number of citations in Web of Science® 5

Boles, Wageeh, Boyd, Colin, & Hirschbichler, Marianne (2008) A multiple-control fuzzy vault. In Korba, L, Marsh, S, & Safavi-Naini, R (Eds.) Proceedings of Sixth Annual Conference on Privacy, Security and Trust, 2008, 1-3 October, 2008, New Brunswick, Canada.
Number of citations in Scopus 6
Number of citations in Web of Science® 1

Boles, Wageeh, Boyd, Colin, & Hirschbichler, Marianne (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In Ceballos, S (Ed.) Proceedings of Digital Image Computing: Techniques and Applications, 2008, 1-3 December 2008, Australia, Australian Capital Territory, Canberra.
Number of citations in Scopus 2

Boril, Hynek, Omid Sadjadi, Seyed, Kleinschmidt, Tristan, & Hansen, John H. L. (2010) Analysis and detection of cognitive load and frustration in drivers' speech. In Kobayashi, Takao, Hirose, Keikichi, & Nakamura, Satoshi (Eds.) Proceedings of INTERSPEECH 2010, International Speech Communication Association, Makuhari Messe International Convention Complex, Chiba, Makuhari, Japan, pp. 502-505.
Number of full-text downloads 194
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Borycki, Elizabeth M., Foster, Joanne, Sahama, Tony, Frisch, Noreen, & Kushniruk, Andre W. (2013) Developing national level informatics competencies for undergraduate nurses : methodological approaches from Australia and Canada. In Courtney, Karen L., Shabestari, Omar, & Kuo, Alex (Eds.) Studies in Health Technology and Informatics : Enabling Health and Healthcare through ICT, IOS Press, Inn at Laurel Point, Victoria, BC, Canada, pp. 345-349.
Number of full-text downloads 70
Number of citations in Scopus 1

Boyd, Colin (2008) Applications of elliptic curve pairings in cryptography. In Dorfer, G, Eigenthaler, G, & Kautschitsch, H (Eds.) Contributions to General Algebra 18, 1-4 February 2007, Klagenfurt, Austria.
Number of full-text downloads 137

Boyd, Colin, Bradley, Andrew, Chen, Shaokang, Crozier, Stuart, Dowling, Jason, Du, Jiang, et al. (2008) A comparison of DCT and DWT block based watermarking on medical image quality. In Shi, Yun, Kim, Hyoung, & Katzenbeisser, Stefan (Eds.) Digital Watermarking 6th International Workshop (LNCS 5041), 3-5 December, 2007, Guangzhou, China.
Number of citations in Scopus 1

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. In Pointcheval, D, Mu, Y, & Chen, K (Eds.) Cryptology and Network Security (LNCS 4301), 8-10 December 2006, China, Jiangsu, Suzhou.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2008) Efficient one-round key exchange in the standard model. In Information Security and Privacy : 13th Australasian Conference (ACISP 2008), 7-9 July 2008, Wollongong, NSW.
Number of full-text downloads 45
Number of citations in Scopus 33
Number of citations in Web of Science® 23

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 238
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 174
Number of citations in Scopus 3
Number of citations in Web of Science® 6

Boyd, Colin, Dawson, Edward, Okamoto, Eiji, & Peng, Kun (2006) A Novel Range Test. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 20
Number of citations in Scopus 2
Number of citations in Web of Science® 14

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. In Dawson, E & Vaudenay, S (Eds.) Progress in Cryptology - Mycrypt 2005, 28-30 September 2005, Malaysia, Kuala Lumpur.
Number of full-text downloads 71
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Number of full-text downloads 34

Boyd, Colin, Du, Rong, Foo, Ernest, & Gonzalez-Nieto, Juan (2005) Designing Secure E-Tendering Systems. In Katsikas, S, Lopez, J, & Pernul, G (Eds.) Trust, Privacy, and Security in Digital Business: Proceedings of the Second International Conference, Trustbus 2005, 22 August - 26 August 2005, Denmark, Copenhagen.
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Boyd, Colin & Gonzalez Nieto, Juan M. (2011) On forward secrecy in one-round key exchange. In Lecture Notes in Computer Science: Cryptography and Coding, Springer Berlin / Heidelberg, Oxford, UK, pp. 451-468.
Number of full-text downloads 177
Number of citations in Scopus 4

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Number of citations in Scopus 4

Branagan, Mark, Caelli, Bill, Kwok, Lam For, & Longley, Dennis (2008) Feasibility of automated information security compliance auditing. In Jajodia, S, Samarati, P, & Cimato, S (Eds.) Proceedings of the IFIP TC11 23rd International Information Security Conference, 7-10 September, 2008, Milano, Italy.
Number of citations in Scopus 1

Branagan, Mark, Caelli, William, & Longley, Dennis (2005) Security Modelling for Risk Assessment. In Mendis, P, Lai, J, & Dawson, E (Eds.) Rcent Advances in Counter-Terrorism Technology and Infrastructure Protection, July 2005, Australia, Canberra.

Branagan, Mark, Dawson, Robert, & Longley, Dennis (2006) Security Risk Analysis for Complex Systems. In Venter, H, Eloff, J, Labuschagne, L, & Eloff, M (Eds.) Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5 - 7 July 2006, South Africa, Johannesburg.

Branagan, Mark & Longley, Dennis (2005) Developing Threat Networks for Risk Analysis of Information Systems. In Ventor, H, Eloff, J, & Labuschagne, L (Eds.) ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, South Africa, Sandton.

Bristow, Hilton & Lucey, Simon (2012) V1-inspired features induce a weighted margin in SVMs. In Lecture Notes in Computer Science : Proceedings of the 12th European Conference on Computer Vision : Part II, Springer, Florence, Italy, pp. 59-72.
Number of full-text downloads 73

Burdon, Mark (2008) Profiting from personal information: Power, information privacy and evidence based policy. In The Third Workshop on Social Implications of National Security, 23-24 July, Canberra.
Number of full-text downloads 235

Burdon, Mark (2007) Re-using public sector information (PSI) for profit: Who’s data is it anyway? In Michael, K. & Michael, M.G. (Eds.) Second Workshop on the Social Implications of National Security, 29 October, University of Wollongong.

Burdon, Mark, Gonzalez Nieto, Juan M., Christensen, Sharon A., Dawson, Edward P., Duncan, William D., & Lane, Bill B. (2007) Access Control in Federated Databases: How Legal Issues Shape Security. In Wimmer, Maria A., Scholl, Jochen, & Gronlund, Ake (Eds.) Electronic Government, 6th International Conference, EGOV 2007, 3-7 September, Regensburg, Germany.
Number of full-text downloads 55

Burdon, Mark, Lane, William B., & von Nessen, Paul (2009) Legal Issues Relating to the Notification of Australian Data Breaches. In Kierkegaard, Sylvia M. (Ed.) Legal Discourse in Cyberlaw and Trade, International Association of IT Lawyers, Sliema, Malta, pp. 65-83.

Burdon, Mark, Low, Rouhshi, & Reid, Jason F. (2010) If it's encrypted it's secure! The viability of US state-based encryption exemptions. In Michael, Katina (Ed.) Proceedings of the 2010 IEEE International Symposium on technology and society : Social Implications of Emerging Technologies, IEEE, University of Wollongong, New South Wales, pp. 96-102.
Number of full-text downloads 81

Burdon, Mark, von Nessen, Paul, Reid, Jason F., & Lane, William B. (2010) Australian data breach notification : avoiding the State/Federal overlap. In Proceedings of 5th International Conference on Legal, Security and Privacy Issues in IT Law, Universitat Pompeu Fabra, Barcelona.
Number of full-text downloads 121

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2009) Design and modeling of collaboration architecture for security. In Proceedings of the International Symposium on the Collaborative Technologies and Systems, IEEE Conference Publications, Baltimore, Maryland, pp. 330-341.

Bye, Rainer, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2010) Collaborative intrusion detection framework : characteristics, adversarial opportunities and countermeasures. In Proceedings of the 2010 International conference on Collaborative methods for security and privacy, USENIX Association, Washington DC, USA, p. 1.

BÌeasing, T., Batyuk, L., Schmidt, A-D., Camtepe, Seyit A., & Albayrak, S. (2010) An Android application sandbox system for suspicious software detection. In Proceedings of the 5th International Conference on Malicious and Unwanted Software, IEEE Conference Publications, Nancy, France , pp. 55-62.
Number of citations in Scopus 31

Caelli, Bill, McNair, Neil, & Smith, Leslie (2008) Information assurance education in a specialist defence environment. In Dodge, Ron (Ed.) Proceedings from the Twelfth Colloquium for Information Systems Security Education, 2-4 June 2008, United States of America, Dallas, Texas.

Caelli, William & Holford, John (2006) The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.

Caelli, William, Liu, Vicky, & Chang, She-I (2013) Identity, addressing, authenticity and audit requirements for trust in ERP, analytics and big/open data in a “Cloud” computing environment : a review and proposal. In 2013 Forensic Accounting and Personal Information Protection International Forum, 22-23 November 2013, National Chung Cheng University, Chiayi, Taiwan. (Unpublished)
Number of full-text downloads 70

Caelli, William, Liu, Vicky, & Chang, She-I (2014) Trust in merged ERP and open data schemes in the “Cloud”. In 2014 International Conference on Accounting and Information Technology, 21-23 February 2014, National Chung Cheng University, Chiayi, Taiwan. (Unpublished)
Number of full-text downloads 66

Caelli, William & McCullagh, Adrian (2005) Who Goes There? Internet Banking: A Matter of Risk and Reward. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Number of citations in Web of Science® 1

Camtepe, S. A. & Yener, B. (2007) Modeling and detection of complex attacks. In Proceedings of the Third International Conference on Security and Privacy in Communications Networks and the Workshops, 2007, IEEE Conference Publications , Nice, France, 234 -243.
Number of citations in Scopus 5
Number of citations in Web of Science® 1

Camtepe, S. A., Yener, B., & Yung, Moti (2006) Expander graph based key distribution mechanisms in wireless sensor networks. In Proceedings of IEEE International Conference on Communications, IEEE Conference Publications , Istanbul Turkey, 2262 -2267.
Number of citations in Scopus 14
Number of citations in Web of Science® 2

Camtepe, Seyit A., Goldberg, Mark, Krishnamoorty, Mukkai, & Magdon-Ismail, Malik (2005) Detecting conversing groups of chatters : a model, algorithms, and tests. In Guimaraes, N. & Isaias, P. (Eds.) Proceedings of the IADIS International Conference on Applied Computing, Algarve, Portugal, pp. 89-96.

Camtepe, Seyit A. & Yener, Bulent (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati, Pierangela, Ryan, Peter, Gollmann, Dieter, & Molva, Refik (Eds.) Lecture Notes in Computer Science, Computer Security – ESORICS 2004, Springer Berlin Heidelberg, Institut Eurecom, Sophia Antipolis, French Riviera, France, pp. 293-308.
Number of citations in Scopus 51
Number of citations in Web of Science® 39

Carey, Nathan, Clark, Andrew, & Mohay, George (2002) IDS interoperability and correlation using IDMEF and commodity systems. In Fourth International Conference on Information and Communications Security, 9-12 December 2002, Singapore.
Number of full-text downloads 476
Number of citations in Web of Science® 4

Carey-Smith, Mark T., Nelson, Karen J., & May, Lauren J. (2007) Improving Information Security Management in Nonprofit Organisations with Action Research. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Information Security Management Conference, 4 December 2007, Perth, Western Australia.
Number of full-text downloads 443
Number of citations in Scopus 1

Carter, Gary, Dawson, Edward, & Wong, Kenneth (2006) Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology. In Dorfer, G, Eigenthaler, G, Goldstern, M, Muller, W, & Winkler, R (Eds.) Contributions to General Algebra 17, 26 - 29 May 2005, Austria, Vienna.

Chan, Zim, Croll, Peter, Hansen, David, & Maeder, Anthony (2006) The Use of Agent Technologies for Preserving Privacy with Health Records when Linking Federated Databases. In Westbrook, J, Callen, J, & Margelis, G (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer, 20 - 22 August 2006, Australia, New South Wales, Sydney.

Chandran, Vinod & Chen, Brenden Chong (2006) Simultaneous biometric verification and random number generation. In Wysocki, Beata J. & Wysocki, Tadeusz A. (Eds.) The 5th Workshop on Internet, Telecommunications and Signal Processing, 11-13 December 2006, Hobart.
Number of full-text downloads 187

Chandran, Vinod, McCool, Christopher, & Sridharan, Sridha (2006) 2D-3D Face Recognition Based on PCA and Feature Modelling. In Senac, C & Ferrane, I (Eds.) Proceedings of the Second International Workshop on MultiModal User Authentication, University of California, Toulouse, France, pp. 1-8.

Chapman, S.C., Mathews, K.L., Cooper, M., Jensen, N.M., Wang, E., Butler, D.G., et al. (2001) Using environment characterization to interpret wheat yield in water-limited environments. In Eastwood, R., Hollamby, G., Rathjen, T., & Gororo, N. (Eds.) 10th Assembly Proceedings of the Wheat Breeding Society of Australia Inc., Wheat Breeding Society of Australia Inc., Mildura, VIC, pp. 136-139.

Chen, Brenden, Chen, Daniel, Fookes, Clinton, Mamic, George, & Sridharan, Sridha (2008) Improved GrabCut segmentation via GMM optimisation. In Ceballos, S (Ed.) Computing: Techniques and Applications, 2008, IEEE, Australia, Australian Capital Territory, Canberra, pp. 39-45.
Number of full-text downloads 104
Number of citations in Scopus 2

Chen, Brenden C. & Chandran, Vinod (2007) Biometric Based Cryptographic Key Generation from Faces. In Digital Image Computing: Techniques and Applications (DICTA), 3rd - 5th December, Adelaide, Australia.
Number of full-text downloads 753
Number of citations in Scopus 18

Chen, Brenden Chong & Chandran, Vinod (2010) Biometric template security using higher order spectra. In Proceedings of International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2010, IEEE, Sheraton Dallas Hotel, Dallas, Texas.
Number of full-text downloads 294
Number of citations in Scopus 6
Number of citations in Web of Science® 1

Chen, Brenden Chong & Chandran, Vinod (2010) Robust image hashing using higher order spectral features. In Proceedings of International Conference on Digital Image Computing : Techniques and Applications (DICTA), The Institute of Electrical and Electronics Engineers, Inc., Mercure Sydney Hotel, Sydney, New South Wales, Australia, pp. 100-104.
Number of full-text downloads 110

Chen, Daniel, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2010) Accurate silhouettes for surveillance : improved motion segmentation using graph cuts. In International Conference on Digital Image Computing : Techniques and Applications (DICTA 2010), 1-3 December 2010, Sydney, Australia.
Number of full-text downloads 132
Number of citations in Scopus 2

Chen, Daniel C.Y., Denman, Simon, & Fookes, Clinton B. (2010) Accurate silhouette segmentation using motion detection and graph cuts. In Proceedings of 10th International Conference on Information Science, Signal Processing and their Applications, Renaissance Hotel, Kuala Lumpur. (In Press)
Number of full-text downloads 153
Number of citations in Scopus 1

Chen, Daniel C.Y. & Fookes, Clinton B. (2010) Labelled silhouettes for human pose estimation. In Proceedings of 10th International Conference on Information Science, Signal Processing and their Applications, Renaissance Hotel, Kuala Lumpur. (In Press)
Number of full-text downloads 66

Chen, Kevin, Clark, Andrew, De Vel, Olivier, & Mohay, George (2003) ECF - Event correlation for forensics. In First Australian Computer Network and Information Forensics Conference, 25 November 2003, Perth, Australia.
Number of full-text downloads 673

Cheng, Xin, Fookes, Clinton B., Sridharan, Sridha, Saragih, Jason, & Lucey, Simon (2013) Deformable face ensemble alignment with robust grouped-L1 anchors. In 10th IEEE Conference on Automatic Face and Gesture Recognition (FG2013), IEEE, Shanghai, China, pp. 1-7.
Number of citations in Scopus 1

Cheng, Xin, Lakemond, Ruan, Fookes, Clinton B., & Sridharan, Sridha (2012) Efficient real-time face detection for high resolution surveillance applications. In 6th International Conference on Signal Processing and Communication Systems (ICSPCS'2012), 12 - 14 December 2012, Radisson Resort, Gold Coast, Qld.
Number of full-text downloads 179

Cheng, Xin, Sridharan, Sridha, Saragih, Jason M., & Lucey, Simon (2012) Anchored deformable face ensemble alignment. In Fusiello, Andrea, Murino, Vittorio, & Cucchiara, Rita (Eds.) Lecture Notes in Computer Science, Springer Berlin Heidelberg, Florence, Italy, pp. 133-142.
Number of full-text downloads 57
Number of citations in Scopus 2

Cheng, Xin, Sridharan, Sridha, Saragih, Jason M., & Lucey, Simon (2013) Rank minimization across appearance and shape for AAM ensemble fitting. In Davis, Larry & Hartley, Richard (Eds.) IEEE International Conference on Computer Vision (ICCV 2013), 3-6 December 2013, Sydney Convention and Exhibition Centre, Sydney, NSW. (In Press)
Number of citations in Scopus 1

Chew, Sien Wei (2010) Temporal-based support vector machines for facial expression recognition. In AutoCRC Student Conference 2010, 27 July 2010, Melbourne.
Number of full-text downloads 150

Chew, Sien Wei, Lucey, Patrick J., Sridharan, Sridha, & Fookes, Clinton B. (2010) Exploring visual features through Gabor representations for facial expression detection. In Proceedings of International Conference on Auditory-Visual Speech Processing (AVSP2010), The Prince Hakone, Hakone, Kanagawa. (In Press)
Number of full-text downloads 111

Chew, Sien Wei, Lucey, Simon, Lucey, Patrick J., & Sridharan, Sridha (2012) Improved facial expression recognition via uni-hyperplane classification. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, IEEE, Rhode Island Convention Center, Providence, Rhode Island, pp. 2554-2561. (In Press)
Number of full-text downloads 219
Number of citations in Scopus 2

Chew, Sien Wei, Rana, Rajib, Lucey, Patrick J., Lucey, Simon, & Sridharan, Sridha (2011) Sparse temporal representations for facial expression recognition. In Lecture Notes in Computer Science, Springer-Verlag, Gwangju, South Korea.

Chinnow, Joel, Bsufka, Karsten, Schmidt, Aubrey-Derrick, Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2011) A simulation framework for smart meter security evaluation. In Proceedings of the IEEE International Conference on Smart Measurements for Future Grids (SMFG 2011), IEEE Conference Publications, Bologna, Italy, pp. 1-9.
Number of citations in Scopus 4

Chinnow, Joel, Bye, Rainer, Camtepe, Seyit Ahmet, Bsufka, Karsten, & Albayrak, Sahin (2011) Evaluation of Attacks and Countermeasures in Large Scale Networks. In Heiss, Hans-Ulrich, Pepper, Peter, Schlingloff, Holger, & Schneider, Joerg (Eds.) Lecture Notes in Informatics, Gesellschaft fuer Informatik e.V. (GI), Berlin, Germany.

Clark, Andrew, Giansiracusa, Michelangelo, Hynd, John, & Russell, Selwyn (2005) An Improved Execution Integrity Solution for Mobile Agents. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Clark, Andrew, Mohay, George, Panichprecha, Sorot, & Zimmermann, Jakub (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Cliff, Yvonne, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) How to extract and expand randomness : a summary and explanation of existing results. In Applied Cryptography and Network Security, 2-5 June 2009, Place de l'Etoile , Paris.
Number of full-text downloads 177
Number of citations in Web of Science® 1

Cliff , Yvonne, Lee, Sanggon, Moon, Sang-Jae, & Park, Youngho (2006) Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.

Cohn, Jeff, Cox, Mark, Lucey, Patrick, Lucey, Simon, & Sridharan, Sridha (2008) Comparing object alignment algorithms with appearance variation: forward-additive vs inverse-composition. In Feng, D, Sikora, T, Siu, W, Guan, L, Dugelay, J, Wu, Q, et al. (Eds.) Proceedings of the 2008 IEEE 10th Workshop on Multimedia Signal Processing, 8 -10 October 2008, Australia, Queensland, Cairns.
Number of citations in Scopus 2

Cook, Jamie A., Baker, Jason, Chandran, Vinod, & Sridharan, Sridha (2004) 3D Face Acquisition, Modelling and Recognition. In Workshop on Internet, Transmission and Signal Processing, Dec, 2004, Adelaide.
Number of full-text downloads 220

Cook, Jamie A., Chandran, Vinod, & Fookes, Clinton B. (2006) 3D Face Recognition using Log-Gabor Templates. In British Machine Vision Conference, September 2006, Edinborugh, Scotland.
Number of full-text downloads 381

Cook, Jamie A., Chandran, Vinod, Sridharan, Sridha, & Fookes, Clinton (2005) Gabor Filter Bank Representation for 3D Face Recognition. In DICTA 2005, IEEE, Cairns Convention Centre, Cairns, QLD, pp. 16-23.
Number of full-text downloads 719
Number of citations in Scopus 3

Cook, Jamie A., Chandran, Vinod, Sridharan, Sridha, & Fookes, Clinton B. (2004) Face Recognition from 3D Data using Iterative Closest Point Algorithm and Gaussian Mixture Models. In 3D Data Processing, Visualisation and Transmission, September, 2004, Thessaloniki, Greece.
Number of full-text downloads 736
Number of citations in Scopus 26
Number of citations in Web of Science® 4

Cook, Jamie A., Cox, Mark D., Chandran, Vinod, & Sridharan, Sridha (2007) Robust 3D Face Recognition from Expression Categorisation. In International Conference on Biometrics, September, Seoul, Korea.
Number of full-text downloads 217
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Cook, Jamie A., McCool, Christopher, Chandran, Vinod, & Sridharan, Sridha (2006) Combined 2D/3D Face Recognition Using Log-Gabor Templates. In IEEE International Conference on Advanced Video and Signal Based Surveillance 2006 (AVSS06), 22-24 November 2006, Sydney, NSW, Australia.
Number of full-text downloads 571
Number of citations in Scopus 1

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 459

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 401
Number of citations in Web of Science® 3

Corpuz, Maria (2011) Enterprise information security policy assessment : an extended framework for metrics development utilising the goal-question-metric approach. In Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, pp. 269-274.
Number of full-text downloads 574

Corpuz, Maria & Barnes, Paul H. (2010) Integrating information security policy management with corporate risk management for strategic alignment. In Proceedings of the 14th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2010), Orlando, Florida.
Number of full-text downloads 389
Number of citations in Scopus 3

Corpuz, Maria (2011) The enterprise information security policy as a strategic business policy within the corporate strategic plan (extended abstract). In Callaos, Nagib & Chu, Hsing-Wei (Eds.) Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, USA, pp. 275-279.
Number of full-text downloads 183

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Avoiding full extension field arithmetic in pairing computations. In Progress in Cryptology - AFRICACRYPT 2010, Springer Verlag, Stellenbosch, South Africa, pp. 203-224.
Number of full-text downloads 64
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Delaying mismatched field multiplications in pairing computations. In Arithmetic of Finite Fields : Third International Workshop, WAIFI 2010, Proceedings, Springer Verlag, Istanbul, Turkey, pp. 196-214.
Number of full-text downloads 76

Costello, Craig, Lange, Tanja, & Naehrig, Michael (2010) Faster pairing computations on curves with high-degree twists. In Public Key Cryptography – PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings, Springer Verlag, Paris, pp. 224-242.
Number of full-text downloads 160
Number of citations in Scopus 26
Number of citations in Web of Science® 13

Costello, Craig & Stebila, Douglas (2010) Fixed argument pairings. In Abdalla, Michel & Barreto, Paulo S.L.M. (Eds.) Progress in Cryptology -- LATINCRYPT 2010, Springer, Puebla, Mexico, pp. 92-108.
Number of full-text downloads 52
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Cox, Mark D., Sridharan, Sridha, Lucey, Simon, & Cohn, Jeffrey (2008) Least squares congealing for unsupervised alignment of images. In 2008 IEEE Conference on Computer Vision and Pattern Recognition, IEEE, Anchorage, Alaska, pp. 1-8.
Number of full-text downloads 214

Croll, Jasmine & Croll, Peter (2006) Privacy Compliance - Managing the Risks when Integrating Health Data. In Westbrook, J, Callen, J, & Margelis, G (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer, 20 - 22 August 2006, Australia, New South Wales, Sydney.

Croll, Peter, Franco, Luis, & Sahama, Tony (2008) Security Enhanced Linux to enforce Mandatory Access Control in Health Information Systems. In Warren, J, Yu, P, Yearwood, J, & Patrick, J (Eds.) Health Data and Knowledge Management 2008, 22-25 January 2008, Wollongong, Australia.

Croll, Peter R., Henricksen, Matthew P., Caelli, William J., & Liu, Vicky (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. In Kuhn, Klaus A., Warren, James R., & Leong, Tze-Yun (Eds.) MEDINFO 2007: the 12th World Congress on Health (Medical) Informatics – Building Sustainable Health Systems, 20-24 August 2007, Brisbane, Australia.
Number of full-text downloads 91

Daniel, Anna & Flew, Terry (2010) The Guardian reportage of the UK MP expenses scandal: a case study of computational journalism. In Record of the Communications Policy and Research Forum 2010, Network Insight Pty. Ltd., Sydney, pp. 186-194.
Number of full-text downloads 1,333

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 127
Number of citations in Scopus 1

Dawson, Edward, Gauravaram, Praveen, & McCullagh, Adrian (2006) Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce? In Clark, A, McPherson, M, & Mohay, G (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006, University of Queensland, Australia, Gold Coast, pp. 73-88.

Dawson, Edward, Gauravaram, Praveen, Millan, William, & Viswanathan, Kapali (2006) Constructing Secure Hash Functions by Enhancing Merkle-Damgard Construction. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Scopus 6
Number of citations in Web of Science® 12

Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Number of full-text downloads 36
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Dawson, Edward & Henricksen, Matthew (2006) Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 64

Dawson, Edward & Henricksen, Matthew (2006) Rekeying Issues in the MUGI Stream Cipher. In Preneel, P & Tavares, S (Eds.) Selected Areas in Cryptography (LNCS 3897), 11 - 12 August 2005, Canada, Ontario, Kingston.
Number of full-text downloads 95
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Dawson, Edward, Peng, Kun, & Yao, Minna (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In Boyd, C & Gonzalez-Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Dean, David, Lucey, Patrick, & Sridharan, Sridha (2008) Cascading appearance-based features for visual speaker verification. In Fletcher, J, Loakes, D, Gocke, R, Burnham, D, & Wagner, M (Eds.) Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST 2008), 22-26 September 2008, Australia, Queensland, Brisbane.

Dean, David & Sridharan, Sridha (2008) Fused HMM Adaptation of Synchronous HMMs for Audio-Visual Speaker Verification. In Vroomen, Jean (Ed.) Proceedings of The International Conference on Auditory-Visual Speech Processing 2008, 26-29 September 2008, Australia, Queensland, Moreton Island.

Dean, David B., Lucey, Patrick J., Sridharan, Sridha, & Wark, Timothy J. (2007) Fused HMM-adaptation of multi-stream HMMs for audio-visual speech recognition. In 8th Annual Conference of the International Speech Communication Association (Interspeech 2007), August 27 - 31, 2007, Antwerp.
Number of full-text downloads 445

Dean, David B., Lucey, Patrick J., Sridharan, Sridha, & Wark, Timothy J. (2007) Weighting and normalisation of synchronous HMMs for audio-visual speech recognition. In International Conference on Auditory-Visual Speech Processing 2007 (AVSP2007), August 31 - September 3, 2007, Kasteel Groenendaal, Hilvarenbeek, The Netherlands.
Number of full-text downloads 113

Dean, David B., Sridharan, Sridha, Vogt, Robert J., & Mason, Michael W. (2010) The QUT-NOISE-TIMIT corpus for the evaluation of voice activity detection algorithms. In Proceedings of Interspeech 2010, Makuhari Messe International Convention Complex, Makuhari, Japan.
Number of full-text downloads 348
Number of citations in Scopus 1

Denman, Simon, Bialkowski, Alina, Fookes, Clinton B., & Sridharan, Sridha (2011) Determining operational measures from multi-camera surveillance systems using soft biometrics. In 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Klagenfurt, Austria, pp. 462-467.
Number of full-text downloads 109
Number of citations in Scopus 5

Denman, Simon, Chandran, Vinod, & Sridharan, Sridha (2007) Abandoned object detection using multi-layer motion detection. In Wysocki, Beata J. & Wysocki, Tadeusz A. (Eds.) Proceedings of International Conference on Signal Processing and Communication Systems 2007, DSP for Communication Systems, Radisson Resort, Gold Coast, Queensland, pp. 439-448.
Number of full-text downloads 113

Denman, Simon, Fookes, Clinton, & Sridharan, Sridha (2010) Multi-modal object tracking using dynamic performance metrics. In Proceedings of the 7th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS 2010), IEEE Computer Society, Boston, Massachusetts. (In Press)
Number of full-text downloads 103
Number of citations in Scopus 2

Denman, Simon, Fookes, Clinton B., Bialkowski, Alina, & Sridharan, Sridha (2010) Soft-biometrics : unconstrained authentication in a surveillance environment. In Digital Image Computing: Techniques and Applications, 2009. DICTA '09, Melbourne, Victoria, pp. 196-203.
Number of full-text downloads 264
Number of citations in Scopus 17
Number of citations in Web of Science® 5

Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2010) Group segmentation during object tracking using optical flow discontinuities. In Proceedings of the 4th Pacific-Rim Symposium on Image and Video Technology, IEEE Computer Society, Nanyang Technological University, Singapore, pp. 270-275.
Number of full-text downloads 124
Number of citations in Scopus 2

Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2010) Improved simultaneous computation of motion detection and optical flow for object tracking. In Proceedings of DICTA 2009 : Digital Image Computing : Techniques and Applications, 2009, IEEE Computer Society’s Conference Publishing Services, Melbourne, Australia, pp. 175-182.
Number of full-text downloads 235
Number of citations in Scopus 22
Number of citations in Web of Science® 5

Denman, Simon, Fookes, Clinton B., Sridharan, Sridha, & Chandran, Vinod (2008) Object tracking using multiple motion modalities. In Proceedings of the International Conference on Signal Processing and Communication Systems 2008, IEEE, Radisson Resort, Gold Coast, Queensland, pp. 1-10.
Number of full-text downloads 53

Denman, Simon, Fookes, Clinton B., Sridharan, Sridha, & Lakemond, Ruan (2009) Dynamic Performance Measures for Object Tracking Systems. In Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance 2009, September 2-4, 2009, Genoa, Italy.
Number of full-text downloads 57
Number of citations in Scopus 4
Number of citations in Web of Science® 4

Denman, Simon, Lamb, Todd, Fookes, Clinton B., Sridharan, Sridha, & Chandran, Vinod (2007) Multi-sensor tracking using a scalable condensation filter. In Wysocki, Beata J. & Wysocki, Tadeusz A. (Eds.) Proceedings of the International Conference on Signal Processing and Communication Systems 2007, DSP for Communication Systems, Radisson Resort, Gold Coast, Queensland, pp. 429-438.
Number of full-text downloads 55

Denman, Simon P., Chandran, Vinod, & Sridharan, Shidha (2007) Robust real time multi-layer foreground segmentation. In Proceedings of International Association for Pattern Recognition Conference on Machine Vision Applications, The University of Tokyo, Japan, pp. 496-499.
Number of full-text downloads 82

Doble, Christopher, Fidge, Colin J., & Corney, Diane (2012) Data flow analysis of embedded program expressions. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 71-82.
Number of full-text downloads 144

Donaldson, Paul & Sahama, Tony R. (2009) Identifying and using ehealth phobias to implement communication protocols and change cultural and social behaviours in ehealth. In Sintchenko, Vitali & Croll, Peter (Eds.) HIC 2009 : Proceedings : Frontiers of Health Informatics - Redefining Healthcare, National Convention Centre Canberra, 19-21 August 2009, Health Informatics Society of Australia, National Convention Centre Canberra, pp. 85-86.
Number of full-text downloads 17

Donovan, Diane, Lefevre, James, & Simpson, Leonie (2008) A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. In Balakrishnan, R & Veni Madhavan, C (Eds.) Proceedings of the International Conference on Discrete Mathematics, 2006, 15-18 December, 2006, Bangalore, India.

Dowling, Jason A., Planitz, Birgit M., Maeder, Anthony J., Du, Jiang, Pham, Binh L., Boyd, Colin A., et al. (2007) Visual quality assessment of watermarked medical images. In Jiang, Yulei & Sahiner, Berkman (Eds.) Medical Imaging 2007: Image Perception, Observer Performance, and Technology Assessment: SPIE (Vol. 6515): Progress in Biomedical Optics and Imaging, 21-22 February 2007, San Diego, CA, USA.
Number of full-text downloads 366

Duncombe, David, Mohay, George M., & Clark, Andrew J. (2006) Synapse : auto correlation and dynamic attack redirection in an immunologically-inspired IDS. In Buyya, Rajkumar, Ma, Tianchi, Safavi-Naini, Rei, Steketee, Chris, & Susilo, Willy (Eds.) ACSW frontiers 2006 : proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society, Hobart, pp. 135-144.
Number of full-text downloads 122

Elias, Nur Fazidah (2007) Validating the IS-Impact Measurement Model in Malaysia : A Research in Progress Paper. In Toleman, Mark, Cater-Steel, Aileen, & Roberts, David (Eds.) 18th Australasian Conference on Information Systems, 5-7 December 2007, Toowoomba, Australia.
Number of full-text downloads 404
Number of citations in Scopus 1

Fidge, Colin J. & Corney, Diane (2009) Integrating hardware and software information flow analyses. In ACM SIGPLAN/SIGBED 2009 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2009), 19-20 June 2009, Trinity College, Dublin.
Number of full-text downloads 105
Number of citations in Scopus 1

Fookes, Clinton, Denman, Simon, Lakemond, Ruan, Ryan, David, Sridharan, Sridha, & Piccardi, Massimo (2010) Semi-supervised intelligent surveillance system for secure environments. In Proceedings of the IEEE International Symposium on Industrial Electronics, Special Session on Computational Intelligence for Safe and Secure Environments and Transport, Bari, Italy, pp. 2815-2820.
Number of full-text downloads 376
Number of citations in Scopus 9
Number of citations in Web of Science® 4

Fookes, Clinton, Mamic, George, McCool, Christopher, & Sridharan, Sridha (2008) Normalisation of 3D face data. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 1st International Conference on Signal Processing and Communication Systems, CSPCS'2007, 17 - 19 December 2007, Australia, Queensland, Gold Coast.
Number of citations in Scopus 1

Fookes, Clinton & Sridharan, Sridha (2008) Investigation and comparison of robust stereo image matching using mutual information and hierarchical prior probabilities. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems ICSPCS'2008, 15 - 17 December 2008, Australia, Queensland, Gold Coast.

Fookes, Clinton B., Cook, Jamie A., Sridharan, Sridha, & Tistarelli, Massimo (2010) Frequency decomposition techniques for increased discriminative 3D facial information capture. In Proceedings of the International Symposium on 3D Data Processing, Visualization and Transmission, Espace Saint Martin, Paris.
Number of full-text downloads 54

Fookes, Clinton B., Lin, Frank C., Chandran, Vinod, & Sridharan, Sridha (2004) Super-resolved face images using robust optical flow. In 3rd Workshop on the Internet, Telecommunications and Signal Processing, WITSP'04, 20-22 December, 2004, Adelaide, Australia.
Number of full-text downloads 171

Gajanayake, Randike, Iannella, Renato, Lane, William B., & Sahama, Tony R. (2012) Accountable-eHealth systems : the next step forward for privacy. In Proceedings of the 1st Australian eHealth informatics and security conference, Edith Cowan University, Novotel Perth Langley, Perth, WA. (In Press)

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2014) Adoption of accountable-eHealth systems by future healthcare professionals. In 16th International Conference on E-health Networking, Application & Services, 15-18 October 2014, Natal, Brazil. (In Press)

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2014) Consumer acceptance of Accountable-eHealth systems. In Studies in Health Technology and Informatics [e-Health - For Continuity of Care], IOS Press, Istanbul, Turkey, pp. 980-984.
Number of full-text downloads 9

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2011) Information accountability for online healthcare social networks. In International Conference on Innovation and Management, IAM 2011, 12 - 15 July 2011, Kuala Lumpur, Malaysia.
Number of full-text downloads 134

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2012) Information accountability with policy languages for e-Health. In International Conference on Information Resource Management, 21 - 23 May 2012, Vienna University of Economics and Business, Vienna. (In Press)

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2011) Privacy by information accountability for e-health systems. In 6th International Conference on Industrial and Information Systems (ICIIS 2011), 16-19 Aug 2011, University of Peradeniya, Sri Lanka.
Number of full-text downloads 151
Number of citations in Scopus 1

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2012) Privacy oriented access control for electronic health records. In Data Usage Management on the Web Workshop at the Worldwide Web Conference, ACM, Lyon Convention Centre, Lyon, France.
Number of full-text downloads 136

Gajanayake, Randike, Iannella, Renato, & Sahama, Tony R. (2012) An information accountability framework for shared eHealth policies. In Data Usage Management on the Web: Proceedings of the WWW2012 Workshop, Technische Universitat Munchen - Institut fur Informatik , Lyon Convention Centre, Lyon, France, pp. 38-45.
Number of full-text downloads 128

Gajanayake, Randike, Lane, William B., Iannella, Renato, & Sahama, Tony R. (2012) Legal issues related to Accountable-eHealth systems in Australia. In Williams, Trish & Valli, Craig (Eds.) Proceedings of the 1st Australian eHealth informatics and security conference, SRI, Security Research Institute, Edith Cowan University, Perth, Western Australia, Perth, Australia, pp. 16-21.

Gajanayake, Randike & Sahama, Tony (2013) Perceptions and attitudes of nursing students’ towards electronic health records. In Nursing Informatics Australia Conference 2013, 15 July 2013, Adelaide Convention Centre, Adelaide. (In Press)
Number of full-text downloads 65

Gajanayake, Randike, Sahama, Tony R., & Iannella, Renato (2013) The role of perceived usefulness and attitude on electronic health record acceptance : an empirical investigation using response surface analysis. In IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), 09 - 12 October, 2013, Lisbon, Portugal. (In Press)
Number of full-text downloads 31

Gajanayake, Randike, Yapa, Roshan Dharshana, & Hewavithana, Badra (2009) Comparison of standard image segmentation methods for segmentation of brain tumors from 2D MR images. In Proceedings of the 4th International Conference on Industrial and Information Systems, ICIIS 2009, IEEE, University of Peradeniya, Sri Lanka, pp. 301-305.
Number of full-text downloads 420
Number of citations in Scopus 6
Number of citations in Web of Science® 4

Gauravaram, Praveen & Foo, Ernest (2007) Designing Secure e-Contracting Systems. In CollECTeR 2007 - 21st Conference on eCommerce / 10th Anniversary CollECTeR Australia conference, 9-11 December 2007, Melbourne.
Number of full-text downloads 374

Gauravaram, Praveen & Kelsey, John (2008) Linear -XOR and additive checksums don't protect Damgard-Merkle hashes from generic attacks. In Malkin, Tal (Ed.) Topics in Cryptology - CT-RSA 2008, 8-11 April 2008, United States of America, San Francisco,.
Number of citations in Scopus 10
Number of citations in Web of Science® 11

Geva, Shlomo & Sahama, Tony (2005) The NLP task at INEX 2004. In Newsletter ACM SIGIR Forum, Association for Computing Machinery (ACM) , Dagstuhl Castle, Germany, pp. 50-53.

Ghaemmaghami, Houman, Baker, Brendan J., Vogt, Robert J., & Sridharan, Sridha (2010) Noise robust voice activity detection using features extracted from the time-domain autocorrelation function. In Proceedings of Interspeech 2010, Makuhari Messe International Convention Complex, Makuhari, Japan.
Number of full-text downloads 297
Number of citations in Scopus 2

Ghaemmaghami, Houman, Dean, David, & Sridharan, Sridha (2013) Speaker attribution of Australian broadcast news data. In Proceedings of the First Workshop on Speech, Language and Audio in Multimedia (SLAM): CEUR Workshop Proceedings, Volume 1012, Sun SITE Central Europe , Marseille, France, pp. 72-77.
Number of full-text downloads 37

Ghaemmaghami, Houman, Dean, David, Vogt, Robbie, & Sridharan, Sridha (2011) Extending the task of diarization to speaker attribution. In Interspeech 2011, 28-31 August 2011, Florence, Italy.
Number of full-text downloads 83

Ghaemmaghami, Houman, Dean, David B., Sridharan, Sridha, & Mccowan, Iain (2010) Noise robust voice activity detection using normal probability testing and time-domain histogram analysis. In 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Sheraton Dallas, Dallas, Texas, pp. 4470-4473.
Number of full-text downloads 118
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Ghelawat, Sunil, Radke, Kenneth, & Brereton, Margot (2010) Interaction, privacy and profiling considerations in local mobile social software : a prototype agile ride share system. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland, pp. 376-379.
Number of full-text downloads 122

Gill, Rupinder, Smith, Jason, & Clark, Andrew (2006) Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C, & Susilo, W. (Eds.) Proceedings of 4th Australasian Information Security Workshop (Network Security), Australian Computer Society Inc, Hobart, Tasmania, pp. 221-230.
Number of full-text downloads 246
Number of citations in Scopus 1

Gill, Rupinder S., Smith, Jason, Looi, Mark H., & Clark, Andrew J. (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22-26 May 2005, Gold Coast, Australia.
Number of full-text downloads 465

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Intrusion detection system for encrypted networks using secret-sharing schemes. In International Journal of Cryptology Research, Malaysian Society for Cryptology Research, Hotel Equatorial, Melaka, Malaysia.
Number of full-text downloads 195

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark H. (2009) Towards intrusion detection for encrypted networks. In 2009 International Conference on Availability, Reliability and Security, 16-19 March 2009, Fukuoka Institute of Technology, Fukuoka.
Number of full-text downloads 246

Goonasekera, Nuwan A., Caelli, William J., & Sahama, Tony R. (2009) 50 Years of Isolation. In IEEE Computer Society, IEEE Computer Society Conference Publishing Services (CPS), Brisbane, Australia, pp. 54-60.
Number of full-text downloads 180
Number of citations in Scopus 1

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2010) Generic one round group key exchange in the standard model. In Lee, Donghoon & Hong, Seokhie (Eds.) Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korean Institute of Information Security and Cryptology, Korea, pp. 1-15.
Number of full-text downloads 619
Number of citations in Scopus 5

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.
Number of citations in Scopus 10

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Strong designated verifier signature in a multi-user setting. In Seventh Australasian Information Security Conference (AISC 2009), Jan 20-23, 2009, Wellington, New Zealand.
Number of full-text downloads 90

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Universally composable contributory group key exchange. In Asian ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 10 - 12 March 2009, Sydney.
Number of citations in Scopus 6

Gorantla, M. Choudary, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Attribute-based authenticated key exchange. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 329
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2007) ID-based One-pass Authenticated Key Establishment. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia.
Number of full-text downloads 301

Grunewald, Dennis, Chinnow, Joel, Bye, Rainer, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2011) Framework for evaluating collaborative intrusion detection systems. In Heiß, Hans-Ulrich, Pepper, Peter, Schlingloff, Holger, & Schneider, Joerg (Eds.) Lecture Notes in Informatics, Gesellschaft fuer Informatik e.V. (GI), Berlin, Germany.
Number of full-text downloads 159

Guo, Xufeng, Dean, David B., Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2011) Evaluating automatic road detection across a large aerial imagery collection. In Proceedings of the 2011 International Conference of Digital Image Computing: Techniques and Applications, IEEE, Sheraton Noosa Resort & Spa, Noosa, QLD, pp. 140-145.
Number of full-text downloads 137
Number of citations in Scopus 1

Hadley, Bree J. (2009) Celebrating difference/censoring difference? : Marie Chouinard’s bODY rEMIX. In Silent Voices, Hidden Lives: Performance and Censorship, International Federation of Theatre Research / Federation International de la Recherche Theatrale Conference 2009, 14-18 July 2009, University of Lisbon, Lisbon. (Unpublished)

Hargreaves, Megan H., Willis, Jenny, & Sahama, Tony (2010) A matrix for appropriate assessment of workplace learning in stem disciplines. In STEM in Education Conference : Science, Technology, Engineering and Mathematics in Education Conference, 26 - 27 November 2010, Queensland University of Technology, Brisbane, Queensland, Australia.
Number of full-text downloads 13

Hassanzadeh, Reza, Sahama, Tony R., & Fidge, Colin J. (2010) A secure framework and related protocols for ubiquitous access to electronic health records using Java SIM cards. In IFIP Advances in Information and Communication Technology, Springerlink, Brisbane, Queensland, pp. 102-113.
Number of full-text downloads 95

Hauser, Christophe, Tronel, Frederic, Reid, Jason F., & Fidge, Colin J. (2012) A taint marking approach to confidentiality violation detection. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 83-90.
Number of full-text downloads 515

Helleseth, Tor & Molland (Visiting Scholar), Hoverd (2005) A Linear Weakness in the Klimov-Shamir T-function. In Grant, A & Kennedy, R (Eds.) Proceedings of the 2005 IEEE International Symposium on Information Theory (ISIT 05), 4 September - 9 September 2005, Australia, South Australia, Adelaide.

Henricksen, Matthew & Simpson, Leonie (2006) Improved Cryptanalysis of MAG. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of citations in Web of Science® 1

Herpich, Markus, Batyuk, Leonid, Camtepe, Seyit A., & Albayrak, Sahin (2012) A trusted ecosystem for Android applications based on context-aware access control. In Proceedings of the 7th International Conference on Malicious and Unwanted Software (MALWARE 2012), IEEE Conference Publications, Fajardo, Puerto Rico, USA, pp. 73-78.

Himawan, Ivan, McCowan, Iain, & Sridharan, Sridha (2010) Clustering of ad-hoc microphone arrays for robust blind beamforming. In Douglas, Scott (Ed.) Proceedings of IEEE Conference on Acoustics, Speech, and Signal Processing 2010, IEEE Xplore, Sheraton Hotel, Dallas, Texas, 2814 -2817 .
Number of full-text downloads 122
Number of citations in Scopus 1

Himawan, Ivan, McCowan, Iain A., & Sridharan, Sridha (2008) Dealing with Uncertainty in Microphone Placement in a Microphone Array Speech Recognition System. In International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2008, March 31 2008 - April 4 2008, Las Vegas, Nevada, USA.
Number of full-text downloads 823
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Hisil, Huseyin, Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Edward (2009) Faster group operations on elliptic curves. In Information Security 2009 : proceedings of the 7th Australasian Information Security Conference, CRPIT/Springer, Wellington, New Zealand, pp. 11-19.
Number of full-text downloads 71
Number of citations in Scopus 5

Iqbal, Ahmed Ali, Mahmood, Waqar, & Ahmed, Ejaz (2005) TCP-DR an effective protocol for infrastructure based wireless networks. In Proceedings of the 2005 International Conference on Wireless Networks, ICWN '05, CSREA Press, Las Vegas, Navada.
Number of full-text downloads 57
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Iqbal, Ahmed Ali, Mahmood, Waqar, Ahmed, Ejaz, & Samad, Kashan (2005) Evaluation of distributed control signaling protocols in GMPLS. In Proceedings of Fourth International Conference on the Optical Internet, Chongqing.
Number of full-text downloads 109

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 235

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 353

Jayasooriya, Ruwan, Thambiratnam, David, Perera, Nimal, & Kosse, Vladis (2009) Damage propagation in reinforced concrete frames under external blast loading. In 4th International Conference on Protection of Structures Against Hazards, 23–25 October 2009, Hotel Unisplendour Centre, Beijing. (Unpublished)
Number of full-text downloads 906

Josang, Audun (2006) Online Reputation Systems for the Health Sector. In Croll, P, Morarji, H, & Au, R (Eds.) Proceedings of the National E-Health Privacy and Security Symposium 2006, 24-25 October 2006, Australia, Queensland, Brisbane.

Josang, Audun (2007) Probabilistic logic under uncertainty. In Gudmundsson, J. & Jay, B. (Eds.) Thirteenth Computing : The Australasian Theory Symposium (CATS2007), 30 January - 2 February 2007, Ballarat, Australia.
Number of full-text downloads 157
Number of citations in Scopus 10

Josang, Audun, Al Fayyadh, Bander, Grandison, Tyrone, Alzomai, Mohammed, & McNamara, Judith (2007) Security usability principles for vulnerability analysis and risk assessment. In 23rd Annual Computer Security Application Conference, 10-14 December 2007, Miami Beach, Florida.
Number of full-text downloads 459
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Josang, Audun, Alzomai, Mohammed, & Suriadi, Suriadi (2007) Usability and privacy in identity management architectures. In Brankovic, Ljiljana, Coddington, Paul, Roddick, John F., Steketee, Chris, Warren, Jim, & Wendelborn, Andrew (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Australia.
Number of full-text downloads 514
Number of citations in Scopus 8

Josang, Audun, Marsh, Stephen, & Pope, Simon (2006) Exploring Different Types of Trust Propagation. In Stolen, K, Winsborough, W, & Martinelli, F (Eds.) 4th International Conference on Trust Management, 16 - 19 May 2006, Italy, Tuscany, Pisa.
Number of citations in Scopus 31
Number of citations in Web of Science® 16

Josang, Audun, McAnally, David, & Pope, Simon (2006) Normalising the Consensus Operator for Belief Fusion. In Tijus, C (Ed.) Proceedings of the 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2-7 July 2006, France, Paris, Les Cordeliers.

Kanagasundaram, Ahilan, Dean, David, Gonzalez-Dominguez, Javier, Sridharan, Sridha, Ramos, Daniel, & Gonzalez-Rodriguez, Joaquin (2013) Improving short utterance based I-vector speaker recognition using source and utterance-duration normalization techniques. In In Proceedings of the 14th Annual Conference of the International Speech Communication Association, International Speech Communication Association (ISCA ), Lyon, France, pp. 2465-2469.
Number of full-text downloads 192

Kanagasundaram, Ahilan, Dean, David, Gonzalez-Dominguez, Javier, Sridharan, Sridha, Ramos, Daniel, & Gonzalez-Rodriguez, Joaquin (2013) Improving the PLDA based speaker verification in limited microphone data conditions. In In Proceedings of the 14th Annual Conference of the International Speech Communication Association, International Speech Communication Association (ISCA ), Lyon, France, pp. 3674-3678.
Number of full-text downloads 105

Kanagasundaram, Ahilan, Dean, David, & Sridharan, Sridha (2014) Improving PLDA speaker verification with limited development data. In 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing, Institute of Electrical and Electronics Engineers, Florence, Italy.
Number of full-text downloads 28

Kanagasundaram, Ahilan, Dean, David, & Sridharan, Sridha (2012) JFA based Speaker Recognition using Delta-Phase and MFCC features. In SST 2012 14th Australasian International Conference on Speech Science and Technology, Macquarie University, Sydney, Australia.
Number of full-text downloads 95

Kanagasundaram, Ahilan, Dean, David, & Sridharan, Sridha (2014) Short utterance PLDA speaker verification using SN-WLDA and variance modelling techniques. In SST 2014 15th Australasian International Conference on Speech Science and Technology, 3 - 5 December 2014, Christchurch, New Zealand. (Unpublished)

Kanagasundaram, Ahilan, Dean, David B., Sridharan, Sridha, & Vogt, Robert J. (2012) PLDA based speaker verification with weighted LDA techniques. In The Speaker and Language Recognition Workshop (Odyssey 2012), ISCA, Singapore.
Number of full-text downloads 180

Kanagasundaram, Ahilan, Dean, David B., Vogt, Robert, Mclaren, Mitchell, Sridharan, Sridha, & Mason, Michael W. (2012) Weighted LDA techniques for I-vector based speaker verification. In 2012 IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE, Japan, pp. 4781-4784.
Number of full-text downloads 175
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Kanagasundaram, Ahilan, Vogt, Robbie, Dean, David B., Sridharan, Sridha, & Mason, Michael W. (2011) i-vector based speaker recognition on short utterances. In Proceedings of the 12th Annual Conference of the International Speech Communication Association, International Speech Communication Association (ISCA ), Firenze Fiera, Florence, pp. 2341-2344.
Number of full-text downloads 2,440
Number of citations in Scopus 13

Kanagasundaram, Ahilan, Vogt, Robert J., Dean, David B., & Sridharan, Sridha (2012) PLDA based speaker recognition on short utterances. In The Speaker and Language Recognition Workshop (Odyssey 2012), ISCA, Singapore.
Number of full-text downloads 200

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 343

Kiani, Mehdi, Clark, Andrew J., & Mohay, George M. (2008) Evaluation of anomaly based character distribution models in the detection of SQL injection attacks. In Third International Conference on Availability, Reliability and Security, 4-7 March, 2008, Barcelona, Spain.
Number of full-text downloads 403
Number of citations in Scopus 8
Number of citations in Web of Science® 2

Kim, Ji Hong, Sahama, Tony, & Kim, Sung Yong (2013) A performance test of query operation on encrypted database. In Jung, H.K (Ed.) Future Information Communication Technology and Applications Lecture Notes in Electrical Engineering, Springer, Shenyang, China, pp. 801-810.

Kleinschmidt, Tristan, Boyraz, Pinar, Boril, Hynek, Sridharan, Sridha, & Hansen, John H. L. (2009) Assessment of Speech Dialog Systems using Multi-Modal Cognitive Load Analysis and Driving Performance Metrics. In Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, Pride Hotel, Pune, India, pp. 167-172.
Number of full-text downloads 120

Kleinschmidt, Tristan, Dean, David, Sridharan, Sridha, & Mason, Michael (2007) A Continuous Speech Recognition Evaluation Protocol for the AVICAR Database. In International Conference On Signal Processing and Communication Systems, 17-19 December, 2007, Gold Coast, Australia. (In Press)
Number of full-text downloads 172

Kleinschmidt, Tristan, Goonetilleke, Ashantha, Fookes, Clinton B., & Yarlagadda, Prasad K.D.V. (2010) A multi-disciplinary approach for the design and management of airport terminals. In Satyanarayana, Beela & Ramji, Koona (Eds.) Proceedings of the Third International and Twenty Fourth All India Manufacturing Technology, Design and Research Conference 2010 - Global Trends and Challenges in Design and Manufacturing, AUCE (A), Visakhapatnam, India, Andhra University, Visakhapatnam, India, pp. 57-62.
Number of full-text downloads 368

Kleinschmidt, Tristan, Mason, Michael W., Wong, Eddie, & Sridharan, Sridha (2009) The Australian English speech corpus for in-car speech processing. In IEEE International Conference on Acoustics, Speech and Signal Processing, 19-24 April 2009, Taipei, Taiwan.
Number of full-text downloads 131
Number of citations in Scopus 1

Kleinschmidt, Tristan, Sridharan, Sridha, & Mason, Michael (2009) Likelihood-maximising frameworks for enhanced in-car speech recognition. In 4th Biennial Workshop on DSP for In-Vehicle Systems and Safety, 25-27 June, 2009, Dallas, TX, USA.
Number of full-text downloads 79

Kleinschmidt, Tristan, Sridharan, Sridha, & Mason, Michael (2010) The effect of dialect mismatch on likelihood-maximising speech enhancement for noise-robust speech recognition. In Tabain, Marija, Fletcher, Janet, Grayden, David, Hajek, John, & Butcher, Andy (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology, The Australasian Speech Science & Technology Association, La Trobe University, Melbourne, Victoria, pp. 114-117.
Number of full-text downloads 40

Kleinschmidt, Tristan, Sridharan, Sridha, & Mason, Michael W. (2010) The application of phonetic distribution normalisation to likelihood-maximising speech enhancement for robust ASR. In Tabain, Marija, Fletcher, Janet, Grayden, David, Hajek, John, & Butcher, Andy (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology, The Australasian Speech Science and Technology Association Inc., La Trobe University, Melbourne, Victoria, pp. 118-121.
Number of full-text downloads 37

Kleinschmidt, Tristan F., Sridharan, Sridha, & Mason, Michael W. (2007) A Modified LIMA Framework for Spectral Subtraction Applied to In-Car Speech Recognition. In International Conference On Signal Processing and Communication Systems, 17-19 December, 2007, Gold Coast, Australia. (In Press)
Number of full-text downloads 113

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Number of full-text downloads 102
Number of citations in Scopus 1

Kush, Nishchal, Foo, Ernest, Ahmed, Ejaz, Ahmed, Irfan, & Clark, Andrew (2011) Gap analysis of intrusion detection in smart grids. In Valli, Craig (Ed.) Proceedings of the 2nd International Cyber Resilience Conference, secau - Security Research Centre, Duxton Hotel, Perth, WA, pp. 38-46.
Number of full-text downloads 463

Lakemond, Ruan, Fookes, Clinton, & Sridharan, Sridha (2009) Dense Correspondence Extraction in Difficult Uncalibrated Scenarios. In 2009 Digital Image Computing : Techniques and Applications, IEEE Computer Society Conference Publishing Services, Melbourne, Australia, pp. 53-60.
Number of full-text downloads 172
Number of citations in Scopus 3

Lakemond, Ruan, Fookes, Clinton B., & Sridharan, Sridha (2009) Affine adaptation of local image features using the Hessian Matrix. In IEEE International Conference On Advanced Video and Signal Based Surveillance, 2-4 September 2009, Genoa, Italy. (In Press)
Number of full-text downloads 611
Number of citations in Scopus 6

Lakemond, Ruan, Fookes, Clinton B., & Sridharan, Sridha (2011) Negative determinant of Hessian features. In International Conference on Digital Image Computing : Techniques and Applications (DICTA 2011), 6-8 December 2011, Sheraton Noosa Resort & Spa, Noosa, QLD. (In Press)
Number of full-text downloads 85

Lakemond, Ruan, Fookes, Clinton B., & Sridharan, Sridha (2009) PhD forum : multiple camera management using wide base-line matching. In Proceeding of the 3rd ACM/IEEE International Conference on Distributed Smart Cameras, 30 August - 2 September 2009, Como, Italy.
Number of full-text downloads 60

Lakemond, Ruan, Fookes, Clinton B., & Sridharan, Sridha (2011) Practical improvements to simultaneous computation of multi-view geometry and radial lens distortion. In International Conference on Digital Image Computing : Techniques and Applications (DICTA 2011), 6-8 December 2011, Sheraton Noosa Resort & Spa, Noosa, QLD. (In Press)
Number of full-text downloads 49

Lakemond, Ruan, McKinnon, David N., Fookes, Clinton B., & Sridharan, Sridha (2007) A Feature Clustering Algorithm for Scale-space Analysis of Image Structures. In International Conference on Signal Processing and Communication Systems 2007, 17-19 December 2007, Gold Coast, Australia. (In Press)
Number of full-text downloads 307

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW. (In Press)
Number of full-text downloads 65

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. In The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Deakin University, Melbourne, VIC.
Number of full-text downloads 51

Liang, Jian, Iannella, Renato, & Sahama, Tony R. (2011) Synchronised integrated online e-health profiles. In Hansen, David (Ed.) Studies in Health Technology and Informatics, ISO Press, Melbourne, VIC, pp. 96-103.
Number of citations in Scopus 2

Lin, Frank C., Denman, Simon, Chandran, Vinod, & Sridharan, Sridha (2007) Automatic tracking, super-resolution and recognition of human faces from surveillance video. In Proceedings of IAPR Conference on Machine Vision Applications 2007, The International Association for Pattern Recognition, Institute of Industrial Science, The University of Tokyo, pp. 37-40.
Number of full-text downloads 102
Number of citations in Scopus 2

Lin, Frank C., Fookes, Clinton B., Chandran, Vinod, & Sridharan, Sridha (2005) Investigation into optical flow super-resolution for surveillance applications. In Lovell, Brian C. & Maeder, Anthony J. (Eds.) APRS Workshop on Digital Image Computing: Pattern Recognition and Imaging for Medical Applications, 21 February, 2005, Brisbane.
Number of full-text downloads 282

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Efficient certificateless KEM in the standard model. In Hong, Seokhie & Lee, Donghoon (Eds.) Lecture Notes in Computer Science : Information, Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korea University, Seoul, pp. 34-46.
Number of full-text downloads 159
Number of citations in Scopus 1

Lippold, Georg & Gonzalez Nieto, Juan Manuel (2010) Certificateless key agreement in the standard model. In Boyd, Colin & Susilo, Willy (Eds.) Proceedings of the 8th Australasian Information Security Conference (AISC 2010), ACS, Queensland University of Technology, Brisbane, Queensland, pp. 75-85.
Number of full-text downloads 261

Liu, Junbin, O'Rourke, Damien, Wark, Tim, Denman, Simon, & Sridharan, Sridha (2010) A distributed protocol for object tracking in wireless multimedia sensor networks. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2010 6th International Conference, IEEE, Brisbane, Australia, pp. 67-72.
Number of citations in Scopus 1

Liu, Junbin, O'rourke, Damien, Wark, Tim, Lakemond, Ruan, & Sridharan, Sridha (2009) Camera calibration in wireless multimedia sensor networks. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2009 5th International Conference on, I E E E, Melbourne, Australia, pp. 301-306.
Number of full-text downloads 79
Number of citations in Scopus 3

Liu, Junbin, Wark, Tim, Martin, Steven Colin, Corke, Peter, & D'Souza, Matthew (2011) Distributed object tracking with robot and disjoint camera networks. In Proceedings of the PerCom - WORKSHOPS 2011 : 2011 IEEE International Conference on Pervasive Computing and Communications Workshop, IEEE Xplore, Renaissance Seattle Hotel, Seattle, pp. 380-383.
Number of full-text downloads 126

Liu, Vicky, Caelli, William, Smith, Jason, May, Lauren J., Lee, Min Hui, Ng, Zi Hao, et al. (2010) A secure architecture for Australia’s index based e-health environment. In Maeder , Anthony & Hansen, David (Eds.) Proceedings of The Australasian Workshop on Health Informatics and Knowledge Management (part of Australasian Computer Science Week ACSW 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 265

Liu, Vicky, Caelli, William, Yang, Yingsen, & May, Lauren (2011) A test vehicle for compliance with resilience requirements in index-based e-health systems. In Chang, She-I (Ed.) Pacific Asia Conference on Information Systems (PACIS) 2011, 7-11 July 2011, Queensland University of Technology, Brisbane, Qld.
Number of full-text downloads 123

Liu, Vicky, Caelli, William J., May, Lauren J., & Croll, Peter R. (2008) Open Trusted Health Informatics Structure(OTHIS). In Yu, Ping, Warren, James R., Yearwood, John, & Patrick, Jon (Eds.) Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008), 22nd - 25th January 2008, University of Wollongong NSW Australia.
Number of full-text downloads 272

Liu, Vicky, Caelli, William J., May , Lauren, & Sahama , Tony (2009) Privacy and security in open and trusted health information systems. In Warren, James R. (Ed.) Proceedings of the Third Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2009), Australian Computer Society, Wellington, New Zealand, pp. 25-30.
Number of full-text downloads 154

Liu, Vicky, Franco, Luis, Caelli, William, May, Lauren, & Sahama , Tony (2009) Open and trusted information systems/health informatics access control (OTHIS/HIAC). In Brankovic, Ljiljana & Susilo, Willy (Eds.) Seventh Australasian Information Security Conference (AISC 2009), Australian Computer Science, Wellington, New Zealand, pp. 99-108.
Number of full-text downloads 144

Long, Benjamin W. & Fidge, Colin J. (2006) Formally analysing a security protocol for replay attacks. In Han, Jun & Staples, Mark (Eds.) 17th Australian Software Engineering Conference (ASWEC 2006), 18-21 April 2006, Sydney.
Number of full-text downloads 501
Number of citations in Scopus 1

Lucey, Patrick & Sridharan, Sridha (2008) A visual front-end for a continuous pose-invariant lipreading system. In Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems, 15-17 December 2008, Australia, Queensland, Gold Coast.

Lucey, Patrick J., Dean, David B., & Sridharan, Sridha (2005) Problems Associated with Current Area-Based Visual Speech Feature Extraction Techniques. In International Conference on Auditory-Visual Speech Processing (AVSP), July 24-27, Vancouver Island, British Columia, Canada.
Number of full-text downloads 146

Lucey, Patrick J., Howlett, Jessica M., Cohn, Jeffrey, Lucey, Simon, Sridharan, Sridha, & Ambadar, Zara (2008) Improving Pain Recognition Through Better Utilisation of Temporal Information. In Goecke, Roland, Lucey, Patrick J., & Lucey, Simon (Eds.) International Conference on Auditory-Visual Speech Processing, 26-29 September 2008, Tangalooma, Australia.

Lucey, Patrick J., Potamianos, Gerasimons, & Sridharan, Sridha (2008) Patch-Based Analysis of Visual Speech From Multiple Views. In Goecke, Roland, Lucey, Patrick J., & Lucey, Simon (Eds.) International Conference on Auditory-Visual Speech Processing, 26-29 September, Tangalooma, Australia.
Number of full-text downloads 88

Lucey, Patrick J., Potamianos, Gerasimos, & Sridharan, Sridha (2007) An Extended Pose-Invariant Lipreading System. In Vroomen, Jean, Swerts, Marc, & Krahmer, Emiel (Eds.) International Workshop on Auditory-Visual Speech Processing, August 31 - September 3, 2007, Kasteel Groendael, Hilvarenbeek.
Number of full-text downloads 169

Lucey, Patrick J., Potamianos, Gerasimos, & Sridharan, Sridha (2007) A Unified Approach to Multi-Pose Audio-Visual ASR. In 8th Annual Conference of the International Speech Communication Association (Interspeech 2007), August 27-31, Antwerp, Belgium.
Number of full-text downloads 133

Lucey, Patrick J. & Sridharan, Sridha (2006) Patch-Based Representation of Visual Speech. In Goecke, R., Robles-Kelly, A., & Caelli, T. (Eds.) HCSNet Workshop on the Use of Vision in Human-Computer Interaction (VisHCI 2006), November 1-3, Canberra, Australia.
Number of full-text downloads 110

Lucey, Patrick J., Sridharan, Sridha, & Dean, David B. (2008) Continuous Pose-Invariant Lipreading. In Interspeech 2008, 22-26 September 2008, Brisbane, Australia.
Number of full-text downloads 182
Number of citations in Scopus 3
Number of citations in Web of Science® 2

MacDonald, Roslyn M., Burdon, Mark, & Jackson, Sheryl M. (2006) Ensuring the integrity of the E-court process. In Justice Environments Conference 2006, 20-22 April, Melbourne. (Unpublished)
Number of full-text downloads 572

Mamic, George J., Fookes, Clinton B., & Sridharan, Sridha (2006) What is the average human face? In Chang, Long-Wen & Lie, Wen-Nung (Eds.) Advances in image and video technology : First Pacific Rim Symposium, PSIVT 2006, Hsinchu, Taiwan, December 10-13, 2006, Proceedings, Springer, Hsinchu, Taiwan, pp. 692-701.
Number of full-text downloads 196
Number of citations in Scopus 1

Marrington, Andrew, Branagan, Mark, & Smith, Jason (2007) Forensic challenges in service oriented architectures. In 2007 Research Network for a Secure Australia : Security Technology Conference, 28 September 2007, Melbourne University, Melbourne, Victoria.
Number of full-text downloads 288

Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew (2006) Computer profiling to assist computer forensic investigations. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, Australian Homeland Security Research Centre, Canberra, Australian Capital Territory, pp. 287-301.

Marrington, Andrew, Mohay, George M., Morarji, Hasmukh L., & Clark, Andrew J. (2010) A model for computer profiling. In Proceedings of the Third International Workshop on Digital Forensics, Andrzej Frycz Modrzewski Cracow College, Krakow, Poland.
Number of full-text downloads 140

Marrington, Andrew D., Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2007) Event-based computer profiling for the forensic reconstruction of computer activity. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld.
Number of full-text downloads 1,077

Mason, Michael W., Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2005) Data-driven clustering for blind feature mapping in speaker verification. In Interspeech 2005, 4-8 September 2005, Lisbon, Portugal.
Number of full-text downloads 220
Number of citations in Scopus 3

Mawilmada, Pubudika, Sahama, Tony, & Smith, Susan (2011) How to Improve Cardiac Surgery Decision Making? In Data Warehousing Perspective. In International Conference on Innovation and Management, Kuala Lumpur, Malaysia, p. 165.
Number of full-text downloads 7

May, Lauren J. & Burdon, Mark (2006) E-courts: Toward information protection management structures. In Michael, Katina & Michael, M. G. (Eds.) The First Workshop on the Social Implications of National Security, 29 May, Wollongong.

May, Lauren J. & Burdon, Mark (2006) Ensuring the integrity of Australia’s e-Court process. In Mendis, Priyan, Lai, Joseph, & Dawson, Edward P. (Eds.) RNSA Security Technology Conference 2006, 20 October, Canberra.

McKinnon, David N., Lakemond, Ruan, Fookes, Clinton B., & Sridharan, Sridha (2007) Ground-Plane Based Projective Reconstruction for Surveillance Camera Networks. In International Conference on Signal Processing and Communication Systems 2007, 17-19 December 2007, Gold Coast, Australia. (In Press)
Number of full-text downloads 122

McLaren, Mitchell L., Baker, Brendan J., Vogt, Robert J., & Sridhara, Sridha (2009) Improved SVM speaker verification through data-driven background dataset selection. In IEEE International Conference on Acoustics, Speech, and Signal Processing, 19-24 April 2009, Taipei, Taiwan.
Number of full-text downloads 209
Number of citations in Scopus 8
Number of citations in Web of Science® 5

McLaren, Mitchell L., Baker, Brendan J., Vogt, Robert J., & Sridharan, Sridha (2010) Exploiting multiple feature sets in data-driven impostor dataset selection for speaker verification. In Proceedings of 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP2010), IEEE, Sheraton Dallas Hotel, Dallas, Texas, pp. 4434-4437.
Number of full-text downloads 61
Number of citations in Scopus 2
Number of citations in Web of Science® 2

McLaren, Mitchell L., Matrouf, Driss, Vogt, Robert J., & Bonastre, Jean-Francois (2008) Combining continuous progressive model adaptation and factor analysis for speaker verification. In Interspeech 2008, 22-26 September 2008, Brisbane, Australia.
Number of full-text downloads 278
Number of citations in Web of Science® 1

McLaren, Mitchell L., Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2007) A Comparison of Session Variability Compensation Techniques for SVM-Based Speaker Recognition. In Interspeech 2007, August 27-31, Antwerp, Belgium.
Number of full-text downloads 381

McLaren, Mitchell L., Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2009) Improved GMM-based speaker verification using SVM-driven impostor dataset selection. In Proceedings of Interspeech 2009, International Speech Communication Association (ISCA), Brighton Centre, Brighton, pp. 1267-1270.

McLaren, Mitchell L., Vogt, Robert J., & Sridharan, Sridha (2007) SVM speaker verification using session variability modelling and GMM supervectors. In Lee, S.-W. & Li, S.Z. (Eds.) Proceedings of : 2nd International Conference, ICB 2007 : Advances in Biometrics, August 27-29, 2007, Seoul, Korea.
Number of full-text downloads 186
Number of citations in Scopus 1
Number of citations in Web of Science® 2

McNamara, Judith (2008) The challenge of assessing student capabilities in legal internships. In WACE Asia Pacific Conference, 30 Sept - 3rd Oct 2008, Sydney, Australia.
Number of full-text downloads 371

McNamara, Judith & O'Shea, Kathryn L. (2007) Minimising Legal Risks in Electronic Contracting. In Collector (Collaborative Electronic Commerce Technology and Research) Conference, 9-11 December 2007, Melbourne.
Number of full-text downloads 1,026

Merkley, Erik E., Baker, Brendan J., Vogt, Robert J., & Sridharan, Sridha (2008) A study of phonetic feature representations for SVM-based speaker verification. In Wysocki, Beta & Tadeusz, Wysocki (Eds.) 2nd International Conference on Signal Processing and Communication Systems 2008, 15-17 December 2008, Gold Coast, Australia.
Number of full-text downloads 71

Messerman, A., Mustafic, T., Camtepe, S. A., & Albayrak, S. (2010) A generic framework and runtime environment for development and evaluation of behavioral biometrics solutions. In Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, IEEE Conference Publications , Cairo, Egypt, pp. 136-141.
Number of citations in Scopus 3

Messerman, Arik, Mustafic, Tarik, Camtepe, Seyit A., & Albayrak, Sahin (2011) Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In Proceedings of the 2011 International Joint Conference on Biometrics IJCB '11, IEEE Conference Publications , Washington, D.C., pp. 1-8.

Millan, William (2005) New Cryptographic Applications of Boolean Function Equivalence Classes. In Boyd, C & Neito, J (Eds.) Information Security and Privacy - 10th Australasian Conference, ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Mills, Chris, Fidge, Colin J., & Corney, Diane (2012) Tool-supported dataflow analysis of a security-critical embedded device. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 59-70.
Number of full-text downloads 219

Moeller, Martin, Bye, Rainer, Bsufka, Karsten, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2011) From simulation to emulation : an integrated approach for network security evaluation. In Heiss, Hans-Ulrich, Pepper, Peter, Schlingloff, Holger, & Schneider, Joerg (Eds.) Lecture Notes in Informatics, Gesellschaft fuer Informatik e.V. (GI), Berlin, Germany.
Number of full-text downloads 233

Mohay, George (2006) From Computer Forensics to Digital Forensics. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Mohay, George (2005) Technical Challenges and Directions for Digital Forensics. In Huang, M (Ed.) First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005, 7-9 November 2005, Taipei, Taiwan.
Number of citations in Scopus 13

Mohay, George & Zimmermann, Jakub (2006) Distributed Intrusion Detection in Clusters Based on Non-Interference. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, 16 - 19 January 2006, Australia, Tasmania, Hobart.

Mosca, Michele & Stebila, Douglas (2010) Quantum coins. In Bruen, Aiden A. & Wehlau, David L. (Eds.) Contemporary Mathematics, American Mathematical Society, Toronto, Ontario, pp. 35-47.
Number of full-text downloads 144
Number of citations in Web of Science® 4

Moskovitch, Robert, Feher, Clint, Messerman, Arik, Kirschnick, Niklas, Mustafic, Tarik, Camtepe, Seyit A., et al. (2009) Identity theft, computers and behavioral biometrics. In Proceedings of the IEEE international conference on Intelligence and security informatics, IEEE Press, Piscataway, N. J., pp. 155-160.
Number of citations in Scopus 12

Mustafic, Tarik, Messerman, Arik, Camtepe, Seyit Ahmet, Schmidt, Aubrey-Derrick, & Albayrak, Sahin (2011) Behavioral biometrics for persistent single sign-on. In Proceedings of the 7th ACM Workshop on Digital Identity Management, ACM, Chicago, IL, USA, pp. 73-82.
Number of citations in Scopus 2

Navarathna, Rajitha, Dean, David B., Lucey, Patrick J., & Sridharan, Sridha (2010) Audio visual automatic speech recognition in vehicles. In Proceedings of AutoCRC2010 Conference, Cliftons, Melbourne. (In Press)
Number of full-text downloads 159

Navarathna, Rajitha, Dean, David B., Lucey, Patrick J., Sridharan, Sridha, & Fookes, Clinton B. (2010) Cascading appearance-based features for visual voice activity detection. In Proceedings of International Conference on Auditory-Visual Speech Processing (AVSP2010), Auditory-visual Speech Processing (AVSP) , The Prince Hakone, Hakone, Kanagawa, pp. 3-7.
Number of full-text downloads 94

Navarathna, Rajitha, Dean, David B., Lucey, Patrick J., Sridharan, Sridha, & Fookes, Clinton B. (2010) Recognising audio-visual speech in vehicles using the AVICAR database. In Tabain, Marija, Fletcher, Janet, Grayden, David, Hajek, John, & Butcher, Andy (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology, The Australasian Speech Science & Technology Association, Melbourne, Vic, pp. 110-113.
Number of full-text downloads 137

Navarathna, Rajitha, Dean, David B., Sridharan, Sridha, Fookes, Clinton B., & Lucey, Patrick J. (2011) Visual voice activity detection using frontal versus profile views. In The International Conference on Digital Image Computing : Techniques and Applications (DICTA2011), 6-8 December 2011, Sheraton Noosa Resort & Spa, Noosa, QLD.
Number of full-text downloads 99

Navarathna, Rajitha, Kleinschmidt, Tristan, Dean, David B., Sridharan, Sridha, & Lucey, Patrick J. (2011) Can audio-visual speech recognition outperform acoustically enhanced speech recognition in automotive environment? In Interspeech 2011, 27-31 August 2011, Firenze Fiera, Florence.
Number of full-text downloads 97
Number of citations in Scopus 1

Navarathna, Rajitha & Lucey, Patrick J. (2009) Facial feature detection for in-car environment. In 3rd Biennial Smart Systems Student Conference, 16 October 2009, Brisbane, Queensland. (Unpublished)
Number of full-text downloads 201

Navarathna, Rajitha, Lucey, Patrick J., Dean, David B., Fookes, Clinton B., & Sridharan, Sridha (2010) Lip detection for audio-visual speech recognition in-car environment. In Boashash, Boualem, Hamila, Ridha, Salleh, Sheikh Hussain Shaikh, & Bakar, syed Abd Rahman Abu (Eds.) Proceedings of 10th International Conference on Information Science, Signal Processing and their Applications, IEEE, Renaissance Hotel, Kuala Lumpur, pp. 598-601.
Number of full-text downloads 212
Number of citations in Scopus 3

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proofs for Diffie–Hellman–based key exchanges. In Backes, Michael & Zdancewic, Steve (Eds.) 2011 IEEE 24th Computer Security Foundations Symposium (CSF 2011), IEEE, Abbaye des Vaux-de-Cernay, Cernay-la-Ville, pp. 51-65.
Number of full-text downloads 149
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2010) Automating computational proofs for public-key-based key exchange. In Heng, Swee-Huay & Kurosawa, Kaoru (Eds.) Provable Security : Proceedings of the 4th International Conference on Provable Security, Springer, Hotel Equatorial Melaka, Malacca, Malaysia, pp. 53-69.
Number of full-text downloads 139
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Nugawela, Saliya & Sahama, Tony (2011) Barriers to the adoption of health information technology. In Proceedings of International Conference on Innovation and Management (IAM), Kuala Lumpur, Malaysia, Kuala Lumpur, Malaysia.
Number of full-text downloads 45

Nugawela, Saliya & Sahama, Tony R. (2011) Clinical data integration approach using SAS clinical data integration server (CDI) tools. In Health Informatics: Transforming Healthcare with Technology, Brisbane, pp. 119-123.
Number of full-text downloads 50

Nyeem, Hussain, Boles, Wageeh, & Boyd, Colin (2011) Developing a digital image watermarking model. In DICTA '11 Proceedings of the 2011 International Conference on Digital Image Computing: Techniques and Applications, IEEE, Noosa, QLD, pp. 468-473.
Number of full-text downloads 233
Number of citations in Scopus 6

Nyeem, Hussain, Boles, Wageeh, & Boyd, Colin (2012) On the robustness and security of digital image watermarking. In Proceedings of International Conference on Informatics, Electronics & Vision, Dhaka, Bangladesh. (In Press)
Number of full-text downloads 637

O'Rourke, Damien, Jurdak, Raja, Liu, Junbin, Moore, Darren, & Wark, Tim (2009) On the feasibility of using servo-mechanisms in wireless multimedia sensor network deployments. In Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference on, IEEE, Zurich, Switzerland, pp. 826-833.
Number of full-text downloads 204
Number of citations in Scopus 5
Number of citations in Web of Science® 4

Othman, Mohd Fairuz Iskandar, Chan, Taizan, & Foo, Ernest (2011) IT governance adoption in Malaysia : a preliminary investigation. In Australasian Conference on Information Systems (ACIS 2011), 29 November - 2 December 2011, Sydney Law School, Sydney, NSW.
Number of full-text downloads 301

Othman, Mohd Fairuz Iskandar, Chan, Taizan, Foo, Ernest, Nelson, Karen J., & Timbrell, Gregory T. (2011) Barriers to information technology governance adoption : a preliminary empirical investigation. In Soliman, Khalid S. (Ed.) Proceedings of 15th International Business Information Management Association Conference, Cairo, Egypt, pp. 1771-1787.
Number of full-text downloads 998

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 260

Paterson, Kenneth G. & Stebila, Douglas (2010) One-time-password-authenticated key exchange. In Steinfeld, Ron & Hawkes, Philip (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 441
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Peng, Kun & Dawson, Edward P. (2007) Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. In Dawson, Edward P. & Wong, Duncan S. (Eds.) Third International Conference, ISPEC 2007: Information Security Practice and Experience, May 7-9, 2007, Hong Kong, China.
Number of full-text downloads 73
Number of citations in Scopus 9
Number of citations in Web of Science® 8

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2005) Challenges of automating the detection of paedophile activity on the Internet. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November 2005, Taipei, Taiwan.
Number of full-text downloads 2,102
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2010) A framework for improved adolescent and child safety in MMOs. In Memon, Nasrullah & Alhajj, Reda (Eds.) 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), IEEE Computer Society, University of Southern Denmark, Odense, Denmark, pp. 33-40.
Number of full-text downloads 150

Pham, Quan, McCullagh, Adrian J., & Dawson, Edward P. (2007) Consistency of user attribute in federated systems. In Lambrinoudakis, Costas, Pernul, Gunther, & Min Tjoa, A. (Eds.) Lecture Notes in Computer Science, Springer, Regensburg, Germany, pp. 165-177.
Number of full-text downloads 114
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China.
Number of full-text downloads 91

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2008) Commitment issues in delegation process. In Proceedings of the 6th Australasian Conference on Information Security, Australian Computer Society Inc., Wollongong, N.S.W.
Number of full-text downloads 48

Pham, Quan, Reid, Jason F., McCullagh, Adrian J., & Dawson, Edward P. (2009) On a taxonomy of delegation. In Emerging Challenges for Security, Privacy and Trust - IFIP Advances in Information and Communication Technology 2009, Springer-Verlag, Pafos, Cyprus, pp. 353-363.
Number of full-text downloads 71
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 115

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 48
Number of citations in Scopus 1

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi, Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 311

Raghavan, Sriram, Clark, Andrew J., & Mohay, George M. (2009) FIA : an open foresic integration architecture for composing digital evidence. In Sorell, Matthew (Ed.) Forensics in Telecommunications, Information and Multimedia, Springer Berlin Heidelberg, Adelaide, South Australia, pp. 83-94.
Number of full-text downloads 773

Ranasinghe, Indika, Sahama, Tony R., & Yarlagadda, Prasad K. (2009) Evidence based healthcare planning in developing countries : an informatics perspective. In Sintchenko, Vitali & Croll, Peter (Eds.) HIC 2009: Proceedings; Frontiers of Health Informatics - Redefining Healthcare, HISA Ltd., 2009, Canberra, A. C. T., pp. 149-154.
Number of full-text downloads 53

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 215
Number of citations in Scopus 5

Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller , Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Number of full-text downloads 171
Number of citations in Scopus 56

Reid, Jason F., Senadji, Bouchra, & Tang, Tee G. (2005) Security Considerations for Conducted and Radiated Emissions. In Asia Pacific Symposium on EMC Taipei - APEMC 2005, Taipei, Taiwan.
Number of full-text downloads 552

Ring, Jared W., Foo, Ernest, & Looi, Mark (2007) On ensuring continuity of mobile communications in a disaster environment. In Research Network for a Secure Australia : Security Technology Conference, The Research Network for a Secure Australia (RNSA), Melbourne, pp. 268-278.
Number of full-text downloads 130

Ring, Jared W., Foo, Ernest, & Looi, Mark H. (2007) A secure billing architecture for 4G wireless networks. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20th - 25th May 2007, Gold Coast, Qld..
Number of full-text downloads 147

Ross, David A., Clark, Andrew J., & Looi, Mark H. (2007) Securely deploying IEEE 802.11 WLANs. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld..
Number of full-text downloads 500

Ryan, David, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2009) Crowd Counting Using Multiple Local Features. In Digital Image Computing: Technqiues and Applications, 2009. DICTA '09. Proceedings, Melbourne, Victoria. (In Press)
Number of full-text downloads 631
Number of citations in Scopus 12
Number of citations in Web of Science® 5

Ryan, David, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2010) Crowd counting using group tracking and local features. In 7th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS 2010), 29 August - 1 September 2010, Boston.
Number of full-text downloads 662
Number of citations in Scopus 5

Ryan, David, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2008) Scene invariant crowd counting for real-time surveillance. In International Conference on Signal Processing and Communication Systems 2008, 15-17 December 2008, Gold Coast, Australia.
Number of full-text downloads 162

Ryan, David, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2011) Textures of optical flow for real-time anomaly detection in crowds. In Piciarelli, Claudio (Ed.) Proceedings of the 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS 2011), IEEE, Klagenfurt University, Klagenfurt, Austria, pp. 1-6. (In Press)
Number of full-text downloads 318
Number of citations in Scopus 9

Ryan, David, Denman, Simon, Sridharan, Sridha, & Fookes, Clinton B. (2011) Scene invariant crowd counting. In Digital Image Computing : Technqiues and Applications 2011, 6-8 December 2011, Sheraton Noosa Resort & Spa, Noosa, QLD. (In Press)
Number of full-text downloads 199
Number of citations in Scopus 2

Sahama, Tony (2009) Health informatics domain knowledge analysis : an information technology perspective. In Sintchenko, Vitali & Croll, Peter (Eds.) HIC 2009 : Proceedings : Frontiers of Health Informatics - Redefining Healthcare, Health Informatics Society of Australia (HISA), National Convention Centre, Canberra.
Number of full-text downloads 36

Sahama, Tony, Ho-Stuart, Chris, & Hogan, James M. (2004) Developing and delivering a software internationalisation subject. In Hogan, J., Montague, P., Purvis, M., & Steketee, C. (Eds.) ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, Australian Computer Society, Inc, Dunedin, New Zealand, pp. 199-204.

Sahama, Tony & Miller, Evonne (2011) Informed use of patients' records on trusted health care services. In Borycki, Elizabeth (Ed.) International Perspectives in Health Informatics, ISO Press, Victoria, BC, Canada, pp. 127-131.
Number of citations in Scopus 1

Sahama, Tony, Peach, Deborah, Hargreaves, Megan, & Willett, Graham (2010) Assessing performance and capability in the work place : focusing on essential skills and knowledge in student work placements. In Jackson, Norman & Law, Russ (Eds.) Enabling a More Complete Education Conference e-Proceedings, University of Surrey, Guildford, Surrey, England, University of Surrey, Guildford, Surrey, pp. 133-141.
Number of full-text downloads 65

Sahama, Tony, Simpson, Leonie, & Lane, Bill (2013) Security and privacy in eHealth : is it possible? A sociotechnical analysis. In Rodrigues, Joel Rodrigue (Ed.) 15th International Conference on e-Health Networking, Applications and Services, 9 -12 October 2013, Lisbon, Portugal. (In Press)
Number of full-text downloads 202

Sahama, Tony, Willis, Jenny, & Hargreaves, Megan (2010) Learning without boundaries. In STEM in Education Conference : Science, Technology, Engineering and Mathematics in Education Conference, 26 - 27 November 2010, Queensland University of Technology, Brisbane, Queensland, Australia.
Number of full-text downloads 10

Sahama, Tony R. & Croll, Peter R. (2007) A Data Warehouse Architecture for Clinical Data Warehousing. In Roddick, J. F. & Warren, J. R. (Eds.) Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007), 30 January-2 February 2007, Ballarat, Victoria.
Number of full-text downloads 1,254
Number of citations in Scopus 2

Sahama, Tony R. & Diamond, Neil T. (2008) Computer experiment – a case study for modelling and simulation of manufacturing systems. In Asian International Journal of Science and Technology in Production and Manufacturing (2008), Gold Coast, Brisbane, pp. 97-103.
Number of full-text downloads 77

Sahama, Tony R., Kushniruk, Andre, & Kuwata, Shigeki (2013) Information accountability and usability : are there any connections? In Borycki, Elizabeth (Ed.) Available, Tailored and Closer : Enabling Health and Healthcare Through ICT : Information Technology and Communications in Health (ITCH) Conference 2013, Studies in Health Technology and Informatics, IOS Press, Victoria, British Columbia, Canada , pp. 145-150.
Number of full-text downloads 50

Salim, Farzad, Chang, Chee Fon, Krishna, Aneesh, & Ghose, Aditya (2005) Towards executable specification : combining i* and AgentSpeak(L). In Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering, Knowledge Systems Institute, Howard International House, Taipei, 739-742 .
Number of full-text downloads 54
Number of citations in Scopus 3

Salim, Farzad, Dulleck, Uwe, Reid, Jason F., & Dawson, Edward (2011) Optimal budget allocation in budget-based access control. In The 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, Vienna University of Technology, Vienna.
Number of full-text downloads 63

Salim, Farzad, Reid, Jason, Dulleck, Uwe, & Dawson, Edward (2010) Towards a game theoretic authorisation model. In Proceedings of Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany.
Number of full-text downloads 337
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) An administrative model for UCON. In Proceedings of he 8th Australasian Information Security Conference (AISC 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland, pp. 32-38.
Number of full-text downloads 126

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) An approach to access control under uncertainty. In ARES, IEEE, Vienna University of Technology, Vienna, pp. 1-8.
Number of full-text downloads 129
Number of citations in Scopus 5

Salim, Farzad, Sheppard, Nicholas P., & Safavi-Naini, Rei (2007) Enforcing P3P policies using a digital rights management system. In Privacy Enhancing Technologies, Springer, University of Ottawa, Ottawa, pp. 200-217.
Number of full-text downloads 57
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Salim, Farzad, Sheppard, Nicholas P., & Safavi-Naini, Rei (2010) A rights management approach to securing data distribution in coalitions. In Proceedings of 1st Asia-Pacific Workshop on Cyber Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 42
Number of citations in Scopus 3

Samad, Kashan, Ahmed, Ejaz, Mahmood, Waqar, Sharif, Kashif, & Chaudhry, Ahsan A. (2005) Efficient clustering approach for intrusion detection in adhoc networks. In Proceedings of Engineering Sciences and Technology, 2005. SCONEST 2005. Student Conference on, IEEE, NED University of Engineering and Technology, Karachi, pp. 1-6.
Number of full-text downloads 57

Schatz, Bradley & Clark, Andrew J. (2006) An open architecture for digital evidence integration. In Clark, Andrew J., McPherson, Mark, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 21-26 May 2006, Gold Coast, Queensland.
Number of full-text downloads 331

Schatz, Bradley & Cohen, Michael (2010) Hash based disk imaging using AFF4. In Digital Investigation : The Proceedings of the Tenth Annual Digital Forensic Research Workshop Conference, Elseveir, Portland, Oregon, S121-S128.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Scheffer, Nicolas, Vogt, Robbie, Kajarekar, Sachin, & Pelecanos, Jason (2009) Combination strategies for a factor analysis phone-conditioned speaker verification system. In 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Taipei, Taiwan., pp. 4053-4056.
Number of full-text downloads 186
Number of citations in Scopus 1

Schmidt, A-D., Bye, R., Schmidt, H-G., Clausen, J., Kiraz, O., Yuksel, K. A., et al. (2009) Static analysis of executables for collaborative malware detection on Android. In Proceedings of the IEEE International Conference on Communications, IEEE Conference Publications , Dresden, Germany, pp. 1-5.
Number of citations in Scopus 1
Number of citations in Web of Science® 3

Schmidt, A.-D., Clausen, J.H., Camtepe, S. A., & Albayrak, S. (2009) Detecting Symbian OS malware through static function call analysis. In Proceedings of the 4th International Conference on Malicious and Unwanted Software, IEEE Conference Publications , Montreal, Quebec, Canada, pp. 15-22.
Number of citations in Scopus 13
Number of citations in Web of Science® 4

Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, Seyit A., Albayrak, S., et al. (2009) Smartphone malware evolution revisited : Android next target? In Proceedings of the 4th International Conference on Malicious and Unwanted Software, IEEE Conference Publications , Montreal, Quebec, Canada, pp. 1-7.
Number of citations in Scopus 19
Number of citations in Web of Science® 3

Schmidt, Aubrey-Derrick, Schmidt, Hans-Gunther, Clausen, Jan, Yuksel, Kamer A., Kiraz, Osman, Camtepe, Seyit A., et al. (2008) Enhancing security of linux-based android devices. In Proceedings of the 15th International Linux Kongress, Hamburg, Germany.

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 440

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2012) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured Petri nets. In Pieprzyk, Josef (Ed.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125, Australian Computer Society Inc., RMIT University, Melbourne, Vic., pp. 47-58.
Number of full-text downloads 100

Shafiq, Mohammed O., Ali, Arshad, Ahmed, Ejaz, Ahmed, Hafiz F., & Suguri, Hiroki (2005) Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In Parallel and Distributed Computing and Networks : Proceedings of the 23rd IASTED International Multi Conference on Applied Informatics, IASTED, Innsbruck, Austria.
Number of full-text downloads 74

Sheikh, Riaz A., Sharif, Kashif, & Ahmed, Ejaz (2005) Performance analysis of unified enterprise application security framework. In Proceedings of Student Conference on Engineering Sciences and Technology 2005, IEEE, NED University of Engineering and Technology, Karachi.
Number of full-text downloads 99

Shen, Pei-Yuan, Liu, Vicky, Tang, Maolin, & William, Caelli (2011) An efficient public key management system : an application in vehicular ad hoc networks. In Pacific Asia Conference on Information Systems (PACIS), AIS Electronic Library (AISeL), Queensland University of Technology, Brisbane, Qld, p. 175.
Number of full-text downloads 279

Shin, David, Sahama, Tony, & Gajanayake, Randike (2013) Secured e-health data retrieval in DaaS and Big Data. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), 9-12 October 2013, Lisbon, Portugal. (In Press)

Simpson, Leonie R., Henricksen, Matthew, & Yap, Wun-She (2009) Improved cryptanalysis of the Common Scrambling Algorithm Stream Cipher. In Proceedings of the 14th Australasian Conference on Information Security and Privacy, 1-3 July 2009, Brisbane, Australia.
Number of full-text downloads 2,862
Number of citations in Scopus 1

Sivapalan, Sabesan, Chen, Daniel, Denman, Simon, Sridharan, Sridha, & Fookes, Clinton B. (2011) 3D ellipsoid fitting for multi-view gait recognition. In Advanced Video and Signal-Based Surveillance (AVSS), I E E E, Klagenfurt, Austria, pp. 355-360.
Number of full-text downloads 174
Number of citations in Scopus 2

Sivapalan, Sabesan, Chen, Daniel, Denman, Simon, Sridharan, Sridha, & Fookes, Clinton B. (2011) Gait energy volumes and frontal gait recognition using depth images. In International Joint Conference on Biometrics, IEEE, Washington DC, USA. (In Press)
Number of full-text downloads 417

Sivapalan, Sabesan, Rana, Rajib.K, Chen, Daniel, Sridharan, Sridha, Denman, Simon, & Fookes, Clinton B. (2011) Compressive sensing for gait recognition. In Proceedings of Digital Image Computing : Techniques and Applications (DICTA2011), IEEE, Sheraton Noosa Resort & Spa, Sunshine Coast, QLD. (In Press)
Number of full-text downloads 169

Soar, Jeffrey & Croll, Peter R. (2007) Assistive Technologies for the Frail Elderly, Chronic Illness Sufferers and People with Disabilities – a Case Study of the Development of a Smart Home. In Toleman, Mark, Cater-Steel, Aileen, & Roberts, Dave (Eds.) 18th Australasian Conference on Information Systems, 5-7 December 2007, Toowoomba.
Number of full-text downloads 547
Number of citations in Scopus 5

Stebila, Douglas (2010) Reinforcing bad behaviour : the misuse of security indicators on popular websites. In Proceedings of the 22nd Australasian Conference on Computer-Human Interaction (OZCHI 2010), ACM, Queensland University of Technology, Brisbane, pp. 248-251.
Number of full-text downloads 267

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 234
Number of citations in Scopus 7
Number of citations in Web of Science® 2

Stebila, Douglas, Mosca, Michele, & Lutkenhaus, Norbert (2009) The case for quantum key distribution. In Sergienko , A, Villoresi , P, & Pascazio , S (Eds.) Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Springer, Vico Equense, Italy, pp. 283-296.
Number of full-text downloads 126
Number of citations in Scopus 4

Stebila, Douglas, Udupi, Poornaprajna, & Chang, Sheueling (2010) Multi-factor password-authenticated key exchange. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology, Australian Computer Society, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 166

Strange, Andrew & Chandran, Vinod (2006) A Novel Approach for GPR Antenna Height Estimation. In Chen, C, Yarovoy, A, Sato, M, & Johnson, J (Eds.) Proceedings of the 11th International Conference on Ground Penetrating Radar, 19-22 June 2006, United States of America, Ohio, Columbus.

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2010) Delegation in predicate encryption supporting disjunctive queries. In Rannenberg, Kai & Varadharajan, Vijay (Eds.) IFIP Advances in Information and Communication Technology : Proceedings of 25th IFIP TC-11 International Information Security Conference, SEC 2010, Springer, Brisbane, pp. 229-240.
Number of full-text downloads 214
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Suriadi, Suriadi, Ashley, Paul, & Josang, Audun (2007) Future standardization areas in identity management systems. In 2nd PRIME Standardization Workshop, 14-15 June 2007, Zurich, Switzerland.
Number of full-text downloads 192

Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 530
Number of citations in Scopus 2

Suriadi, Suriadi, Foo, Ernest, & Du, Rong (2008) Layered identity infrastructure model for identity meta systems. In Sixth Australasian Information Security Conference (AISC 2008), 22 - 25 January 2008, Wollongong, Australia.
Number of full-text downloads 250

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2007) A User-centric Federated Single Sign-on System. In Li, Keqiu, Xiang, Yang, Jin, Hai, Qu, Wenyu, & Cao, Zhiying (Eds.) IFIP International Conference on Network and Parallel Computing Workshops NPC 2007, 18-21 September 2007, Dalian, China.
Number of full-text downloads 201

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.
Number of full-text downloads 123
Number of citations in Scopus 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-Centric Protocol for Conditional Anonymity Revocation. In Furnell, Steven M., Katsikas, Sokratis K., & Lioy, Antonio (Eds.) Trust Privacy and Security in Digital Business, Springer, Turin, Italy, pp. 185-194.
Number of citations in Web of Science® 1

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Number of citations in Scopus 2

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 199
Number of citations in Scopus 6

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 1

Talip, Bazilah H.J.A. & Narayan, Bhuva (2011) A proposed model for successful implementation of e-Government in Malaysia. In CITA 2011 Proceedings, Universiti Malaysia Sarawak, Hilton Kuching Hotel, Sarawak, Malaysia.
Number of full-text downloads 58

Tang, Maolin & Fidge, Colin J. (2010) Reconstruction of falsified computer logs for digital forensics investigations. In Information Security 2010: Proceedings of the Eight Australasian Information Security Conference [Conferences in Research and Practice in Information Technology, Volume 105], Australian Computer Society, Queensland University of Technology, Brisbane, Queensland, pp. 12-21.
Number of full-text downloads 236

Tang, Maolin & Fidge, Colin J. (2009) A genetic algorithm for the multi-source and multi-sink minimum vertex cut problem and its applications. In IEEE Congress on Evolutionary Computation, 18-21 May 2009, Nova Conference Centre and Cinema, Trondheim.
Number of full-text downloads 181
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Teo, Sui-Guan, Al-Mashrafi, Mufeed, Simpson, Leonie R., & Dawson, Edward (2009) Analysis of authenticated encryption stream ciphers. In Proceedings (Abstracts and Papers) of the 20th National Conference of Australian Society for Operations Research, Australian Society for Operations Research Inc, Gold Coast.
Number of full-text downloads 396

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 95
Number of citations in Scopus 1

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. In Proceedings of International Cryptology Conference 2010, Hotel Equatorial Melaka, Melaka.

Teo, Sui-Guan, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence and the effectiveness of time-memory-data tradeoffs. In Abraham, Ajith, Zheng, Daniel, Agrawal, Dharma, Abdollah, Mohd Faizal, Corchado, Emilio, Casola, Valentina, et al. (Eds.) Proceedings of the 7th International Conference on Information Assurance and Security, IEEE, Universiti Teknikal Malaysia Melaka , Malacca, Malaysia, pp. 92-97.
Number of full-text downloads 77

Thomas, Rod, Low, Rouhshi, & Griggs, Lynden (2012) Land fraud and inappropriate dealings in an electronic environment : An Australian and New Zealand perspective. In The 11th Australasian Property Law Teachers Conference, 12-13 July 2012, National University of Singapore, Singapore. (Unpublished)
Number of full-text downloads 218

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus.
Number of full-text downloads 69

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Cost-based and time-based analysis of DoS-resistance in HIP. In Dobbie, Gillian (Ed.) Thirtieth Australasian Computer Science Conference (ACSC2007), January 30 to February 2, 2007, Ballarat, Victoria.
Number of full-text downloads 128

Valmadre, Jack & Lucey, Simon (2012) General trajectory prior for non-rigid reconstruction. In Proceedings of 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, Rhode Island Convention Center, Providence, RI, pp. 1394-1401.
Number of full-text downloads 27
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Valmadre, Jack, Zhu, Yingying, Sridharan, Sridha, & Lucey, Simon (2012) Efficient articulated trajectory reconstruction using dynamic programming and filters. In Computer Vision – ECCV 2012, Springer, Florence, Italy, pp. 72-85.
Number of full-text downloads 57
Number of citations in Scopus 1

Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2008) Factor analysis subspace estimation for speaker verification with short utterances. In Interspeech 2008, 22-26 September 2008, Brisbane, Australia.
Number of full-text downloads 594
Number of citations in Scopus 12
Number of citations in Web of Science® 12

Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2004) Improved phonetic and lexical speaker recognition through MAP adaptation. In Odyssey: The Speaker and Language Workshop, 31 May - 3 June 2004, Toledo, Spain.
Number of full-text downloads 150

Vogt, Robert J., Baker, Brendan J., & Sridharan, Sridha (2005) Modelling session variability in text independent speaker verification. In Eurospeech/Interspeech : Proceedings of the 9th European Conference on Speech Communication and Technology 2005, 4-8 September 2005, Lisbon, Portugal.
Number of full-text downloads 1,329
Number of citations in Scopus 10

Vogt, Robert J., Kajarekar, Sachin, & Sridharan, Sridha (2008) Discriminant NAP for SVM Speaker Recognition. In Odyssey 2008: The Speaker and Language Recognition Workshop, 21-24 January 2008, Stellenbosch, South Africa.
Number of full-text downloads 377

Vogt, Robert J., Lustri, Christopher J., & Sridharan, Sridha (2008) Factor Analysis Modelling for Speaker Verification with Short Utterances. In Odyssey 2008: The Speaker and Language Recognition Workshop, 21-24 January 2008, Stellenbosch, South Africa.
Number of full-text downloads 361

Vogt, Robert J., Pelecanos, Jason, Scheffer, Nicolas, Kajarekar, Sachin, & Sridharan, Sridha (2009) Within-session variability modelling for factor analysis speaker verification. In 10th Annual Conference of the International Speech Communication Association : InterSpeech, 6-10 September 2009, Brighton Centre, Brighton.
Number of full-text downloads 113
Number of citations in Scopus 1

Vogt, Robert J. & Sridharan, Sridha (2004) Bayes factor scoring of GMMs for speaker verification. In Odyssey: The Speaker and Language Workshop, 31 May - 3 June 2004, Toledo, Spain.
Number of full-text downloads 196

Vogt, Robert J. & Sridharan, Sridha (2006) Experiments in Session Variability Modelling for Speaker Verification. In IEEE International Conference on Acoustics, Speech, and Signal Processing, 14-19 May, Toulouse, France.
Number of full-text downloads 393
Number of citations in Scopus 26
Number of citations in Web of Science® 2

Vogt, Robert J. & Sridharan, Sridha (2009) Minimising speaker verification utterance length through confidence based early verification decisions. In Proceedings of the Third International Conference on Advances in Biometrics, Springer, University of Sassari, Italy, pp. 454-463.
Number of full-text downloads 57
Number of citations in Scopus 1

Vogt, Robert J., Sridharan, Sridha, & Mason, Michael W. (2008) Making confident speaker verification decisions with minimal speech. In 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST 20008), 22-26 September 2008, Brisbane Australia.
Number of full-text downloads 537
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Wallace, Roy G., Baker, Brendan J., Vogt, Robert J., & Sridharan, Sridha (2009) The effect of language models on phonetic decoding for spoken term detection. In Proceedings of Searching Spontaneous Conversational Speech (SSCS) ACM Multimedia Workshop, ACM Multimedia Workshop, Beijing, pp. 31-36.
Number of full-text downloads 157
Number of citations in Scopus 1

Wallace, Roy G., Thambiratnam, Kit, & Seide, Frank (2009) Unsupervised speaker adaptation for telephone call transcription. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Taipei International Convention Center, Taipei, pp. 4393-4396.
Number of full-text downloads 107
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Wallace, Roy G., Vogt, Robbie, & Sridharan, Sridha (2009) Spoken term detection using fast phonetic decoding. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Taipei International Convention Center, Taipei, pp. 4881-4884.
Number of full-text downloads 374
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Wallace, Roy G., Vogt, Robert J., & Sridharan, Sridha (2007) A Phonetic Search Approach to the 2006 NIST Spoken Term Detection Evaluation. In Interspeech 2007 : 8th Annual Conference of the International Speech Communication Association, August 27-31, 2007, Antwerp, Belgium.
Number of full-text downloads 650

Wang, David, Vogt, Robbie, & Sridharan, Sridha (2010) Bayes factor based speaker clustering for speaker diarization. In Proceedings of 10th International Conference on Information Science, Signal Processing and their Applications, IEEE, Renaissance Hotel, Kuala Lumpur.
Number of full-text downloads 104
Number of citations in Scopus 2

Wang, David, Vogt, Robert J., Mason, Michael W., & Sridharan, Sridha (2008) Automatic Audio Segmentation Using the Generalized Likelihood Ratio. In 2nd International Conference on Signal Processing and Communication Systems, 2008. ICSPCS 2008., IEEE, Gold Coast, Australia.
Number of full-text downloads 32

Wang, David, Vogt, Robert J., & Sridharan, Sridha (2010) Bayes Factor based speaker segmentation for speaker diarization. In Proceedings of the 11th Annual Conference of the International Speech Communication Association (Interspeech 2010), International Speech Communication Association, Makuhari Messe International Convention Complex, Chiba, Makuhari, Japan, 1405 -1408.
Number of full-text downloads 121
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Wang, David, Vogt, Robert J., Sridharan, Sridha, & Dean , David (2011) Cross likelihood ratio based speaker clustering using eigenvoice models. In Interspeech 2011 : 12th Annual Conference of the International Speech Communication Association, 28-31 August 2011, Florence, Italy.
Number of full-text downloads 100
Number of citations in Scopus 2

Wang, Dong, Himawan, Ivan, Frankel, Joe, & King, Simon (2008) A Posterior Approach for Microphone Array Based Speech Recognition. In Interspeech 2008, 22-26 September 2008, Brisbane, Australia.

Wark, T., Sridharan, S., & Chandran, V. (2000) The use of temporal speech and lip information for multi-modal speaker identification via multi-stream HMMs. In 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing: Image and Multidimensional Signal Processing Multimedia Signal Processing, Istanbul, pp. 2389-2392.
Number of full-text downloads 74

White, Andrew, Tickle, Alan, & Clark, Andrew (2010) Overcoming reputation and proof-of-work systems in botnets. In Proceedings of the 4th International Conference on Network and System Security (NSS 2010), IEEE Computer Society, Melbourne.
Number of full-text downloads 197

Whittington, J., Ye, H., Kamalakannan, K., Vu, N.V., Mason, M.W., Kleinschmidt, T., et al. (2010) Low-cost hardware speech enhancement for improved speech recognition in automotive environments. In Doyle, Neil (Ed.) 24th ARRB Conference Proceedings, ARRB Group Ltd., Australia, Victoria, Melbourne, pp. 1-17.
Number of full-text downloads 334

Whittington, Jim, Deo, Kapeel, Kleinschmidt, Tristan, & Mason, Michael W. (2009) FPGA implementation of spectral subtraction for automotive speech recognition. In IEEE Workshop on Computational Intelligence in Vehicles and Vehicular Systems, 30 March - 2 April 2009, Nashville, TN.
Number of full-text downloads 463
Number of citations in Scopus 2

Whittington, Jim, Deo, Kapeel, Kleinschmidt, Tristan, & Mason, Michael W. (2008) FPGA implementation of spectral subtraction for in-car speech enhancement and recognition. In International Conference on Signal Processing and Communication Systems 2008, 15-17 December 2008, Gold Coast, Australia.
Number of full-text downloads 551

Wong, Kenneth Koon-Ho & Bard, Gregory V. (2010) Improved algebraic cryptanalysis of QUAD, Bivium and Trivium via graph partitioning on equation systems. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney, pp. 19-36.
Number of full-text downloads 357

Wong, Kenneth Koon-Ho, Carter, Gary, & Dawson, Ed (2010) An analysis of the RC4 family of stream ciphers against algebraic attacks. In Boyd, Colin & Susilo, Willy (Eds.) Conferences in Research and Practice in Information Technology CRPIT, Australian Computer Society, Brisbane, Australia, pp. 67-74.
Number of full-text downloads 345

Wullems, Christian J., Looi, Mark H., & Clark, Andrew J. (2003) Enhancing the security of Internet applications using location : a new model for tamper-resistant GSM location. In Proceedings of the Eighth IEEE International Symposium on Computers and Communication, 30 June - 3 July 2003, Antalya, Turkey.
Number of full-text downloads 267
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Xu, Jingxin, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2012) Activity analysis in complicated scenes using DFT coefficients of particle trajectories. In 9th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS 2012), 18-21 September 2012, Beijing, China. (In Press)
Number of full-text downloads 168
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Xu, Jingxin, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2011) Unusual Event Detection in Crowded Scenes Using Bag of LBPs in spatio-temporal patches. In DICTA 2011, IEEE, Noosa, QLD, Australia. (In Press)
Number of full-text downloads 190
Number of citations in Scopus 3

Xu, Jingxin, Denman, Simon, Fookes, Clinton B., & Sridharan, Sridha (2012) Unusual scene detection using distributed behaviour model and sparse representation. In 2012 IEEE Ninth International Conference on Advanced Video and Signal-Based Surveillance (AVSS), Institute of Electrical and Electronics Engineers (IEEE), Beijing, China, pp. 48-53.

Xu, Jingxin, Denman, Simon, Sridharan, Sridha, & Fookes, Clinton B. (2011) Activity modelling in crowded environments : a soft decision approach. In The International Conference on Digital Image Computing : Techniques and Applications (DICTA2011), 6-8 December 2011, Sheraton Noosa Resort & Spa, Noosa, QLD. (In Press)
Number of full-text downloads 68

Xu, Jingxin, Denman, Simon, Sridharan, Sridha, Fookes, Clinton B., & Rana, Rajib (2011) Dynamic texture reconstruction from sparse codes for unusual event detection in crowded scenes. In Joint ACM Workshop on Modeling and Representing Events (J-MRE'11), 28 November - 1 December 2011, Hyatt Regency Scottsdale Resort and Spa, Scottsdale, Arizona. (In Press)
Number of full-text downloads 290
Number of citations in Scopus 3

Ye, Harvey, Whittington, Jim, Himawan, Ivan, Kleinschmidt, Tristan, & Mason, Michael (2009) FPGA implementation of dual-microphone delay-and-sum beamforming for in-car speech enhancement and recognition. In AutoCRC Conference 2009 : Conference Proceedings, Cooperative Research Centre for Advanced Automotive Technology, Melbourne Convention and Exhibition Centre, Melbourne, Victoria.
Number of full-text downloads 509

Yildiz, Mursel, Toker, Ahmet Cihat, Sivrikaya, Fikret, Camtepe, Seyit A., & Albayrak, Sahin (2012) User facilitated congestion and attack mitigation. In Pentikousis, Kostas, Aguiar, Rui, Sargento, Susana, & Aguero, Ramon (Eds.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Networks and Management, Springer Berlin Heidelberg, Aveiro, Portugal, pp. 358-371.

Z'aba, Muhammad Reza, Raddum, Havard, Simpson, Leonie, Dawson, Ed, Henricksen, Matt, & Wong, Kenneth (2009) Algebraic Analysis of LEX. In Brankovic, Ljiljana & Susilo, Willy (Eds.) Australasian Information Security Conference (AISC2009), 20-23 January 2009, Wellington, New Zealand.
Number of full-text downloads 131

Z'aba, Muhammad Reza, Simpson, Leonie, Dawson, Edward, & Wong, Kenneth Koon-Ho (2010) Linearity within the SMS4 Block Cipher. In Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer-Verlag, Beijing, China, pp. 248-265.
Number of full-text downloads 170

Z'aba, Muhammad Reza, Wong, Kenneth, Dawson, Edward, & Simpson, Leonie (2010) Algebraic analysis of small scale LEX-BES. In Proceeding of the 2nd International Cryptology Conference 2010, Penerbit Universiti, Universiti Teknikal Malaysia Melaka, Melaka, Malaysia, pp. 77-82.
Number of full-text downloads 143

Zimmermann, Jacob, Clark, Andrew J., Mohay, George M., Pouget, Fabien, & Dacier, Marc (2005) The use of packet inter-arrival times for investigating unsolicited Internet traffic. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November, Taipei, Taiwan.
Number of full-text downloads 102
Number of citations in Scopus 3
Number of citations in Web of Science® 1

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 274

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 544

Conference Item

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teams rather than individuals : collaborative intrusion detection. In 5th Security Research Conference (Future Security 2010), September 2010, Berlin.

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security with CIMD : a collaborative approach to intrusion detection. In 19th USENIX Security Symposium, 11-13 August 2010, Washington D.C.

Dawson, Edward, Reid, Jason F., Salim, Farzad, & Burdon, Mark (2009) Information sharing in the 21st century : progress and challenges. In Boyd, Colin & Susilo, Willy (Eds.) Eighth Australasian Information Security Conference (AISC 2010), 19-20 January 2010, Brisbane, Australia.

Gajanayake, Randike, Sahama, Tony R., Lane, Bill, & Grunwell, Daniel (2013) Designing an information accountability framework for eHealth. In IEEE Healthcom 2013 15th International Conference on E-Health Networking, Application & Services, 9-12 October 2013, Instituto Superior de Ciências Sociais e Políticas – Technical University of Lisbon, Lisbon, Portugal. (In Press)

Lee, Kaleb (2010) A two-step mutual authentication protocol based on randomized hash-lock for small RFID networks. In International Conference on Data and Knowledge Engineering (ICDKE), 1-3 September 2010, Melbourne.
Number of full-text downloads 324
Number of citations in Scopus 1

Liu, Vicky, Caelli, William J., May, Lauren J., Croll, Peter R., & Henricksen, Matthew P. (2007) Current Approaches to Secure Health Information Systems are Not Sustainable: an Analysis. In Medinfo 2007, 20- 24 Aug 2007, Brisbane, Australia.
Number of full-text downloads 132

Messerman, Arik, Mustafic, Tarik, Camtepe, Seyit A., & Albayrak, Sahin (2010) Non-intrusive continuous user behaviour analysis using computerized systems. In 5th Security Research Conference (Future Security 2010), September 2010, Berlin.

Mian, Daniyal, Weir, Grant, Moreton, Paul, & Kajewski, Stephen L. (2009) The Innovation Management Program (IMP) : a holistic approach to managing change in knowledge based firms. In Australian Institute of Project Management Conference 2009 : Modernisation in Project Management, 11-14 October 2009, Adeliade Convention Centre, Adelaide.
Number of full-text downloads 49

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proof for formal indistinguishability and its applications. In The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 30 June 2011, Institut Henri Poincaré, Paris. (Unpublished)
Number of full-text downloads 80

Reid, Jason F. (2009) A matter of confidence : privacy compliance for connected-up enterprises. In 2nd International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2009), 1 September 2009, Auckland, New Zealand. (Unpublished)

Salim, Farzad, Sheppard, Nicholas P., & Safavi-Naini, Rei (2007) Using SITDRM for Privacy Rights Management. In 1st ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT 2007), 30-31 March 2007, Cambridge, Massachusetts.
Number of full-text downloads 45

Schmidt, Aubrey-Derrick, Camtepe, Seyit A., & Albayrak, Sahin (2010) Static smartphone malware detection. In 5th Security Research Conference (Future Security 2010), September 2010, Berlin.

Report

Alzaid, Hani, Abanmi, Suhail, Kanhere, Salil, & Chou, Chun Tung (2006) Detecting Wormhole Attacks in Wireless Sensor Networks. (Unpublished)
Number of full-text downloads 3,356

Bye, Rainer, Luther, Katja, Camtepe, Seyit A., & Albayrak, Sahin (2009) Solving inherent problems of anomaly detection by cooperation. DAI Labor, Berlin.

Camtepe, Seyit A. & Yener, Bulent (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. Rensselaer Polytechnic Institute, New York.

Camtepe, Seyit A. & Yener, Bulent (2005) Key distribution mechanisms for wireless sensor networks : a survey. Rensselaer Polytechnic Institute, New York, USA.

Camtepe, Seyit A. & Yener, Bulent (2009) Optimally increasing secure connectivity in multihop wireless ad hoc networks. Rensselaer Polytechnic Institute, New York, USA.

Camtepe, Seyit Ahmet & Yener, Bulent (2006) A formal method for attack modelling and detection. Rensselaer Polytechnic Institute, New York.

Chantler, Alan N. & Broadhurst, Roderic (2006) Social Engineering and Crime Prevention in Cyberspace. (Unpublished)
Number of full-text downloads 1,445

Chinnow, Joel, Bye, Rainer, Schmidt, Stephan, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2009) An extensible simulation framework for critical infrastructure security. DAI Labor, Berlin.

Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Number of full-text downloads 172

Kush, Nishchal, Clark, Andrew J., & Foo, Ernest (2010) Smart Grid Test Bed Design and Implementation. (Unpublished)
Number of full-text downloads 1,413

Pham, Quan, Reid, Jason, & Dawson, Ed (2011) Policy filtering with XACML. Technical Report : Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 60

Pham, Quan, Reid, Jason F., & Dawson, Edward (2010) Delegation constraint management. Technical Report: Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 169

Schmidt, Aubrey-Derrick, Bye, Rainer, Schmidt, Hans-Gunther, Yuksel, Kamer Ali, Kiraz, Osman, Clausen, Jan, et al. (2008) Monitoring android for collaborative anomaly detection : a first architectural draft. DAI-Labor, Berlin.

Schmidt, Hans-Gunther, Raddatz, Karsten, Schmidt, Aubrey-Derrick, Camtepe, Seyit A., & Albayrak, Sahin (2009) Google Android : a comprehensive introduction. DAI-Labor, Berlin.

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2011) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured petri nets - Version 1.0. (Unpublished)
Number of full-text downloads 212

Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Number of full-text downloads 90

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy using Re-encryption. (In Press)
Number of full-text downloads 139

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Private information escrow bound to multiple conditions. (Unpublished)
Number of full-text downloads 97

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-centric Protocol for Conditional Anonymity Revocation. (In Press)
Number of full-text downloads 146

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2009) Using re-encryption to escrow private information escrow bound to multiple conditions. (Submitted (not yet accepted for publication))
Number of full-text downloads 64

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and verification of privacy enhancing security protocols. (Submitted (not yet accepted for publication))
Number of full-text downloads 229

White, Andrew (2010) An evaluation of current and future botnet defenses. (Unpublished)
Number of full-text downloads 274

QUT Thesis

ALMashrafi, Mufeed Juma (2012) Analysis of stream cipher based authenticated encryption schemes. PhD thesis, Queensland University of Technology.
Number of full-text downloads 155

Aditya, Riza (2005) Secure electronic voting with flexible ballot structure. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,186

Ahmed, Ejaz (2010) Monitoring and analysis of internet traffic targeting unused address spaces. PhD thesis, Queensland University of Technology.
Number of full-text downloads 959

Al-Hinai, Sultan Zayid Mohammed (2007) Algebraic attacks on clock-controlled stream ciphers. PhD thesis, Queensland University of Technology.
Number of full-text downloads 725

Alkaabi, Ali Obaid Sultan (2010) Combating computer crime : an international perspective. PhD thesis, Queensland University of Technology.
Number of full-text downloads 2,778

Almotairi, Saleh Ibrahim Bakr (2009) Using honeypots to analyse anomalous Internet activities. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,407

Alsolami, Eesa (2012) An examination of keystroke dynamics for continuous user authentication. PhD thesis, Queensland University of Technology.
Number of full-text downloads 343

Alzaid, Hani Mohammed (2011) Secure data aggregation in wireless sensor networks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,178

Alzomai, Mohammed Hamad (2011) Identity management : strengthening one-time password authentication through usability. PhD thesis, Queensland University of Technology.
Number of full-text downloads 809

Andersson, Stig (2009) Detecting and characterising malicious executable payloads. PhD thesis, Queensland University of Technology.
Number of full-text downloads 510

Au, Wai Ki Richard (2005) Agent-based one-shot authorisation scheme in a commercial extranet environment. PhD thesis, Queensland University of Technology.
Number of full-text downloads 423

Branagan, Mark Allan (2012) A risk simulation framework for information infrastructure protection. PhD thesis, Queensland University of Technology.
Number of full-text downloads 589

Brown, Jaimee (2007) Secure public-key encryption from factorisation-related problems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 483

Burnett, Linda Dee (2005) Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,182

Carey-Smith, Mark T. (2011) Improving information security management in nonprofit organisations. PhD thesis, Queensland University of Technology.
Number of full-text downloads 514

Clutterbuck, Peter (2005) Maximizing the Availability of Distributed Software Services. PhD thesis, Queensland University of Technology.
Number of full-text downloads 507

Costello, Craig (2012) Fast formulas for computing cryptographic pairings. PhD thesis, Queensland University of Technology.
Number of full-text downloads 193

Dawson, Robert Edward (2008) Secure communications for critical infrastructure control systems. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 2,319

Du, Rong (2007) Secure electronic tendering. PhD thesis, Queensland University of Technology.
Number of full-text downloads 2,119

Gauravaram, Praveen Srinivasa (2007) Cryptographic hash functions : cryptanalysis, design and applications. PhD thesis, Queensland University of Technology.
Number of full-text downloads 4,078

Giansiracusa, Michelangelo Antonio (2005) A secure infrastructural strategy for safe autonomous mobile agents. PhD thesis, Queensland University of Technology.
Number of full-text downloads 804

Gill, Rupinder S. (2009) Intrusion detection techniques in wireless local area networks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,089

Goh, Vik Tor (2010) Intrusion detection framework for encrypted networks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 247

Goonasekera, Nuwan Abhayawardena (2012) Program-level support for protecting an application from untrustworthy components. PhD thesis, Queensland University of Technology.
Number of full-text downloads 46

Gorantla, Malakondayya Choudary (2010) Design and analysis of group key exchange protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 804

Hammad, Yousef Bani (2005) Novel methods for primality testing and factoring. PhD thesis, Queensland University of Technology.
Number of full-text downloads 567

Henricksen, Matthew (2005) Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers. PhD thesis, Queensland University of Technology.
Number of full-text downloads 3,562

Hişil, Hüseyin (2010) Elliptic curves, group law, and efficient computation. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,535

Holford, John William (2006) The concept of self-defending objects and the development of security aware applications. PhD thesis, Queensland University of Technology.
Number of full-text downloads 892

Kuppusamy, Lakshmi Devi (2012) Modelling client puzzles and denial-of-service resistant protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 58

Lippold, Georg (2010) Encryption schemes and key exchange protocols in the certificateless setting. PhD thesis, Queensland University of Technology.
Number of full-text downloads 559

Liu, Yin - Miao (2004) Visually sealed and digitally signed electronic documents : building on Asian tradition. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 705

Liu, Yin-Miao (Vicky) (2011) An architecture for enhanced assurance in e-health systems. PhD by Publication, Queensland University of Technology.
Number of full-text downloads 309

Marrington, Andrew Daniel (2009) Computer profiling for forensic purposes. PhD thesis, Queensland University of Technology.
Number of full-text downloads 836

Martinsen, Pal-Erik (2005) Configuration and Implementation Issues for a Firewall System Running on a Mobile Handset. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 1,368

Pham, Quan (2010) Delegation framework for federated systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 65

Rangasamy, Jothi Ramalingam (2012) Cryptographic techniques for managing computational effort. PhD thesis, Queensland University of Technology.
Number of full-text downloads 96

Ross, David Andrew (2010) Securing IEEE 802.11 wireless LANs. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,883

Salim, Farzad (2012) Approaches to access control under uncertainty. PhD thesis, Queensland University of Technology.
Number of full-text downloads 218

Schatz, Bradley Lawrence (2007) Digital evidence : representation and assurance. PhD thesis, Queensland University of Technology.
Number of full-text downloads 5,555

Smith, Jason (2007) Denial of service : prevention, modelling and detection. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,180

Smith, Leslie Gordon (2006) The role of the notary in secure electronic commerce. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 1,876

Sun, Dongdong (2012) Predicate encryption with various properties. PhD thesis, Queensland University of Technology.
Number of full-text downloads 98

Suriadi, Suriadi (2010) Strengthening and formally verifying privacy in identity management systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 160

Tham, Kevin Wen Kaye (2006) Developing security services for network architectures. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,745

Tritilanunt, Suratose (2009) Protocol engineering for protection against denial-of-service attacks. PhD thesis, Queensland University of Technology.
Number of full-text downloads 703

Vasanta, Harikrishna (2006) Secure, privacy assured mechanisms for heterogeneous contextual environments. PhD thesis, Queensland University of Technology.
Number of full-text downloads 439

Williams, Elizabeth A. (2003) The globalisation of regulation and its impact on the Domain Name System : domain names and a new regulatory economy. PhD thesis, Queensland University of Technology.
Number of full-text downloads 93

Woo, Chaw-Seng (2007) Digital image watermarking methods for copyright protection and authentication. PhD thesis, Queensland University of Technology.
Number of full-text downloads 6,004

Z'aba, Muhammad Reza (2010) Analysis of linear relationships in block ciphers. PhD thesis, Queensland University of Technology.
Number of full-text downloads 863

Thesis

Camtepe, Seyit A. (2007) Design and analysis of key management schemes for distributed wireless sensor networks. PhD thesis, Rensselaer Polytechnic Institute, Department of Computer Science.

Camtepe, Seyit A. (2001) Kerberos based security system for session initiation protocol. Masters by Research thesis, Bogazici University, Computer Engineering Department .
Number of full-text downloads 93

Sahama, Tony (2003) Some practical issues in the design and analysis of computer experiments. PhD thesis, Victoria University, Melbourne.
Number of full-text downloads 56

Salim, Farzad (2006) Detecting and resolving redundancies in EP3P policies. Masters by Research thesis, Faculty of Computer Science and Software Engineering, University of Wollongong.
Number of full-text downloads 89

Working Paper

Hodgett, Matthew (2013) Visualising security incidents through event aggregation. [Working Paper] (Unpublished)

Marrington, Andrew, Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2009) Dealing with temporal inconsistency in automated computer forensic profiling. [Working Paper] (Unpublished)
Number of full-text downloads 384

Navarathna, Rajitha, Lucey, Simon, & Sridharan, Sridha (2011) Fourier active appearance models. [Working Paper] (Unpublished)
Number of full-text downloads 155

Other

Boril, Hynek, Kleinschmidt, Tristan, Boyraz, Pinar, & Hansen, John H. L. (2010) Impact of cognitive load and frustration on drivers’ speech [Abstract]. Journal of the Acoustical Society of America, Vol. 127, no. 3.
Number of full-text downloads 24

Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., et al. (2006) Electronic Contract Administration – Legal and Security Issues Literature Review.

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 33

This list was generated on Sun Oct 19 17:30:48 2014 EST.