QUT ePrints

Browse By Person: Clark, Andrew

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 68.

Journal Article

Davis, Jonathan Jeremy & Clark, Andrew J. (2011) Data preprocessing for anomaly based network intrusion detection : a review. Computers & Security, 30(6-7), pp. 353-375.
Number of citations in Scopus 17
Number of citations in Web of Science® 8

Marrington, Andrew, Baggili, Ibrahim, Mohay, George M., & Clark, Andrew J. (2011) CAT Detect (Computer Activity Timeline Detection) : a tool for detecting inconsistency in computer activity timelines. Digital Investigation, 8(Sup), S52-S61.

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 464

Viet Triem Tong, Valérie, Clark, Andrew J., & Mé, Ludovic (2010) Specifying and enforcing a fine-grained information flow policy : model and experiments. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1), pp. 56-71.
Number of full-text downloads 172

Schatz, Bradley, Mohay, George M., & Clark, Andrew J. (2006) A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation, 3(Supplement 1), S98-S107.
Number of full-text downloads 287
Number of citations in Scopus 13

Clark, Andrew, Dacier, Marc, Mohay, George, Pouget, Fabien, & Zimmermann, Jakub (2006) Internet Attack Knowledge Discovery Via Clusters and Cliques of Attack Traces. Journal of Information Assurance and Security, 1(1), pp. 21-32.

Schatz, Bradley, Mohay, George, & Clark, Andrew (2005) Generalising event correlation across multiple domains. Journal of Information Warfare, 4(1), pp. 69-79.

Burnett, Linda, Clark, Andrew, Dawson, Edward, & Millan, William (2004) Simpler Methods for Generating Better Boolean Functions with Good Cryptographic Properties. The Australasian Journal of Combinatorics, 29, pp. 231-247.
Number of citations in Scopus 2

Clark, Andrew, Dawson, Edward, Hitchcock, Yvonne, & Montague, Paul (2003) Implementing an Efficient Elliptic Curve Cryptosystem over $GF(p)$ on a Smart Card. The ANZIAM Journal, 44(April 2003), pp. 354-377.

Boyd, Colin, Clark, Andrew, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) Key Recovery for the Commercial Environment. International Journal of Information Security, 1(3), pp. 161-174.

Golic, Jovan Dj, Clark, Andrew J., & Dawson, Edward P. (2000) Generalized inversion attack on nonlinear filter generators. IEEE Transactions on Computers, 49(10), pp. 1100-1109.
Number of full-text downloads 158
Number of citations in Scopus 17
Number of citations in Web of Science® 13

Dawson, Edward P., Clark, Andrew J., & Looi, Mark H. (2000) Key management in a non-trusted distributed environment. Future Generation Computer Systems, 16(4), pp. 319-329.
Number of full-text downloads 180
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Conference Paper

Kush, Nishchal, Foo, Ernest, Ahmed, Ejaz, Ahmed, Irfan, & Clark, Andrew (2011) Gap analysis of intrusion detection in smart grids. In Valli, Craig (Ed.) Proceedings of the 2nd International Cyber Resilience Conference, secau - Security Research Centre, Duxton Hotel, Perth, WA, pp. 38-46.
Number of full-text downloads 413

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 169
Number of citations in Scopus 3

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 204

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 305

Alsolami, Eesa, Boyd, Colin, Clark, Andrew J., & Ahmed, Irfan (2011) User-representative feature selection for keystroke dynamics. In De Capitani di Vimercati , Sabrina & Samarati , Pierangela (Eds.) International Conference on Network and System Security, 6-8 September 2011, Università degli Studi di Milano, Milan.
Number of full-text downloads 126

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 313

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 403

White, Andrew, Tickle, Alan, & Clark, Andrew (2010) Overcoming reputation and proof-of-work systems in botnets. In Proceedings of the 4th International Conference on Network and System Security (NSS 2010), IEEE Computer Society, Melbourne.
Number of full-text downloads 191

Al solami, Eesa, Boyd, Colin, Clark, Andrew, & Khandoker, Asadul Islam (2010) Continuous biometric authentication : can it be more practical? In 12th IEEE International Conference on High Performance Computing and Communications, 1-3 September 2010, Melbourne.
Number of full-text downloads 349
Number of citations in Scopus 1

Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 428
Number of citations in Scopus 2

Marrington, Andrew, Mohay, George M., Morarji, Hasmukh L., & Clark, Andrew J. (2010) A model for computer profiling. In Proceedings of the Third International Workshop on Digital Forensics, Andrzej Frycz Modrzewski Cracow College, Krakow, Poland.
Number of full-text downloads 125

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2010) A framework for improved adolescent and child safety in MMOs. In Memon, Nasrullah & Alhajj, Reda (Eds.) 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), IEEE Computer Society, University of Southern Denmark, Odense, Denmark, pp. 33-40.
Number of full-text downloads 96

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 309

Raghavan, Sriram, Clark, Andrew J., & Mohay, George M. (2009) FIA : an open foresic integration architecture for composing digital evidence. In Sorell, Matthew (Ed.) Forensics in Telecommunications, Information and Multimedia, Springer Berlin Heidelberg, Adelaide, South Australia, pp. 83-94.
Number of full-text downloads 694

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 125
Number of citations in Scopus 2

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May 2009, Venice/Mestre, Italy.
Number of full-text downloads 374
Number of citations in Scopus 1

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 261

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE Computer Society, Shanghai, China, pp. 147-154.
Number of full-text downloads 333
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Kiani, Mehdi, Clark, Andrew J., & Mohay, George M. (2008) Evaluation of anomaly based character distribution models in the detection of SQL injection attacks. In Third International Conference on Availability, Reliability and Security, 4-7 March, 2008, Barcelona, Spain.
Number of full-text downloads 362
Number of citations in Scopus 8
Number of citations in Web of Science® 2

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 396
Number of citations in Scopus 9
Number of citations in Web of Science® 3

Marrington, Andrew D., Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2007) Event-based computer profiling for the forensic reconstruction of computer activity. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld.
Number of full-text downloads 989

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 318
Number of citations in Scopus 1

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 227

Ross, David A., Clark, Andrew J., & Looi, Mark H. (2007) Securely deploying IEEE 802.11 WLANs. In Clark, A., McPherson, M., & Mohay, G. (Eds.) AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007): Refereed R&D Stream, 20-25 May, 2007, Gold Coast, Qld..
Number of full-text downloads 453

Schatz, Bradley & Clark, Andrew J. (2006) An open architecture for digital evidence integration. In Clark, Andrew J., McPherson, Mark, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 21-26 May 2006, Gold Coast, Queensland.
Number of full-text downloads 262

Duncombe, David, Mohay, George M., & Clark, Andrew J. (2006) Synapse : auto correlation and dynamic attack redirection in an immunologically-inspired IDS. In Buyya, Rajkumar, Ma, Tianchi, Safavi-Naini, Rei, Steketee, Chris, & Susilo, Willy (Eds.) ACSW frontiers 2006 : proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society, Hobart, pp. 135-144.
Number of full-text downloads 102

Abbott, Jonathon, Bell, Jim, Clark, Andrew, De Vel, Olivier, & Mohay, George M. (2006) Automated Recognition of Event Scenarios for Digital Forensics. In Liebrock, N. (Ed.) 2006 ACM Symposium on Applied Computing, 23-27 April, Dijon, France.
Number of citations in Scopus 4

Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew (2006) Computer profiling to assist computer forensic investigations. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, Australian Homeland Security Research Centre, Canberra, Australian Capital Territory, pp. 287-301.

Clark, Andrew, Mohay, George, Panichprecha, Sorot, & Zimmermann, Jakub (2006) An Event Abstraction Model for Signature-Based Intrusion Detection Systems. In Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics, 6-8 December 2006, India, Chennai.

Gill, Rupinder, Smith, Jason, & Clark, Andrew (2006) Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C, & Susilo, W. (Eds.) Proceedings of 4th Australasian Information Security Workshop (Network Security), Australian Computer Society Inc, Hobart, Tasmania, pp. 221-230.
Number of full-text downloads 227
Number of citations in Scopus 1

Smith, Jason, Gill, Rupinder S., & Clark, Andrew J. (2006) On Securing Wireless LAN Access to Government Information Systems. In Mendis, Priyan, Lai, Joseph, & Dawson, Ed (Eds.) 2006 RNSA Security Technology Conference – Recent advances in security technology, September 21, 2006, Canberra, Australia.
Number of full-text downloads 869

Gill, Rupinder S., Smith, Jason, & Clark, Andrew J. (2006) Specification-based intrusion detection in WLANs. In Annual Computer Security Applications Conference, Miami Beach, FL.
Number of full-text downloads 600
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2005) Challenges of automating the detection of paedophile activity on the Internet. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November 2005, Taipei, Taiwan.
Number of full-text downloads 1,961
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Zimmermann, Jacob, Clark, Andrew J., Mohay, George M., Pouget, Fabien, & Dacier, Marc (2005) The use of packet inter-arrival times for investigating unsolicited Internet traffic. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November, Taipei, Taiwan.
Number of full-text downloads 93
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Andersson, Stig, Clark, Andrew J., & Mohay, George M. (2005) Detecting network-based obfuscated code injection attacks using sandboxing. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 22-26 May 2005, Gold Coast, Queensland.
Number of full-text downloads 213

Gill, Rupinder S., Smith, Jason, Looi, Mark H., & Clark, Andrew J. (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22-26 May 2005, Gold Coast, Australia.
Number of full-text downloads 372

Clark, Andrew, Giansiracusa, Michelangelo, Hynd, John, & Russell, Selwyn (2005) An Improved Execution Integrity Solution for Mobile Agents. In Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Andersson, Stig, Clark, Andrew J., Mohay, George M., Schatz, Bradley, & Zimmermann, Jacob (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In Proceedings of the 21st Annual Computer Security Applications Conference, 5-9 December 2005, Tucson, Arizona.
Number of full-text downloads 127
Number of citations in Scopus 4

Andersson, Stig, Clark, Andrew, & Mohay, George (2004) Network based buffer overflow detection by exploit code analysis. In Mohay, George M., Clark, Andrew J., & Kerr, Kathryn (Eds.) AusCERT Asia Pacific Information Technology Security Conference: R&D Stream, 23-27 May 2004, Gold Coast, Australia.
Number of full-text downloads 419

Clark, Andrew, Giansiracusa, Michelangelo, & Russell, Selwyn (2004) Clever Use of Trusted Third Parties for Mobile Agent Security. In Xue, L, Zhou, J, Yung, M, & Markus, J (Eds.) The Second International Conference on Applied Cryptography and Network Security., 8-11 June 2004, Yellow Mountain, China.

Reid, Jason F., Clark, Andrew J., Gonzalez Nieto, Juan, Smith, Jason, & Viswanathan, Kapali (2004) Denial of Service Issues in Voice Over IP Networks. In First International Conference on E-Business and Telecommunication Networks (ICETE 2004), 25-28 August, 25-28 August 2004, Setúbal, Portugal.
Number of full-text downloads 430

Schatz, Bradley, Mohay, George M., & Clark, Andrew (2004) Generalising Event Forensics Across Multiple Domains. In Valli, C. (Ed.) 2nd Australian Computer Networks Information and Forensics Conference, 25 November, Perth, Australia.
Number of full-text downloads 412

Clark, Andrew, Giansiracusa, Michelangelo, Roth, Volker, & Russell, Selwyn (2004) Macro-Level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. In Lopez, J, Quing, S, & Okamoto, E (Eds.) Proceedings of the 6th International Conference on Information and Communications Security, ICICS 2004., 27-29 October 2004, Malaga, Spain.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Clark, Andrew, Mohay, George, & Schatz, Bradley (2004) Rich Event Representation for Computer Forensics. In Kozan, E (Ed.) Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management Systems Conference (APIEMS 2004), 12-15 December 2004, Gold Coast, Queensland.

Clark, Andrew, Giansiracusa, Michelangelo, Hynd, John, & Russell, Selwyn (2004) A Step Closer to a Secure Internet Mobile Agent Community. In Kozan, Erhan (Ed.) APIEMS 2004, 12 - 15 December 2004, Gold Coast, Australia.

Wullems, Christian J., Looi, Mark Hanmeng, & Clark, Andrew J. (2004) Towards Context-Aware Security: An Authorization Architecture for Intranet Environments. In Werner, B. (Ed.) Pervasive Computing and Communications, Proceedings Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 14-17 March, Orlando, Florida, USA.
Number of full-text downloads 689
Number of citations in Scopus 12
Number of citations in Web of Science® 1

Wullems, Christian, Vasanta, Hari, Looi, Mark, & Clark, Andrew J. (2004) A broadcast authentication and integrity augmentation for trusted differential GPS in marine navigation. In Dawson, E. & Klemm, W. (Eds.) In Workshop on Cryptographic Algorithms and Their Uses - 2004, 5-6 July 2004, Gold Coast, QLD.
Number of full-text downloads 112

Chen, Kevin, Clark, Andrew, De Vel, Olivier, & Mohay, George (2003) ECF - Event correlation for forensics. In First Australian Computer Network and Information Forensics Conference, 25 November 2003, Perth, Australia.
Number of full-text downloads 567

Carey, Nathan, Mohay, George M., & Clark, Andrew (2003) Attack Signature Matching and Discovery in Systems Employing Heterogenous IDS. In Friedman, Art (Ed.) Nineteenth Annual Computer Security Applications Conference, 8-12 December, Las Vegas, NV, USA.
Number of full-text downloads 194

Wullems, Christian J., Looi, Mark H., & Clark, Andrew J. (2003) Enhancing the security of Internet applications using location : a new model for tamper-resistant GSM location. In Proceedings of the Eighth IEEE International Symposium on Computers and Communication, 30 June - 3 July 2003, Antalya, Turkey.
Number of full-text downloads 236
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Carey, Nathan, Clark, Andrew, & Mohay, George (2002) IDS interoperability and correlation using IDMEF and commodity systems. In Fourth International Conference on Information and Communications Security, 9-12 December 2002, Singapore.
Number of full-text downloads 416
Number of citations in Web of Science® 3

Clark, Andrew J., Fuller, Joanne E., Golic, Jovan Dj, Dawson, Edward P., Lee, Hoon-Jae, Millan, William L., et al. (2002) The LILI-II Keystream Generator. In 7th Australian Conference on Information Security and Privacy, 3-5 July 2002, Melbourne, Victoria.
Number of full-text downloads 326
Number of citations in Web of Science® 16

Report

Kush, Nishchal, Clark, Andrew J., & Foo, Ernest (2010) Smart Grid Test Bed Design and Implementation. (Unpublished)
Number of full-text downloads 1,270

QUT Thesis

Clark, Andrew J. (1998) Optimisation heuristics for cryptology. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,208

Working Paper

Marrington, Andrew, Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2009) Dealing with temporal inconsistency in automated computer forensic profiling. [Working Paper] (Unpublished)
Number of full-text downloads 289

Other

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 22

This list was generated on Sat Apr 19 07:09:39 2014 EST.