QUT ePrints

Browse By Person: Zimmermann, Jacob

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 11.

Journal Article

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Detecting attacks in encrypted networks using secret-sharing schemes. International Journal of Cryptology Research, 2(1), pp. 89-99.
Number of full-text downloads 55

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Number of full-text downloads 448

Conference Paper

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Intrusion detection system for encrypted networks using secret-sharing schemes. In International Journal of Cryptology Research, Malaysian Society for Cryptology Research, Hotel Equatorial, Melaka, Malaysia.
Number of full-text downloads 192

Ahmad Khalid, Shamsul K., Zimmermann, Jacob, Fidge, Colin J., & Corney, Diane (2010) Automatic generation of assertions to detect potential security vulnerabilities in C programs that use union and pointer types. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) Proceedings of 2010 Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne, pp. 351-357.
Number of full-text downloads 117

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark H. (2009) Towards intrusion detection for encrypted networks. In 2009 International Conference on Availability, Reliability and Security, 16-19 March 2009, Fukuoka Institute of Technology, Fukuoka.
Number of full-text downloads 240

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May 2009, Venice/Mestre, Italy.
Number of full-text downloads 381
Number of citations in Scopus 2

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE Computer Society, Shanghai, China, pp. 147-154.
Number of full-text downloads 337
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Almotairi, Saleh I., Clark, Andrew J., Dacier, Marc, Leita, Corrado, Mohay, George M., Pham, Van Hau, et al. (2007) Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3 December 2007, Perth, Western Australia.
Number of full-text downloads 330
Number of citations in Scopus 1

Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George M., & Clark, Andrew J. (2007) Multi-Step Scenario Matching Based on Unification. In Valli, Craig & Woodward, Andrew (Eds.) 5th Australian Digital Forensics Conference, 3rd December, 2007, Perth, Western Australia.
Number of full-text downloads 250

Zimmermann, Jacob, Clark, Andrew J., Mohay, George M., Pouget, Fabien, & Dacier, Marc (2005) The use of packet inter-arrival times for investigating unsolicited Internet traffic. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November, Taipei, Taiwan.
Number of full-text downloads 99
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Andersson, Stig, Clark, Andrew J., Mohay, George M., Schatz, Bradley, & Zimmermann, Jacob (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In Proceedings of the 21st Annual Computer Security Applications Conference, 5-9 December 2005, Tucson, Arizona.
Number of full-text downloads 131
Number of citations in Scopus 4

This list was generated on Sat Jul 26 06:02:09 2014 EST.