QUT ePrints

Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Jump to: A | B | C | D | F | G | H | I | J | K | L | M | N | P | R | S | T | V | W | Z
Number of items at this level: 203.

A

Ahmad Khalid, Shamsul K., Zimmermann, Jacob, Fidge, Colin J., & Corney, Diane (2010) Automatic generation of assertions to detect potential security vulnerabilities in C programs that use union and pointer types. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) Proceedings of 2010 Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne, pp. 351-357.
Number of full-text downloads 120

Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Number of full-text downloads 296

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2009) Effective change detection in large repositories of unsolicited traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) The Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May, 2009, Venice/Mestre, Italy.
Number of full-text downloads 136
Number of citations in Scopus 2

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 436
Number of citations in Scopus 9
Number of citations in Web of Science® 3

Ahmed, Irfan, Lhee, Kyung-Suk, Shin, Hyun-Jung, & Hong, Man-Pyo (2011) Fast content-based file type identification. In Sujeet, Shenoi & Peterson, Bert (Eds.) 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, January 30 - February 2, 2011, Orlando, Florida.

Ahmed, Irfan & Lhee, Kyung-suk (2011) Classification of packet contents for malware detection. Journal in Computer Virology, 7(4), pp. 279-295.
Number of citations in Scopus 3

Al Fayyadh, Bander & Josang, Audun (2008) Robust WYSIWYS: A method of ensuring that what you see is what you sign. In Brankovic, L & Miller, M (Eds.) Information Security 2008, 22-25 January 2008, Australia, New South Wales, Wollongong.

Al Mashrafi, Mufeed (2011) A different algebraic analysis of the ZUC stream cipher. In Proceedings of the 4th International Conference on Security of Information and Networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 191-198.
Number of full-text downloads 202

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth , Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.
Number of full-text downloads 72

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Geoproof : proofs of geographic location for cloud computing environment. In Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops 2012, IEEE, Macau, China, pp. 506-514.
Number of full-text downloads 342
Number of citations in Scopus 3

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) A security architecture for cloud storage combining proofs of retrievability and fairness. In Zimmermann, Wolf, Lee, Yong Woo, & Demchenko, Yuri (Eds.) Proceedings of Cloud Computing 2012 : The Third International Conference on Cloud Computing, GRIDS and Virtualization, IARIA, Hotel Novotel Cap, Nice, pp. 30-35.

Algarni, Abdullah & Xu, Yue (2013) Social engineering in social networking sites : phase-based and source-based models. International Journal of e-Education, e-Business, e-Management and e-Learning, 3(6), pp. 456-462.
Number of full-text downloads 96

Algarni, Abdullah, Xu, Yue, Chan, Taizan, & Tian, Yu-Chu (2013) Social engineering in social networking sites : affect-based model. In Proceedings of the 8th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2013), The Institute of Electrical and Electronics Engineering, Inc., London, United Kingdom, pp. 508-515.
Number of full-text downloads 152

Algarni, Abdullah, Xu, Yue, Chan, Taizan, & Tian, Yu-Chu (2013) Toward understanding social engineering. In The Proceedings of the 8th International Conference on Legal, Security and Privacy Issues in IT Law, (Critical Analysis and Legal Reasoning), The International Association of IT Lawyers (IAITL), Bangkok, Thailand, pp. 279-300.
Number of full-text downloads 367

Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Number of full-text downloads 105

Alhaqbani, Bandar & Fidge, Colin (2010) Probabilistic inference channel detection and restriction applied to patients' privacy assurance. International Journal of Information Security and Privacy, 4(4), pp. 35-59.

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2008) Characterization of attackers' activities in honeypot traffic using principal component analysis. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE Computer Society, Shanghai, China, pp. 147-154.
Number of full-text downloads 353
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Almotairi, Saleh I., Clark, Andrew J., Mohay, George M., & Zimmermann, Jacob (2009) A technique for detecting new attacks in low-interaction honeypot traffic. In Georgescu, Sorin, Heikkinen, Seppo, & Popescu, Manuela (Eds.) Proceeding of the Fourth International Conference on Internet Monitoring and Protection, 24-28 May 2009, Venice/Mestre, Italy.
Number of full-text downloads 405
Number of citations in Scopus 4

Alpcan, Tansu, Kesici, Sinan, Bicher, Daniel, Mihcak, M. Kivanc, Bauckhage, Christian, & Camtepe, Seyit A. (2008) A lightweight biometric signature scheme for user authentication over networks. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ACM, Istanbul, Turkey, 33:1-33:6.
Number of full-text downloads 63

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2010) Assessing the impact of refactoring on security-critical object-oriented designs. In Han, Jun & Thu, Tran Dan (Eds.) Proceedings of the 17th Asia Pacific Software Engineering Conference, IEEE Computer Society, Hilton Hotel, Sydney. (In Press)
Number of full-text downloads 89
Number of citations in Scopus 1

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2012) Security assessment of code refactoring rules. In Proceedings of the Saudi Arabian National Workshop on Information Assurance Research (WIAR 2012), IEEE (Institute of Electrical and Electronics Engineers, Inc.) & IET (The Institution of Engineering and Technology), Riyadh, Saudi Arabia.
Number of full-text downloads 34

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2010) Security metrics for object-oriented designs. In Nobel, James & Fidge, Colin J. (Eds.) Proceedings of the 21st Australian Software Engineering Conference (ASWEC 2010), IEEE Computer Society, Hyatt Regency, Auckland, pp. 55-64.
Number of full-text downloads 143
Number of citations in Scopus 6

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2012) An automated tool for assessing security-critical designs and programs. In Proceedings of WIAR '2012; National Workshop on Information Assurance Research, Riyadh, Saudi Arabia.
Number of full-text downloads 45

Alshammari, Bandar, Fidge, Colin J., & Corney, Diane (2011) A hierarchical security assessment model for object-oriented programs. In Hierons, Rob & Merayo, Mercedes (Eds.) Proceedings of the 11th International Conference on Quality Software (QSIC 2011), IEEE Computer Society, University Complutense of Madrid, Madrid. (In Press)
Number of full-text downloads 205
Number of citations in Scopus 2

Alsolami, Eesa, Boyd, Colin, Clark, Andrew J., & Ahmed, Irfan (2011) User-representative feature selection for keystroke dynamics. In De Capitani di Vimercati , Sabrina & Samarati , Pierangela (Eds.) International Conference on Network and System Security, 6-8 September 2011, Università degli Studi di Milano, Milan.
Number of full-text downloads 147

Alzomai, Mohammed, Al Fayyadh, Bander, Josang, Audun, & McCullagh, Adrian (2008) An experimental investigation of the usability of transaction authorization in online bank security systems. In Brankovic, L & Miller, M (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), 22-25 January 2008, Australia, New South Wales, Wollongong.

Alzomai, Mohammed, Foo, Ernest, Josang, Audun, & McCullagh, Adrian (2008) Strengthening SMS-based authentication through usability. In Werner, B (Ed.) Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications, 10-12 December 2008, Australia, New South Wales, Sydney.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Alzomai, Mohammed & Josang, Audun (2010) The mobile phone as a multi OTP device using trusted computing. In Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Crown Conference Centre, Melbourne, Victoria, pp. 75-82.
Number of full-text downloads 267
Number of citations in Scopus 4

Amoah, Raphael, Suriadi, Suriadi, Camtepe, Seyit A., & Foo, Ernest (2014) Security analysis of the non-aggressive challenge response of the DNP3 Protocol using a CPN Model. In IEEE International Conference on Communications (ICC 2014), 10-14 June 2014, Sydney, NSW.
Number of full-text downloads 41

Andersson, Stig, Clark, Andrew, & Mohay, George (2004) Network based buffer overflow detection by exploit code analysis. In Mohay, George M., Clark, Andrew J., & Kerr, Kathryn (Eds.) AusCERT Asia Pacific Information Technology Security Conference: R&D Stream, 23-27 May 2004, Gold Coast, Australia.
Number of full-text downloads 485

Andersson, Stig, Clark, Andrew J., & Mohay, George M. (2005) Detecting network-based obfuscated code injection attacks using sandboxing. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 22-26 May 2005, Gold Coast, Queensland.
Number of full-text downloads 276

Andersson, Stig, Clark, Andrew J., Mohay, George M., Schatz, Bradley, & Zimmermann, Jacob (2005) A framework for detecting network-based code injection attacks targeting Windows and UNIX. In Proceedings of the 21st Annual Computer Security Applications Conference, 5-9 December 2005, Tucson, Arizona.
Number of full-text downloads 151
Number of citations in Scopus 4

Arianezhad, Majid, Camp, L. Jean, Kelley, Timothy, & Stebila, Douglas (2013) Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of Third ACM Conference on Data and Application Security and Privacy (CODASPY) 2013, ACM Digital Library, San Antonio, Texas, pp. 105-116.
Number of full-text downloads 334

Arianezhad, Majid, Stebila, Douglas, & Mozaffari, Behzad (2013) Usability and security of gaze-based graphical grid passwords. In Adams, Andrew & Murata, Kiyoshi (Eds.) Lecture Notes in Computer Science [Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers], Springer, Okinawa, Japan, pp. 17-33.
Number of full-text downloads 190

B

Batyuk, Leonid, Camtepe, Seyit A., & Albayrak, Sahin (2011) Multi-device key management using visual side channels in pervasive computing environments. In Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2011), IEEE Conference Publications, Barcelona, Spain, pp. 207-214.

Batyuk, Leonid, Herpich, Markus, Camtepe, Seyit A., Raddatz, Karsten, Schmidt, Aubrey-Derrick, & Albayrak, Sahin (2011) Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. In Proceedings of the 6th International Conference on Malicious and Unwanted Software (MALWARE 2011), IEEE Conference Publications, Fajardo, Puerto Rico, USA, pp. 66-72.
Number of citations in Scopus 13

Batyuk, Leonid, Scheel, Christian, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2011) Context-aware device self-configuration using self-organizing maps. In Proceedings of the 2011 Workshop on Organic Computing, ACM, Karlsruhe, Germany , pp. 13-22.
Number of citations in Scopus 2

Batyuk, Leonid, Schmidt, Aubrey-Derrick, Schmidt, Hans-Gunther, Camtepe, Seyit A., & Albayrak, Sahin (2009) Developing and benchmarking native Linux applications on Android. MobileWireless Middleware, Operating Systems, and Applications: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 7, pp. 381-392.
Number of citations in Scopus 11
Number of citations in Web of Science® 8

Bergsma, Florian, Dowling, Benjamin, Kohlar, Florian, Schwenk, Jörg, & Stebila, Douglas (2014) Multi-ciphersuite security of the Secure Shell (SSH) protocol. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, pp. 369-381.
Number of full-text downloads 9

Bhatia, Sajal, Mohay, George M., Schmidt, Desmond, & Tickle, Alan (2012) Modelling web-server Flash Events. In 2012 IEEE 11th International Symposium on Network Computing and Applications, Conference Publishing Services, Cambridge, MA, USA, pp. 79-86.
Number of full-text downloads 218
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Bhatia, Sajal, Mohay, George M., Tickle, Alan, & Ahmed, Ejaz (2011) Parametric differences between a real-world distributed denial-of-service attack and a flash event. In 6th International Conference on Availability, Reliability and Security, 22-26 August 2011, Vienna University of Technology, Vienna.
Number of full-text downloads 194
Number of citations in Scopus 4

Bhatia, Sajal, Schmidt, Desmond, & Mohay, George M. (2012) Ensemble-based DDoS detection and mitigation model. In 2012 Fifth International Conference On Security of Information and Networks, Jaipur, India, pp. 79-86.
Number of full-text downloads 244
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Boles, Wageeh, Boyd, Colin, & Hirschbichler, Marianne (2008) A multiple-control fuzzy vault. In Korba, L, Marsh, S, & Safavi-Naini, R (Eds.) Proceedings of Sixth Annual Conference on Privacy, Security and Trust, 2008, 1-3 October, 2008, New Brunswick, Canada.
Number of citations in Scopus 6
Number of citations in Web of Science® 1

Boles, Wageeh, Boyd, Colin, & Hirschbichler, Marianne (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In Ceballos, S (Ed.) Proceedings of Digital Image Computing: Techniques and Applications, 2008, 1-3 December 2008, Australia, Australian Capital Territory, Canberra.
Number of citations in Scopus 2

Boyd, Colin, Du, Rong, & Foo, Ernest (2008) Designing a secure e-tender submission protocol. Electronic Commerce Research, 8(3), pp. 115-142.
Number of citations in Scopus 1

Boyd, Colin & Gonzalez Nieto, Juan M. (2011) On forward secrecy in one-round key exchange. In Lecture Notes in Computer Science: Cryptography and Coding, Springer Berlin / Heidelberg, Oxford, UK, pp. 451-468.
Number of full-text downloads 181
Number of citations in Scopus 4

Branagan, Mark, Caelli, Bill, Kwok, Lam For, & Longley, Dennis (2008) Feasibility of automated information security compliance auditing. In Jajodia, S, Samarati, P, & Cimato, S (Eds.) Proceedings of the IFIP TC11 23rd International Information Security Conference, 7-10 September, 2008, Milano, Italy.
Number of citations in Scopus 1

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2009) Design and modeling of collaboration architecture for security. In Proceedings of the International Symposium on the Collaborative Technologies and Systems, IEEE Conference Publications, Baltimore, Maryland, pp. 330-341.

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teams rather than individuals : collaborative intrusion detection. In 5th Security Research Conference (Future Security 2010), September 2010, Berlin.

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security with CIMD : a collaborative approach to intrusion detection. In 19th USENIX Security Symposium, 11-13 August 2010, Washington D.C.

Bye, Rainer, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2010) Collaborative intrusion detection framework : characteristics, adversarial opportunities and countermeasures. In Proceedings of the 2010 International conference on Collaborative methods for security and privacy, USENIX Association, Washington DC, USA, p. 1.

Bye, Rainer, Luther, Katja, Camtepe, Seyit A., & Albayrak, Sahin (2009) Solving inherent problems of anomaly detection by cooperation. DAI Labor, Berlin.

Bye, Rainer, Luther, Katja, Camtepe, Seyit A., Alpcan, Tansu, Albayrak, Sahin, & Yener, Bulent (2007) Decentralized detector generation in cooperative intrusion detection system. Lecture Notes in Computer Science : Stabilization, Safety, and Security of Distributed Systems, 4838, pp. 37-51.
Number of citations in Scopus 1

BÌeasing, T., Batyuk, L., Schmidt, A-D., Camtepe, Seyit A., & Albayrak, S. (2010) An Android application sandbox system for suspicious software detection. In Proceedings of the 5th International Conference on Malicious and Unwanted Software, IEEE Conference Publications, Nancy, France , pp. 55-62.
Number of citations in Scopus 35

C

Caelli, Bill, McNair, Neil, & Smith, Leslie (2008) Information assurance education in a specialist defence environment. In Dodge, Ron (Ed.) Proceedings from the Twelfth Colloquium for Information Systems Security Education, 2-4 June 2008, United States of America, Dallas, Texas.

Caelli, William, Liu, Vicky, & Chang, She-I (2013) Identity, addressing, authenticity and audit requirements for trust in ERP, analytics and big/open data in a “Cloud” computing environment : a review and proposal. In 2013 Forensic Accounting and Personal Information Protection International Forum, 22-23 November 2013, National Chung Cheng University, Chiayi, Taiwan. (Unpublished)
Number of full-text downloads 88

Caelli, William, Liu, Vicky, & Chang, She-I (2014) Trust in merged ERP and open data schemes in the “Cloud”. In 2014 International Conference on Accounting and Information Technology, 21-23 February 2014, National Chung Cheng University, Chiayi, Taiwan. (Unpublished)
Number of full-text downloads 89

Camtepe, S. A. & Yener, B. (2007) Modeling and detection of complex attacks. In Proceedings of the Third International Conference on Security and Privacy in Communications Networks and the Workshops, 2007, IEEE Conference Publications , Nice, France, 234 -243.
Number of citations in Scopus 5
Number of citations in Web of Science® 1

Camtepe, S. A., Yener, B., & Yung, Moti (2006) Expander graph based key distribution mechanisms in wireless sensor networks. In Proceedings of IEEE International Conference on Communications, IEEE Conference Publications , Istanbul Turkey, 2262 -2267.
Number of citations in Scopus 15
Number of citations in Web of Science® 2

Camtepe, Seyit A. (2013) Complexity of increasing the secure connectivity in wireless ad hoc networks. Lecture Notes in Computer Science : Information Security and Privacy, 7959, pp. 363-378.
Number of full-text downloads 143

Camtepe, Seyit A. (2007) Design and analysis of key management schemes for distributed wireless sensor networks. PhD thesis, Rensselaer Polytechnic Institute, Department of Computer Science.

Camtepe, Seyit A. (2001) Kerberos based security system for session initiation protocol. Masters by Research thesis, Bogazici University, Computer Engineering Department .
Number of full-text downloads 96

Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.
Number of full-text downloads 98

Camtepe, Seyit A. & Yener, Bulent (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati, Pierangela, Ryan, Peter, Gollmann, Dieter, & Molva, Refik (Eds.) Lecture Notes in Computer Science, Computer Security – ESORICS 2004, Springer Berlin Heidelberg, Institut Eurecom, Sophia Antipolis, French Riviera, France, pp. 293-308.
Number of citations in Scopus 52
Number of citations in Web of Science® 39

Camtepe, Seyit A. & Yener, Bulent (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. Rensselaer Polytechnic Institute, New York.

Camtepe, Seyit A. & Yener, Bulent (2008) Key Management in Wireless Sensor Networks. In Lopez , Javier & Zhou, Jianying (Eds.) Wireless Sensor Network Security. IOS Press, pp. 110-141.

Camtepe, Seyit A. & Yener, Bulent (2005) Key distribution mechanisms for wireless sensor networks : a survey. Rensselaer Polytechnic Institute, New York, USA.

Camtepe, Seyit A. & Yener, Bulent (2009) Optimally increasing secure connectivity in multihop wireless ad hoc networks. Rensselaer Polytechnic Institute, New York, USA.

Camtepe, Seyit Ahmet & Yener, Bulent (2006) A formal method for attack modelling and detection. Rensselaer Polytechnic Institute, New York.

Carey, Nathan, Clark, Andrew, & Mohay, George (2002) IDS interoperability and correlation using IDMEF and commodity systems. In Fourth International Conference on Information and Communications Security, 9-12 December 2002, Singapore.
Number of full-text downloads 491
Number of citations in Web of Science® 4

Chen, Kevin, Clark, Andrew, De Vel, Olivier, & Mohay, George (2003) ECF - Event correlation for forensics. In First Australian Computer Network and Information Forensics Conference, 25 November 2003, Perth, Australia.
Number of full-text downloads 702

Chinnow, Joel, Bsufka, Karsten, Schmidt, Aubrey-Derrick, Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2011) A simulation framework for smart meter security evaluation. In Proceedings of the IEEE International Conference on Smart Measurements for Future Grids (SMFG 2011), IEEE Conference Publications, Bologna, Italy, pp. 1-9.
Number of citations in Scopus 4

Chinnow, Joel, Bye, Rainer, Camtepe, Seyit Ahmet, Bsufka, Karsten, & Albayrak, Sahin (2011) Evaluation of Attacks and Countermeasures in Large Scale Networks. In Heiss, Hans-Ulrich, Pepper, Peter, Schlingloff, Holger, & Schneider, Joerg (Eds.) Lecture Notes in Informatics, Gesellschaft fuer Informatik e.V. (GI), Berlin, Germany.

Chinnow, Joel, Bye, Rainer, Schmidt, Stephan, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2009) An extensible simulation framework for critical infrastructure security. DAI Labor, Berlin.

Cohen, Michael, Schatz, Bradley, & Garfinkel, Simson (2009) Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. Digital Investigation, 6(Supplement), S57-S68.
Number of citations in Scopus 6
Number of citations in Web of Science® 6

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 514

Corpuz, Maria (2011) Enterprise information security policy assessment : an extended framework for metrics development utilising the goal-question-metric approach. In Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, pp. 269-274.
Number of full-text downloads 606

Corpuz, Maria (2011) The enterprise information security policy as a strategic business policy within the corporate strategic plan (extended abstract). In Callaos, Nagib & Chu, Hsing-Wei (Eds.) Proceedings of the 15th World Multi-Conference on Systemics, Cybernetics and Informatics, International Institute of Informatics and Systemics (IIIS), Orlando, FL, USA, pp. 275-279.
Number of full-text downloads 198

D

Davis, Jonathan Jeremy & Clark, Andrew J. (2011) Data preprocessing for anomaly based network intrusion detection : a review. Computers & Security, 30(6-7), pp. 353-375.
Number of citations in Scopus 30
Number of citations in Web of Science® 12

Dawson, Edward, Reid, Jason F., Salim, Farzad, & Burdon, Mark (2009) Information sharing in the 21st century : progress and challenges. In Boyd, Colin & Susilo, Willy (Eds.) Eighth Australasian Information Security Conference (AISC 2010), 19-20 January 2010, Brisbane, Australia.

Dawson, Edward P., Clark, Andrew J., & Looi, Mark H. (2000) Key management in a non-trusted distributed environment. Future Generation Computer Systems, 16(4), pp. 319-329.
Number of full-text downloads 189
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Doble, Christopher, Fidge, Colin J., & Corney, Diane (2012) Data flow analysis of embedded program expressions. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 71-82.
Number of full-text downloads 151

Duncombe, David, Mohay, George M., & Clark, Andrew J. (2006) Synapse : auto correlation and dynamic attack redirection in an immunologically-inspired IDS. In Buyya, Rajkumar, Ma, Tianchi, Safavi-Naini, Rei, Steketee, Chris, & Susilo, Willy (Eds.) ACSW frontiers 2006 : proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society, Hobart, pp. 135-144.
Number of full-text downloads 125

F

Fidge, Colin J. & Corney, Diane (2009) Integrating hardware and software information flow analyses. In ACM SIGPLAN/SIGBED 2009 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2009), 19-20 June 2009, Trinity College, Dublin.
Number of full-text downloads 106
Number of citations in Scopus 1

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 33

G

Gill, Rupinder S., Smith, Jason, Looi, Mark H., & Clark, Andrew J. (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22-26 May 2005, Gold Coast, Australia.
Number of full-text downloads 539

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Detecting attacks in encrypted networks using secret-sharing schemes. International Journal of Cryptology Research, 2(1), pp. 89-99.
Number of full-text downloads 65

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Number of full-text downloads 484

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Intrusion detection system for encrypted networks using secret-sharing schemes. In International Journal of Cryptology Research, Malaysian Society for Cryptology Research, Hotel Equatorial, Melaka, Malaysia.
Number of full-text downloads 199

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark H. (2009) Towards intrusion detection for encrypted networks. In 2009 International Conference on Availability, Reliability and Security, 16-19 March 2009, Fukuoka Institute of Technology, Fukuoka.
Number of full-text downloads 252

Goonasekera, Nuwan A., Caelli, William, & Fidge, Colin (2012) A hardware virtualization-based component sandboxing architecture. Journal of Software, 7(9), pp. 2107-2118.
Number of full-text downloads 152
Number of citations in Scopus 1

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2011) Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security, 14(4), 28:1-28:24.
Number of citations in Web of Science® 2

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.
Number of citations in Scopus 11

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Strong designated verifier signature in a multi-user setting. In Seventh Australasian Information Security Conference (AISC 2009), Jan 20-23, 2009, Wellington, New Zealand.
Number of full-text downloads 96

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Universally composable contributory group key exchange. In Asian ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 10 - 12 March 2009, Sydney.
Number of citations in Scopus 6

Grunewald, Dennis, Chinnow, Joel, Bye, Rainer, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2011) Framework for evaluating collaborative intrusion detection systems. In Heiß, Hans-Ulrich , Pepper, Peter, Schlingloff, Holger, & Schneider, Joerg (Eds.) Lecture Notes in Informatics, Gesellschaft fuer Informatik e.V. (GI), Berlin, Germany.
Number of full-text downloads 171

H

Hauser, Christophe, Tronel, Frederic, Mé, Ludovic, & Fidge, Colin J. (2013) Intrusion detection in distributed systems, an approach based on taint marking. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), IEEE Computer Society, Budapest, Hungary, pp. 1962-1967.
Number of full-text downloads 55

Hauser, Christophe, Tronel, Frederic, Reid, Jason F., & Fidge, Colin J. (2012) A taint marking approach to confidentiality violation detection. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 83-90.
Number of full-text downloads 531

Herpich, Markus, Batyuk, Leonid, Camtepe, Seyit A., & Albayrak, Sahin (2012) A trusted ecosystem for Android applications based on context-aware access control. In Proceedings of the 7th International Conference on Malicious and Unwanted Software (MALWARE 2012), IEEE Conference Publications, Fajardo, Puerto Rico, USA, pp. 73-78.

Hodgett, Matthew (2013) Visualising security incidents through event aggregation. [Working Paper] (Unpublished)

I

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 244

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 364

J

Jafari, Mohammad, Fong, Philip W. L., Safavi-Naini, Rei, Barker, Ken, & Sheppard, Nicholas P. (2011) Towards defining semantic foundations for purpose-based privacy policies. In Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY '11), ACM, Hilton Palacio Del Rio, San Antonio, Texas, pp. 213-224.
Number of full-text downloads 70
Number of citations in Scopus 7

Jafari, Mohammad, Safavi-Naini, Rei, Saunders, Chad, & Sheppard, Nicholas P. (2010) Securing medical research data with a rights management system. In Proceedings of the 1st USENIX Workshop on Health Security and Privacy, Washington DC.
Number of full-text downloads 57

Jafari, Mohammad, Safavi-Naini, Rei, & Sheppard, Nicholas P. (2011) A rights management approach to protection of privacy in a cloud of electronic health records. In Proceedings of the 11th annual ACM workshop on Digital rights management, ACM, Chicago, IL, USA, pp. 23-30.
Number of full-text downloads 161
Number of citations in Scopus 3

Jafari, Mohammad, Safavi-Naini, Reihaneh, Saunders, Chad, & Sheppard, Nicholas P. (2010) Using digital rights management for securing data in a medical research environment. In Proceedings of the 10th ACM Workshop on Digital Rights Management, Association for Computing Machinery (ACM), Hyatt Regency Chicago, Illinois, pp. 55-60.
Number of citations in Scopus 2

Josang, Audun, Al Fayyadh, Bander, Grandison, Tyrone, Alzomai, Mohammed, & McNamara, Judith (2007) Security usability principles for vulnerability analysis and risk assessment. In 23rd Annual Computer Security Application Conference, 10-14 December 2007, Miami Beach, Florida.
Number of full-text downloads 488
Number of citations in Scopus 7
Number of citations in Web of Science® 1

K

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Computers and Electrical Engineering, 35(1), p. 9.
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Kang, Baoyuan , Boyd, Colin, & Dawson, Edward (2009) Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35(1), pp. 49-53.
Number of citations in Scopus 27
Number of citations in Web of Science® 11

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 523

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 353

Kiani, Mehdi, Clark, Andrew J., & Mohay, George M. (2008) Evaluation of anomaly based character distribution models in the detection of SQL injection attacks. In Third International Conference on Availability, Reliability and Security, 4-7 March, 2008, Barcelona, Spain.
Number of full-text downloads 423
Number of citations in Scopus 8
Number of citations in Web of Science® 2

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2012) Practical client puzzles in the standard model. In Youm, Heung Youl & Won, Yujae (Eds.) Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, SoonChunHyang University, Korea, Korea.

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Number of full-text downloads 106
Number of citations in Scopus 1

L

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW. (In Press)
Number of full-text downloads 69

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. In The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Deakin University, Melbourne, VIC.
Number of full-text downloads 51

Liu, Vicky, Caelli, William, & Chen, Yu-Nien Maggie (2013) Using a public key registry for improved trust and scalability in national E-health systems. International Journal of E-Health and Medical Communications, 4(4), pp. 66-83.

M

Manulis, Mark, Stebila, Douglas, & Denham, Mark (2014) Secure modular password authentication for the web using channel bindings. In Chen, Liqun (Ed.) Proceedings of the 1st International Conference on Research in Security Standardisation (SSR) 2014, Springer, University of London, Egham, UK. (In Press)
Number of full-text downloads 4

Marrington, Andrew, Branagan, Mark, & Smith, Jason (2007) Forensic challenges in service oriented architectures. In 2007 Research Network for a Secure Australia : Security Technology Conference, 28 September 2007, Melbourne University, Melbourne, Victoria.
Number of full-text downloads 291

Marrington, Andrew, Mohay, George M., Clark, Andrew J., & Morarji, Hasmukh L. (2009) Dealing with temporal inconsistency in automated computer forensic profiling. [Working Paper] (Unpublished)
Number of full-text downloads 402

Marrington, Andrew, Mohay, George M., Morarji, Hasmukh L., & Clark, Andrew J. (2010) A model for computer profiling. In Proceedings of the Third International Workshop on Digital Forensics, Andrzej Frycz Modrzewski Cracow College, Krakow, Poland.
Number of full-text downloads 148

Marrington, Andrew , Baggili, Ibrahim , Mohay, George M., & Clark, Andrew J. (2011) CAT Detect (Computer Activity Timeline Detection) : a tool for detecting inconsistency in computer activity timelines. Digital Investigation, 8(Sup), S52-S61.

Messerman, A., Mustafic, T., Camtepe, S. A., & Albayrak, S. (2010) A generic framework and runtime environment for development and evaluation of behavioral biometrics solutions. In Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, IEEE Conference Publications , Cairo, Egypt, pp. 136-141.
Number of citations in Scopus 4

Messerman, Arik, Mustafic, Tarik, Camtepe, Seyit A., & Albayrak, Sahin (2011) Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In Proceedings of the 2011 International Joint Conference on Biometrics IJCB '11, IEEE Conference Publications , Washington, D.C., pp. 1-8.

Messerman, Arik, Mustafic, Tarik, Camtepe, Seyit A., & Albayrak, Sahin (2010) Non-intrusive continuous user behaviour analysis using computerized systems. In 5th Security Research Conference (Future Security 2010), September 2010, Berlin.

Mills, Chris, Fidge, Colin J., & Corney, Diane (2012) Tool-supported dataflow analysis of a security-critical embedded device. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the 10th Australasian Information Security Conference (AISC 2012), Australian Computer Society, RMIT University, Melbourne, VIC, pp. 59-70.
Number of full-text downloads 222

Moeller, Martin, Bye, Rainer, Bsufka, Karsten, Camtepe, Seyit Ahmet, & Albayrak, Sahin (2011) From simulation to emulation : an integrated approach for network security evaluation. In Heiss, Hans-Ulrich, Pepper, Peter, Schlingloff, Holger, & Schneider, Joerg (Eds.) Lecture Notes in Informatics, Gesellschaft fuer Informatik e.V. (GI), Berlin, Germany.
Number of full-text downloads 249

Moskovitch, Robert, Feher, Clint, Messerman, Arik, Kirschnick, Niklas, Mustafic, Tarik, Camtepe, Seyit A., et al. (2009) Identity theft, computers and behavioral biometrics. In Proceedings of the IEEE international conference on Intelligence and security informatics, IEEE Press, Piscataway, N. J., pp. 155-160.
Number of citations in Scopus 12

Muhlbauer, Adam, Salim, Farzad, Safavi-Naini, Reihaneh, Sheppard, Nicholas P., & Surminen, Martin (2008) Location constraints in digital rights management. Computer Communications, 31(6), pp. 1173-1180.
Number of full-text downloads 109
Number of citations in Scopus 10
Number of citations in Web of Science® 2

Mustafic, Tarik, Messerman, Arik, Camtepe, Seyit Ahmet, Schmidt, Aubrey-Derrick, & Albayrak, Sahin (2011) Behavioral biometrics for persistent single sign-on. In Proceedings of the 7th ACM Workshop on Digital Identity Management, ACM, Chicago, IL, USA, pp. 73-82.
Number of citations in Scopus 2

N

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proof for formal indistinguishability and its applications. In The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 30 June 2011, Institut Henri Poincaré, Paris. (Unpublished)
Number of full-text downloads 81

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proofs for Diffie–Hellman–based key exchanges. In Backes, Michael & Zdancewic, Steve (Eds.) 2011 IEEE 24th Computer Security Foundations Symposium (CSF 2011), IEEE, Abbaye des Vaux-de-Cernay, Cernay-la-Ville, pp. 51-65.
Number of full-text downloads 156
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2013) Automated proofs of computational indistinguishability. The Computer Journal.

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2010) Automating computational proofs for public-key-based key exchange. In Heng, Swee-Huay & Kurosawa, Kaoru (Eds.) Provable Security : Proceedings of the 4th International Conference on Provable Security, Springer, Hotel Equatorial Melaka, Malacca, Malaysia, pp. 53-69.
Number of full-text downloads 194
Number of citations in Scopus 2
Number of citations in Web of Science® 1

P

Paterson, Kenneth G. & Stebila, Douglas (2010) One-time-password-authenticated key exchange. In Steinfeld, Ron & Hawkes, Philip (Eds.) Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 454
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2005) Challenges of automating the detection of paedophile activity on the Internet. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November 2005, Taipei, Taiwan.
Number of full-text downloads 2,133
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2010) A framework for improved adolescent and child safety in MMOs. In Memon, Nasrullah & Alhajj, Reda (Eds.) 2010 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2010), IEEE Computer Society, University of Southern Denmark, Odense, Denmark, pp. 33-40.
Number of full-text downloads 155

Pham, Quan, Reid, Jason, & Dawson, Ed (2011) Policy filtering with XACML. Technical Report : Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 61

Pham, Quan, Reid, Jason F., & Dawson, Edward (2010) Delegation constraint management. Technical Report: Information Security Institute, Queensland University of Technology. (Submitted (not yet accepted for publication))
Number of full-text downloads 173

Pham, Quan, Reid, Jason F., & Dawson, Edward (2011) A model for constraint and delegation management. In The 7th Information Security Practice and Experience Conference (ISPEC 2011), 30th May - 1st June 2011, Guangzhou, China.
Number of full-text downloads 93

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2008) Commitment issues in delegation process. In Proceedings of the 6th Australasian Conference on Information Security, Australian Computer Society Inc., Wollongong, N.S.W.
Number of full-text downloads 48

Pham, Quan, Reid, Jason F., McCullagh, Adrian, & Dawson, Edward (2009) On a taxonomy of delegation. Computers & Security, 29(5), pp. 565-579.
Number of full-text downloads 96
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Pham, Quan, Reid, Jason F., McCullagh, Adrian J., & Dawson, Edward P. (2009) On a taxonomy of delegation. In Emerging Challenges for Security, Privacy and Trust - IFIP Advances in Information and Communication Technology 2009, Springer-Verlag, Pafos, Cyprus, pp. 353-363.
Number of full-text downloads 77
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Poettering, Bertram & Stebila, Douglas (2014) Double-authentication-preventing signatures. In Kutyłowski, Mirosław & Vaidya, Jaideep (Eds.) Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part I [Lecture Notes in Computer Science, Volume 8713], Springer, Wroclaw, Poland, pp. 436-453.
Number of full-text downloads 27

Pozzobon, Oscar, Wullems, Christian, & Kubik, Kurt (2004) Requirements for enhancing trust, security and integrity of GNSS location services. In Proceedings of The 60th Annual Meeting of the Institute of Navigation, Institute of Navigation, Dayton Marriott Hotel, Dayton, OH.

Pozzobon, Oscar, Wullems, Christian, & Kubik, Kurt (2004) Secure tracking using trusted GNSS receivers and Galileo authentication services. Journal of Global Positioning Systems, 3(1-2), pp. 200-207.

R

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Buys, Laurie (2013) “Who decides?” Security and privacy in the wild. In Calder, Paul & Shen, Haifeng (Eds.) Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration (OzCHI '13), Assocation for Computing Machinery (ACM), Flinders University, Adelaide, Australia, pp. 27-36.
Number of full-text downloads 48

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, Manulis, Mark, & Stebila, Douglas (2014) Formalising human recognition : a fundamental building block for security proofs. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society Inc. , Auckland, New Zealand, pp. 37-45.
Number of full-text downloads 13

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 118

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 50
Number of citations in Scopus 1

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi , Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 317

Rangasamy, Jothi, Stebila, Douglas, Kuppusamy, Lakshmi, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Efficient modular exponentiation-based puzzles for denial-of-service protection. Lecture Notes in Computer Science, 7259, pp. 319-331.
Number of citations in Scopus 1

Reid, Jason F. (2009) A matter of confidence : privacy compliance for connected-up enterprises. In 2nd International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2009), 1 September 2009, Auckland, New Zealand. (Unpublished)

Reid, Jason F., Gonzalez Nieto, Juan M., Tang, Tee, & Senadji, Bouchra (2007) Detecting relay attacks with timing-based protocols. In Bao, Feng & Miller , Steven (Eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), Singapore, pp. 204-213.
Number of full-text downloads 181
Number of citations in Scopus 56

S

Safavi-Naini, Rei & Sheppard, Nicholas P. (2010) Digital rights management. In Rosenberg, Burton (Ed.) Handbook of Financial Cryptography and Security. CRC Press (Taylor and Francis Group).
Number of full-text downloads 162

Salim, Farzad (2006) Detecting and resolving redundancies in EP3P policies. Masters by Research thesis, Faculty of Computer Science and Software Engineering, University of Wollongong.
Number of full-text downloads 93

Salim, Farzad, Dulleck, Uwe, Reid, Jason F., & Dawson, Edward (2011) Optimal budget allocation in budget-based access control. In The 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, Vienna University of Technology, Vienna.
Number of full-text downloads 64

Salim, Farzad, Reid, Jason, Dulleck, Uwe, & Dawson, Edward (2010) Towards a game theoretic authorisation model. In Proceedings of Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany.
Number of full-text downloads 341
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) Towards authorisation models for secure information sharing : a survey and research agenda. ISeCure, The ISC International Journal of Information Security, 2(2), pp. 69-87.
Number of full-text downloads 272

Salim, Farzad, Reid, Jason F., & Dawson, Edward (2010) An administrative model for UCON. In Proceedings of he 8th Australasian Information Security Conference (AISC 2010), Conferences in Research and Practice in Information Technology (CRPIT), Queensland University of Technology, Brisbane, Queensland, pp. 32-38.
Number of full-text downloads 131

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) Access control : allocating resources to selfish agents. SPECIAL ISSUE ON DECISION AND GAME THEORY FOR SECURITY, 6(4), pp. 18-21.

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.
Number of full-text downloads 51

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2011) An approach to access control under uncertainty. In ARES, IEEE, Vienna University of Technology, Vienna, pp. 1-8.
Number of full-text downloads 135
Number of citations in Scopus 5

Salim, Farzad, Sheppard, Nicholas P., & Safavi-Naini, Rei (2007) Enforcing P3P policies using a digital rights management system. In Privacy Enhancing Technologies, Springer, University of Ottawa, Ottawa, pp. 200-217.
Number of full-text downloads 58
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Salim, Farzad, Sheppard, Nicholas P., & Safavi-Naini, Rei (2007) Using SITDRM for Privacy Rights Management. In 1st ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT 2007), 30-31 March 2007, Cambridge, Massachusetts.
Number of full-text downloads 45

Salim, Farzad, Sheppard, Nicholas P., & Safavi-Naini, Rei (2010) A rights management approach to securing data distribution in coalitions. In Proceedings of 1st Asia-Pacific Workshop on Cyber Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 43
Number of citations in Scopus 3

Schatz, Bradley & Clark, Andrew J. (2006) An open architecture for digital evidence integration. In Clark, Andrew J., McPherson, Mark, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference : Refereed R&D Stream, 21-26 May 2006, Gold Coast, Queensland.
Number of full-text downloads 349

Schatz, Bradley & Cohen, Michael (2010) Hash based disk imaging using AFF4. In Digital Investigation : The Proceedings of the Tenth Annual Digital Forensic Research Workshop Conference, Elseveir, Portland, Oregon, S121-S128.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Schatz, Bradley, Mohay, George M., & Clark, Andrew J. (2006) A correlation method for establishing provenance of timestamps in digital evidence. Digital Investigation, 3(Supplement 1), S98-S107.
Number of full-text downloads 346
Number of citations in Scopus 16

Schmidt, A-D., Bye, R., Schmidt, H-G., Clausen, J., Kiraz, O., Yuksel, K. A., et al. (2009) Static analysis of executables for collaborative malware detection on Android. In Proceedings of the IEEE International Conference on Communications, IEEE Conference Publications , Dresden, Germany, pp. 1-5.
Number of citations in Scopus 1
Number of citations in Web of Science® 3

Schmidt, A.-D., Clausen, J.H., Camtepe, S. A., & Albayrak, S. (2009) Detecting Symbian OS malware through static function call analysis. In Proceedings of the 4th International Conference on Malicious and Unwanted Software, IEEE Conference Publications , Montreal, Quebec, Canada, pp. 15-22.
Number of citations in Scopus 13
Number of citations in Web of Science® 6

Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, Seyit A., Albayrak, S., et al. (2009) Smartphone malware evolution revisited : Android next target? In Proceedings of the 4th International Conference on Malicious and Unwanted Software, IEEE Conference Publications , Montreal, Quebec, Canada, pp. 1-7.
Number of citations in Scopus 20
Number of citations in Web of Science® 4

Schmidt, Aubrey-Derrick, Bye, Rainer, Schmidt, Hans-Gunther, Yuksel, Kamer Ali, Kiraz, Osman, Clausen, Jan, et al. (2008) Monitoring android for collaborative anomaly detection : a first architectural draft. DAI-Labor, Berlin.

Schmidt, Aubrey-Derrick, Camtepe, Seyit A., & Albayrak, Sahin (2010) Static smartphone malware detection. In 5th Security Research Conference (Future Security 2010), September 2010, Berlin.

Schmidt, Aubrey-Derrick, Peters, Frank, Lamour, Florian, Scheel, Christian, Camtepe, Seyit A., & Albayrak, Sahin (2009) Monitoring smartphones for anomaly detection. Mobile Networks and Applications, 14(1), pp. 92-106.
Number of citations in Scopus 28
Number of citations in Web of Science® 15

Schmidt, Aubrey-Derrick, Schmidt, Hans-Gunther, Clausen, Jan, Yuksel, Kamer A., Kiraz, Osman, Camtepe, Seyit A., et al. (2008) Enhancing security of linux-based android devices. In Proceedings of the 15th International Linux Kongress, Hamburg, Germany.

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 445

Schmidt, Hans-Gunther, Raddatz, Karsten, Schmidt, Aubrey-Derrick, Camtepe, Seyit A., & Albayrak, Sahin (2009) Google Android : a comprehensive introduction. DAI-Labor, Berlin.

Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Number of citations in Scopus 8
Number of citations in Web of Science® 1

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2011) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured petri nets - Version 1.0. (Unpublished)
Number of full-text downloads 217

Sheikh, Riaz A., Sharif, Kashif, & Ahmed, Ejaz (2005) Performance analysis of unified enterprise application security framework. In Proceedings of Student Conference on Engineering Sciences and Technology 2005, IEEE, NED University of Engineering and Technology, Karachi.
Number of full-text downloads 109

Sheppard, Nicholas P. (2010) Distributing sensitive information in the MPEG-21 multimedia framework. In Angelides, Marios C. & Agius, Harry (Eds.) The Handbook of MPEG Applications : Standards in Practice. Wiley-Blackwell, pp. 433-454.

Skandhakumar, Nimalaprakasan, Reid, Jason F., Dawson, Ed, Drogemuller, Robin, & Salim, Farzad (2012) An authorization framework using building information models. The Computer Journal, 55(10), 1244 -1264.
Number of full-text downloads 62
Number of citations in Scopus 2

Skandhakumar, Nimalaprakasan, Reid, Jason F., Salim, Farzad, & Dawson, Edward (2014) A policy model for access control using building information models. [Working Paper]

Skandhakumar, Nimalaprakasan, Salim, Farzad, Drogemuller, Robin, Reid, Jason F., & Dawson, Edward (2014) Graph theory based representation of building information models for access control applications. [Working Paper] (In Press)

Skandhakumar, Nimalaprakasan, Salim, Farzad, Reid, Jason F., & Dawson, Edward (2012) Physical access control administration using building information models. Lecture Notes in Computer Science : Cyberspace Safety and Security, 7672, pp. 236-250.
Number of full-text downloads 22

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 244
Number of citations in Scopus 7
Number of citations in Web of Science® 2

Stebila, Douglas & Ustaoglu, Berkant (2009) Towards denial-of-service-resilient key agreement protocols. Information Security and Privacy (LNCS), 5594, pp. 389-406.
Number of full-text downloads 195
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2010) Delegation in predicate encryption supporting disjunctive queries. In Rannenberg, Kai & Varadharajan, Vijay (Eds.) IFIP Advances in Information and Communication Technology : Proceedings of 25th IFIP TC-11 International Information Security Conference, SEC 2010, Springer, Brisbane, pp. 229-240.
Number of full-text downloads 215
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 214
Number of citations in Scopus 7

T

Tang, Maolin & Fidge, Colin J. (2010) Reconstruction of falsified computer logs for digital forensics investigations. In Information Security 2010: Proceedings of the Eight Australasian Information Security Conference [Conferences in Research and Practice in Information Technology, Volume 105], Australian Computer Society, Queensland University of Technology, Brisbane, Queensland, pp. 12-21.
Number of full-text downloads 253

Teo, Sui-Guan, Alhamdan, Ali, Bartlett, Harry, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence in the initialisation of stream ciphers. In Parampalli, Udaya & Hawkes, Philip (Eds.) Information Security and Privacy, Springer Berlin / Heidelberg, RMIT University, Melbourne, Vic, pp. 75-88.
Number of full-text downloads 98
Number of citations in Scopus 1

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. In Proceedings of International Cryptology Conference 2010, Hotel Equatorial Melaka, Melaka.

Teo, Sui-Guan, Simpson, Leonie R., & Dawson, Edward (2010) Bias in the nonlinear filter generator output sequence. International Journal of Cryptology Research, 2(1), pp. 27-37.
Number of full-text downloads 122

Teo, Sui-Guan, Simpson, Leonie R., Wong, Kenneth Koon-Ho, & Dawson, Edward (2011) State convergence and the effectiveness of time-memory-data tradeoffs. In Abraham, Ajith, Zheng, Daniel, Agrawal, Dharma, Abdollah, Mohd Faizal, Corchado, Emilio, Casola, Valentina, et al. (Eds.) Proceedings of the 7th International Conference on Information Assurance and Security, IEEE, Universiti Teknikal Malaysia Melaka , Malacca, Malaysia, pp. 92-97.
Number of full-text downloads 82

V

Viet Triem Tong, Valérie, Clark, Andrew J., & Mé, Ludovic (2010) Specifying and enforcing a fine-grained information flow policy : model and experiments. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1), pp. 56-71.
Number of full-text downloads 197

W

Wark, T., Sridharan, S., & Chandran, V. (2000) The use of temporal speech and lip information for multi-modal speaker identification via multi-stream HMMs. In 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing: Image and Multidimensional Signal Processing Multimedia Signal Processing, Istanbul, pp. 2389-2392.
Number of full-text downloads 75

Wullems, Christian, Pozzobon, Oscar, & Kubik, Kurt (2006) Secure tracking for critical applications : communications, GPS and future Galileo services. In Mendis, Priyan, Lai, Joseph, & Dawson, Ed (Eds.) Recent Advances in Security Technology, Australian Homeland Security Research Centre, Canberra, ACT.
Number of full-text downloads 158

Wullems, Christian, Pozzobon, Oscar, & Kubik, Kurt (2005) Signal authentication and integrity schemes for next generation global navigation satellite systems. In Proceedings of the European Navigation Conference GNSS, 2005, Munich, Germany.
Number of full-text downloads 317

Wullems, Christian J., Looi, Mark H., & Clark, Andrew J. (2003) Enhancing the security of Internet applications using location : a new model for tamper-resistant GSM location. In Proceedings of the Eighth IEEE International Symposium on Computers and Communication, 30 June - 3 July 2003, Antalya, Turkey.
Number of full-text downloads 268
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Z

Zimmermann, Jacob, Clark, Andrew J., Mohay, George M., Pouget, Fabien, & Dacier, Marc (2005) The use of packet inter-arrival times for investigating unsolicited Internet traffic. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November, Taipei, Taiwan.
Number of full-text downloads 102
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Zuccon, Guido, Daniel, Kotzur, Nguyen, Anthony, & Bergheim, Anton (2014) De-Identification of health records using Anonym : effectiveness and robustness across datasets. Artificial Intelligence in Medicine, 61(3), pp. 145-151.
Number of citations in Scopus 1

This list was generated on Sat Dec 20 06:55:15 2014 AEST.