Group by:
Item Type |
DateNumber of items at this level: 596.
Book/Report
Bruce, Christine, Mohay, George, Smith, Glenn, Stoodley, Ian, & Tweedale, Robyn (Eds.)
(2006)
Transforming IT Education: Promoting a Culture of Excellence.
Informing Science Press, United States of America, California, Santa Rosa.
Dawson, Edward, Christensen, Sharon, Duncan, Bill, Foo, Ernest, Du, Rong, Gonzalez Nieto, Juan, & Black, Peter
(2006)
eTendering - Security and Legal Issues.
Cooperative Research Centre for Construction Innovation - CRC, Australia, Queensland, Brisbane.
1,589
Chapter in Book, Report or Conference volume
Abbott, Jonathon, Bell, Jim, Clark, Andrew, De Vel, Olivier, & Mohay, George
(2006)
Automated Recognition of Event Scenarios for Digital Forensics.
In
Liebrock, N (Ed.) Proceedings of the 2006 ACM Symposium on Applied Computing.
ACM Press, United States of America, pp. 293-300.
15
Abdullah, Noraswaliza, Xu, Yue, Geva, Shlomo, & Looi, Mark
(2010)
Enhancement of infrequent purchased product recommendation using data mining techniques.
In
Bramer, M (Ed.) Artificial Intelligence in Theory and Practice III: proceedings of the 3rd IFIP International Conference on Artificial Intelligence in Theory and Practice, held as part of the 21st IFIP World Computer Congress 2010.
Springer, Germany, pp. 57-66.
4
Agudo, Isaac, Lopez, Javier, Montenegro, Jose, Okamoto, Eiji, & Dawson, Edward
(2005)
Delegation Perspective of Practical Authorization Schemes.
In
Furnell, S, Dowland, P, & Kormentzas, G (Eds.) Proceedings of the Fifth International Network Conference - INC2005.
University of the Aegean, Greece, pp. 157-164.
Ahmad Khalid, Shamsul, Zimmermann, Jacob, Corney, Diane, & Fidge, Colin
(2010)
Automatic generation of assertions to detect potential security vulnerabilities in C programs that use union and pointer types.
In
Hu, J, Zhou, W, Xiang, Y, Sadeghi, A R, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security.
IEEE Computer Society, United States, pp. 1-6.
279
3
Ahmed, Ejaz, Clark, Andrew, & Mohay, George
(2009)
Characterising anamolous events using change-point correlation on unsolicited network traffic.
In
Josang, A, Maseng, T, & Knapskog, S (Eds.) Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Proceedings [Lecture Notes in Computer Science, Vol 5838].
Springer, Germany, pp. 104-119.
Ahmed, Ejaz, Clark, Andrew, & Mohay, George
(2009)
Effective change detection in large repositories of unsolicited traffic.
In
Popescu, M, Georgescu, S, & Heikkinen, S (Eds.) Proceedings of the 4th International Conference on Internet Monitoring and Protection.
IEEE Computer Society, United States, pp. 1-6.
321
15
Ahmed, Ejaz, Clark, Andrew, & Mohay, George
(2008)
A novel sliding window based change detection algorithm for asymmetric traffic.
In
Li, M, Cao, J, Liu, H, Weng, C, Wang, X, Tang, H, et al. (Eds.) Proceedings of IFIP International Conference on Network and Parallel Computing Workshops.
IEEE Computer Society, United States, pp. 168-175.
Ahmed, Ejaz, Mohay, George, Tickle, Alan, & Bhatia, Sajal
(2010)
Use of IP addresses for high rate flooding attack detection.
In
Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330].
Springer, Germany, pp. 124-135.
Ahmed, Irfan, Lhee, Kyung-Suk, Shin, Hyun-Jung, & Hong, Man-Pyo
(2011)
Fast content-based file type identification.
In
Shenoi, S & Peterson, G (Eds.) Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361].
Springer, Germany, pp. 65-76.
26
Al Fayyadh, Bander, Ponting, James, Alzomai, Mohammed, & Josang, Audun
(2010)
Vulnerabilities in personal firewalls caused by poor security usability.
In
Fan, P & Yuan, D (Eds.) Proceedings of the 2010 IEEE International Conference on Information Theory and Information Security.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 682-688.
10
Al Kaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Nic
(2011)
Dealing with the problem of cybercrime.
In
Baggili, I (Ed.) Digital Forensics and Cyber Crime: Second International ICST Conference Revised Selected Papers [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2011, Volume 53].
Springer, Germany, pp. 1-18.
2,469
12
Al Kaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Nic
(2010)
Money laundering and FATF compliance by the international community.
In
Hilty, L, Berleur, J, & Herscheui, M (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience [IFIP Advances in Information and Communication Technology, 2010, Volume 328].
Springer, Germany, pp. 86-97.
Al Kaabi, Ali, Mohay, George, McCullagh, Adrian, & Chantler, Nic
(2010)
A comparative analysis of the extent of money laundering in Australia, UAE, UK and USA.
In
Balachandran, B (Ed.) Proceedings of the 1st Finance and Corporate Governance Conference 2010.
Social Science Research Network, Australia, pp. 1-13.
Al Zaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan
(2008)
RSDA: Reputation-based secure data aggregation in wireless sensor networks.
In
Xu, Z, Pan, Y, Shen, H, Hine, J, Huang, Z, Lefevre, L, et al. (Eds.) Proceedings of the Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2008.
IEEE Computer Society, United States, pp. 419-424.
Al Zaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan, Boyd, Colin, & Foo, Ernest
(2009)
A forward & backward secure key management in wireless sensor networks for PCS/SCADA.
In
Hailes, S, Sicari, S, & Roussos, G (Eds.) Sensor Systems and Software : First International ICST Conference Revised Selected Papers (S-CUBE 2009) [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, Volume 24].
Springer, Germany, pp. 66-82.
779
15
Alfawaz, Salahuddin, Nelson, Karen, & Mohannak, Kavoos
(2010)
Information security culture: a behaviour compliance conceptual framework.
In
Boyd, C & Susilo, W (Eds.) Information Security 2010: AISC '10 Proceedings of the Eighth Australasian Conference on Information Security [Conferences in Research and Practice in Information Technology, Volume 105].
Australian Computer Society, Australia, pp. 51-60.
2,474
53
Alhaqbani, Bandar & Fidge, Colin
(2008)
Access Control Requirements for Processing Electronic Health Records.
In
Paik, H Y, Benatallah, B, & ter Hofstede, A (Eds.) Business Process Management Workshops: BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws - Revised Selected Papers [Lecture Notes in Computer Science, Volume 4928].
Springer, Germany, pp. 371-382.
1,270
48
Almotairi, Saleh, Clark, Andrew, Dacier, Marc, Leita, Corrado, Mohay, George, Pham, Van Hau, Thonnard, Olivier, & Zimmermann, Jacob
(2007)
Extracting Inter-Arrival Time Based Behaviour From Honeypot Traffic Using Cliques.
In
Valli, C & Woodward, A (Eds.) Proceedings of the 5th Australian Digital Forensics Conference.
Edith Cowan University, CD Rom, pp. 79-87.
455
8
Almotairi, Saleh, Clark, Andrew, Mohay, George, & Zimmermann, Jacob
(2008)
Characterization of attackers' activities in honeypot traffic using principal component analysis.
In
Li, M, Cao, J, Liu, H, Weng, C, Wang, X, Tang, H, et al. (Eds.) Proceedings of the IFIP International Conference on Network and Parallel Computing.
IEEE Computer Society, United States, pp. 147-154.
Almotairi, Saleh, Clark, Andrew, Mohay, George, & Zimmermann, Jacob
(2009)
A technique for detecting new attacks in low-interaction honeypot traffic.
In
Popescu, M, Georgescu, S, & Heikkinen, S (Eds.) Proceedings of The Fourth International Conference on Internet Monitoring and Protection.
IEEE Computer Society, United States, pp. 7-13.
843
21
Alsolami, Eesa, Boyd, Colin, Clark, Andrew, & Ahmed, Irfan
(2011)
User-representative feature selection for the keystroke dynamics.
In
Hu, H, Foresti, S, Livraga, G, & Samarati, P (Eds.) Proceedings of 2011 5th International Conference on Network and System Security.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 229-233.
340
Alsolami, Eesa, Boyd, Colin, Clark, Andrew, & Islam, Asadul
(2010)
Continuous biometric authentication: Can it be more practical?
In
Chen, J, Xiang, Y, & Xhafa, F (Eds.) Proceedings 2010 12th IEEE International Conference on High Performance Computing and Communications.
IEEE Computer Society, United States, pp. 647-652.
598
23
Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan, & Foo, Ernest
(2010)
Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA.
In
Xhafa, F, Denko, M, & Rahayu, W (Eds.) Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 859-865.
Alzomai, Mohammed, Al Fayyadh, Bander, Josang, Audun, & McCullagh, Adrian
(2008)
An experimental investigation of the usability of transaction authorization in online bank security systems.
In
Miller M, M & Brankovic L, L (Eds.) Proceedings of the Sixth Australasian Information Security Conference (AISC 2008).
Australian Computer Society, Australia, pp. 65-73.
24
Alzomai, Mohammed & Josang, Audun
(2010)
The Mobile Phone as a Multi OTP Device using Trusted Computing.
In
Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceedings of the 2010 Fourth International Conference on Network and Systems Security.
IEEE Computer Society, United States, pp. 75-82.
563
16
Alzomai, Mohammed, Josang, Audun, McCullagh, Adrian, & Foo, Ernest
(2008)
Strengthening SMS-based authentication through usability.
In
Werner, B (Ed.) Proceedings of the 2008 International Symposium on Parallel and Distributed Processing with Applications.
IEEE Computer Society, United States, pp. 683-688.
8
4
Andersson, Stig, Clark, Andrew, & Mohay, George
(2005)
Detecting Network-Based Obfuscated Code Injection Attacks Using Sandboxing.
In
Kerr, K, Clark, A, & Mohay, G (Eds.) AusCERT Asia Pacific Information Technology Security Conference - AusCERT 2005.
AusCert Asia Pacific, Australia, pp. 13-25.
476
Andersson, Stig, Clark, Andrew, Mohay, George, Schatz, Bradley, & Zimmermann, Jakub
(2005)
Framework for Detecting Network-Based Code Injection Attacks Targeting Windows and UNIX.
In
Cantarella, J D (Ed.) Twenty-First Annual Computer Security Applications Conference - ACSAC 2005.
IEEE Computer Society, United States of America, pp. 41-50.
Au, Wai-Ki, Choo, Kim-Kwang, & Looi, Mark
(2005)
A Secure Anonymous Authorisation Architecture for E-Commerce.
In
Hsu, J & Cheung, W (Eds.) Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service: EEE-05.
IEEE Computer Society, United States of America, pp. 106-111.
1
Barger, Peter & Sridharan, Sridha
(2006)
On the Performance and Use of Speaker Recognition Systems for Surveillance.
In
He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006.
IEEE Computer Society, CD Rom, pp. 1-6.
568
8
Barnes, Paul & Oloruntoba, Richard
(2007)
The Co-Evolution of Safety Cultures and Crisis Management Capacities in Maritime Trading Systems.
In
Bell, M, Evans, A, & Bichou, K (Eds.) Risk Management in Port Operations, Logistics and Supply Chain Security.
Informa Law, United Kingdom, pp. 205-219.
Bhatia, Sajal, Mohay, George, Tickle, Alan, & Ahmed, Ejaz
(2011)
Parametric differences between a real-world distributed denial-of-service attack and a flash event.
In
Spafford, G (Ed.) Proceedings of the 2011 Sixth International Conference on Availability, Reliability, and Security.
IEEE Computer Society, United States, pp. 210-217.
508
43
Boril, Hynek, Omid Sadjadi, Seyed, Kleinschmidt, Tristan, & Hansen, John
(2010)
Analysis and detection of cognitive load and frustration in drivers' speech.
In
Hirose, K, Nakamura, S, & Kobayashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association.
International Speech Communication Association, CD Rom, pp. 502-505.
Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan, & Paterson, Kenneth
(2008)
Efficient one-round key exchange in the standard model.
In
Mu, Y, Susilo, W, & Seberry, J (Eds.) Information Security and Privacy: 13th Australasian Conference, ACISP 2008 Proceedings [Lecture Notes in Computer Science, Volume 5107].
Springer, Germany, pp. 69-83.
Branagan, Mark, Caelli, William, & Longley, Dennis
(2005)
Security Modelling for Risk Assessment.
In
Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Counter-Terrorism Technology and Infrastructure Protection.
Australian Homeland Security Research Centre, Australia, pp. 35-52.
Branagan, Mark, Dawson, Robert, & Longley, Dennis
(2006)
Security Risk Analysis for Complex Systems.
In
Eloff, J H P, Eloff, M M, Venter, H S, & Labuschagne, L (Eds.) Proceedings of the ISSA 2006 from Insight to Foresight Conference.
ISSA, South Africa, Pretoria, pp. 1-12.
Branagan, Mark & Longley, Dennis
(2005)
Developing Threat Networks for Risk Analysis of Information Systems.
In
Eloff, J, Ventor, H S, & Labuschagne, L (Eds.) ISSA 2005 New Knowledge Today Conference.
ISSA, South Africa, Pretoria, pp. 1-9.
Brown, Jaimee, Gonzalez Nieto, Juan, & Boyd, Colin
(2007)
Efficient and Secure Self-Escrowed Public-Key Infrastructures.
In
Deng, R & Samarati, P (Eds.) Proceedings of the ACM Symposium on Information, Computer, and Communications Security.
The Association for Computing Machinery, Singapore, pp. 284-294.
4
Burdon, Mark, von Nessen, Paul, Reid, Jason, & Lane, Bill
(2010)
Australian data breach notification: avoiding the state/federal overlap.
In
Kierkegaard, S & Kierkegaard, P (Eds.) Proceeding: 5th International Conference LSPI-Private Law : Rights, Duties and Conflicts.
International Association of IT Lawyer (IAITL), Denmark, pp. 40-55.
261
Caelli, Bill, Kwok, Lam For, & Longley, Dennis
(2010)
A business continuity management simulator.
In
Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330].
Springer, Germany, pp. 9-18.
7
1
Carey-Smith, Mark & May, Lauren
(2006)
Information Security and Civil Society Organisations.
In
Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference.
Australian Homeland Security Research Centre, Australia, Australian Capital Territory, Canberra, pp. 314-327.
380
Chan, Zim, Croll, Peter, Hansen, David, & Maeder, Anthony
(2006)
The Use of Agent Technologies for Preserving Privacy with Health Records when Linking Federated Databases.
In
Callen, J, Margelis, G, & Westbrook, J (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer.
HISA and HINZ, CD ROM, pp. 1-6.
Chen, Chong & Chandran, Vinod
(2007)
Biometric Based Cryptographic Key Generation From Faces.
In
Maeder, A, Bottema, M, Redding, N, & van den Hengel, A (Eds.) Digital Image Computing Techniques and Applications.
Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 394-401.
1,309
80
Chen, Daniel, Chen, Brenden, Mamic, George, Fookes, Clinton, & Sridharan, Sridha
(2008)
Improved GrabCut segmentation via GMM optimisation.
In
Ceballos, S (Ed.) Proceedings of the Digital Image Computing: Techniques and Applications DICTA 2008 Conference.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 39-45.
388
22
Chen, Daniel, Chou, Pi-Chi, Fookes, Clinton, & Sridharan, Sridha
(2008)
Multi-view human pose estimation using modified five-point skeleton model.
In
Wysocki, B & Wysocki, T (Eds.) Proceedings of the International Conference on Signal Processing and Communication Systems, ICSPCS'2007.
DSP for Communication Systems, Australia, pp. 109-114.
339
Chen, Daniel, Denman, Simon, & Fookes, Clinton
(2010)
Accurate silhouette segmentation using motion detection and graph cuts.
In
Bakar, SARA, Hamila, R, Boashash, B, & Salleh, S H S S (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications.
Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 81-84.
278
1
Chen, Daniel, Denman, Simon, Fookes, Clinton, & Sridharan, Sridha
(2010)
Accurate silhouettes for surveillance - improved motion segmentation using graph cuts.
In
Shen, C, Zhang, J, & Geers, G (Eds.) Proceedings of 2010 Digital Image Computing: Techniques and Applications.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 369-374.
315
5
Chen, Daniel & Fookes, Clinton
(2010)
Labelled Silhouettes for human pose estimation.
In
SARA, Bakar, Hamila, R, Salleh, S H S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications.
Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 574-577.
164
7
Chen, K., Simpson, L., Henricksen, M., Millan, W., & Dawson, E.
(2004)
A Complete divide and conquer attack on the alphal stream cipher.
In
Lim, Jong In & Lee, Dong Hoon (Eds.) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
Springer, pp. 418-431.
2
Chew, Sien, Lucey, Patrick, Sridharan, Sridha, & Fookes, Clinton
(2010)
Exploring visual features through gabor representations for facial expression detection.
In
Ishi, C, Tanaka, A, Tamura, S, Sekiyama, K, & Sakamoto, S (Eds.) Proceedings of The 9th International Conference on Auditory-Visual Speech Processing (AVSP2010).
AVSP2010, CD Rom, pp. 89-94.
166
Choo, Kim, Boyd, Colin, Hitchcock, Yvonne, & Maitland, Gregory
(2005)
Complementing Computational Protocol Analysis with Formal Specifications.
In
Dimitrakos, T & Martinelli, F (Eds.) Formal Aspects in Security and Trust - FAST 2004 : IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress [IFIP International Federation for Information Processing, Volume 173].
Springer, United States of America, pp. 129-144.
350
6
Chua, Kuang, Chandran, Vinod, Acharya, Rajendra, & Lim, C.M.
(2008)
Automatic Identification of Epilepsy by HOS and Power Spectrum Parameters Using EEG Signals: A Comparative Study.
In
Dumont, G & Galiana, H (Eds.) Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society - Personalised Healthcare Through Technology.
Institute of Electrical and Electronic Engineers (IEEE), CD Rom, pp. 3824-3827.
Chua, Kuang, Chandran, Vinod, Acharya, Rajendra, & Lim, C.M.
(2007)
Higher Order Spectra (HOS) Analysis of Epileptic EEG Signals.
In
Akay, A, Delhomme, G, & Rousseau, J (Eds.) Proceedings of the 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
Institute of Electrical and Electronics Engineers, CD Rom, pp. 6495-6498.
Cliff, Yvonne, Boyd, Colin, & Gonzalez Nieto, Juan
(2009)
How to extract and expand randomness: a summary and explanation of existing results.
In
Fouque, P A, Abdalla, M, Vergnaud, D, & Pointcheval, D (Eds.) Applied Cryptography and Network Security: 7th International Conference, ACNS 2009 Proceedings [Lecture Notes in Computer Science, Volume 5536].
Springer, Germany, pp. 53-70.
Cohen, Michael, Garfinkel, Simson, & Schatz, Bradley
(2009)
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow.
In
Carrier, B (Ed.) Digital Investigation, Volume 6, Supplement 1 : proceedings of the 9th Annual DFRWS Conference.
Elsevier Advanced Technology, United Kingdom, pp. 57-68.
33
33
Cook, James, Chandran, Vinod, & Fookes, Clinton
(2006)
3D Face Recognition Using Log-Gabor Templates.
In
Fisher, B, Trucco, E, & Chantler, M (Eds.) British Machine Vision Conference 2006 Proceedings (Vol 2).
British Machine Vision Association, United Kingdom, pp. 769-778.
653
Cook, James, McCool, Christopher, Chandran, Vinod, & Sridharan, Sridha
(2006)
Combined 2D/3D Face Recognition Using Log-Gabor Templates.
In
He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006.
IEEE Computer Society, CD Rom, pp. 1-6.
769
42
Corpuz, Maria & Barnes, Paul
(2010)
Integrating information security policy management with corporate risk management for strategic alignment.
In
Chu, H, Lesso, W, Baralt, J, Callaos, N, & Jastrocj, N (Eds.) The 14th World Multi-Conference on Systemics, Cybernetics, and Informatics, Proceedings Volume III.
International Institute of Informatics and Systemics, United States, pp. 337-342.
Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan, & Wong, Kenneth
(2010)
Avoiding full extension field arithmetic in pairing computations.
In
Lange, T & Bernstein, D J (Eds.) Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Proceedings [Lecture Notes in Computer Science, Volume 6055].
Springer, Germany, pp. 203-224.
Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan, & Wong, Kenneth
(2010)
Delaying mismatched field multiplications in pairing computations.
In
Hasan, M A & Helleseth, T (Eds.) Arithmetic of Finite Fields: Third International Workshop, WAIFI 2010 Proceedings [Lecture Notes in Computer Science, Volume 6087].
Springer, Germany, pp. 196-214.
250
Costello, Craig, Hisil, Huseyin, Boyd, Colin, Gonzalez Nieto, Juan, & Wong, Kenneth
(2009)
Faster pairings on special Weierstrass curves.
In
Waters, B & Shacham, H (Eds.) Pairing-Based Cryptography: Third International Conference, Pairing 2009, Proceedings [Lecture Notes in Computer Science, Vol 5671].
Springer, Germany, pp. 89-101.
Costello, Craig & Stebila, Douglas
(2010)
Fixed argument pairings.
In
Abdalla, M & Barreto, P (Eds.) Progress in Cryptology - LATINCRYPT 2010: First International Conference on Cryptology and Information Security in Latin America Proceedings [Lecture Notes in Computer Science, Volume 6212].
Springer, Germany, pp. 92-108.
Cox, Mark, Sridharan, Sridha, Lucey, Simon, & Cohn, Jeff
(2008)
Least squares congealing for unsupervised alignment of images.
In
Huang, T (Ed.) Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2008.
IEEE Computer Society, United States, pp. 1-8.
Croll, Peter & Croll, Jasmine
(2006)
Privacy Compliance - Managing the Risks when Integrating Health Data.
In
Callen, J, Margelis, G, & Westbrook, J (Eds.) Health Informatics Conference Proceedings 2006: Bridging the Digital Divide: Clinician, Consumer, Computer.
HISA and HINZ, CD ROM, pp. 1-6.
Croll, Peter, Henricksen, Matthew, Caelli, William, & Liu, Vicky
(2007)
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records.
In
Kuhn, K, Leong, T Y, & Warren, J (Eds.) Proceedings of the 12th World Congress on Health (Medical) Informatics.
IOS Press, Netherlands, pp. 498-502.
175
Dawson, Ed, Henricksen, Matthew, & Simpson, Leonie
(2008)
The Dragon stream cipher: Design, analysis and implementation issues.
In
Billet, O & Robshaw, M (Eds.) New Stream Cipher Designs: The eSTREAM Finalists [Volume 4986: Lecture Notes in Computer Science].
Springer, Germany, pp. 20-38.
Dawson, Robert, Boyd, Colin, Dawson, Edward, & Gonzalez Nieto, Juan
(2006)
SKMA - A Key Management Architecture for SCADA Systems.
In
Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54].
Australian Computer Society, Australia, pp. 183-192.
622
34
Dean, David, Lucey, Patrick, Sridharan, Subramanian, & Wark, Tim
(2007)
Fused HMM-Adaptation of Multi-Stream HMMs for Audio-Visual Speech Recognition.
In
van Son, R & Van hamme, H (Eds.) Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007).
Causal Productions Pty Ltd, Australia, pp. 666-669.
625
5
Dean, David, Lucey, Patrick, Sridharan, Subramanian, & Wark, Timothy
(2007)
Weighting and Normalisation of Synchronous HMMs for Audio-Visual Speech Recognition.
In
Swerts, M, Vroomem, J, & Krahmer, E (Eds.) Proceedings of the Workshop on Audio-Visual Speech Processing Cognitive and Computational Approaches.
Tilburg University, United States of America, pp. 110-115.
189
Dean, David, Sridharan, Sridha, & Lucey, Patrick
(2008)
Cascading appearance-based features for visual speaker verification.
In
Gocke, R, Loakes, D, Wagner, M, Burnham, D, & Fletcher, J (Eds.) Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST 2008).
International Speech Communication Association, CD Rom, pp. 359-362.
2
Dean, David, Sridharan, Sridha, Vogt, Robert, & Mason, Michael
(2010)
The QUT-NOISE-TIMIT corpus for evaluation of voice activity detection algorithms.
In
Hirose, K, Nakamura, S, & Kaboyashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association.
International Speech Communication Association, CD Rom, pp. 3110-3113.
Denman, Simon, Chandran, Vinod, Sridharan, Sridha, & Fookes, Clinton
(2006)
A Multi-Class Tracker Using a Scalable Condensation Filter.
In
He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006.
IEEE Computer Society, CD Rom, pp. 1-6.
244
2
Denman, Simon, Fookes, Clinton, Bialkowski, Alina, & Sridharan, Sridha
(2009)
Soft-biometrics: unconstrained authentication in a surveillance environment.
In
Shi, H, Zhang, Y, Lovell, B, Maeder, A, & Bottema, M (Eds.) Proceedings 2009 Digital Image Computing: Techniques and Applications DICTA 2009.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 196-203.
Denman, Simon, Fookes, Clinton, Cook, James, Davoren, Christopher, Mamic, George, Farquharson, Graeme, Chen, Daniel, Chen, Brenden, & Sridharan, Sridha
(2006)
Multi-View Intelligent Vehicle Surveillance System.
In
He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006.
IEEE Computer Society, CD Rom, pp. 1-6.
1,544
10
Denman, Simon, Fookes, Clinton, & Sridharan, Sridha
(2010)
Group segmentation during object tracking using optical flow discontinuities.
In
Ma, K K, Wang, H, & Matsushita, Y (Eds.) Proceedings of the 4th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2010.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 270-275.
249
7
Denman, Simon, Fookes, Clinton, Sridharan, Sridha, & Lakemond, Ruan
(2009)
Dynamic performance measures for object tracking systems.
In
Regazzoni, C (Ed.) Proceedings Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 541-546.
Denman, Simon, Fookes, Clinton, Sridharan, Sridha, & Ryan, David
(2010)
Multi-modal object tracking using dynamic performance metrics.
In
Porikli, F (Ed.) Proceedings - IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2010.
IEEE Computer Society, United States, pp. 286-293.
222
4
Diederich, Joachim, Tickle, Alan, & Geva, Shlomo
(2010)
Quo vadis? Reliable and practical rule extraction from neural networks.
In
Ras, Z W, Kacprzyk, J, Koronacki, J, & Wierzchon, S T (Eds.) Advances in Machine Learning I: Dedicated to the Memory of Professor Ryszard S. Michalski.
Springer, Germany, pp. 479-490.
7
3
Dowling, Gregory, Tickle, Alan, Stark, Karen, Rowe, Jillian, & Godat, Meredith
(2005)
Animation of complex data communications concepts may not always yield improved learning outcomes.
In
Young, A & Tolhurst, D (Eds.) Proceedings of the 7th Australasian Conference on Computing Education.
Australian Computer Society, Australia, pp. 151-154.
847
4
Dowling, Jason, Planitz, Birgit, Maeder, Anthony, Du, Jiang, Pham, Binh, Boyd, Colin, Chen, Shaokang, Bradley, Andrew, & Crozier, Stuart
(2008)
A comparison of DCT and DWT block based watermarking on medical image quality.
In
Shi, Y Q, Kim, H J, & Katzenbeisser, S (Eds.) Digital Watermarking: 6th International Workshop, IWDW 2007 Proceedings [Lecture Notes in Computer Science, Volume 5041].
Springer, Germany, pp. 454-466.
10
Du, Jiang, Woo, Chaw-Seng, & Pham, Binh
(2005)
Recovery of Watermark Using Differential Affine Motion Estimation.
In
Buyya, R, Montage, P, & Coddington, P (Eds.) ASCW Frontiers 2005.
Australian Computer Society, Australia, South Australia, Bedford Park, pp. 81-88.
326
5
Du, Rong, Foo, Ernest, Boyd, Colin, & Choo, Kim-Kwang
(2006)
Formal Analysis of Secure Contracting Protocol for E-Tendering.
In
Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54].
Australian Computer Society, Australia, pp. 155-164.
333
6
Duncombe, David, Mohay, George, & Clark, Andrew
(2006)
Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS.
In
Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54].
Australian Computer Society, Australia, pp. 135-144.
181
1
Flew, Terry, Leisten, Susanna H., & Hearn, Gregory N.
(2006)
Alternative systems for Intellectual Property in the digital age.
In
Servaes, Jan & Thomas, Pradip (Eds.) Intellectual Property Rights Communication in Asia: Conflicting Traditions.
Sage Publications, New Delhi, India, pp. 226-240.
803
Fookes, Clinton, Cook, James, Sridharan, Sridha, & Tistarelli, Massimo
(2010)
Frequency decomposition techniques for increased discriminative 3D facial information capture.
In
Fisher, B & Theobalt (Eds.) Proceedings of 3DPVT'10, the 5th International Symposium on 3D Data Processing, Visualization and Transmission.
TUM Fakultat fur Informatik, Technische Universitat Munchen, Germany, pp. 1-8.
99
Fookes, Clinton, Denman, Simon, Lakemond, Ruan, Ryan, David, Sridharan, Sridha, & Piccardi, Massimo
(2010)
Semi-supervised intelligent surveillance system for secure environments.
In
Cecati, C & Blaabjerg, F (Eds.) Proceedings of the 2010 IEEE International Symposium on Industrial Electronics.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 2815-2820.
Fookes, Clinton, Maeder, Anthony, Sridharan, Sridha, & Mamic, George
(2010)
Gaze based personal identification.
In
Wang, L & Geng, X (Eds.) Behavioural Biometrics for Human Identification: Intelligent Applications.
IGI Global, United States, pp. 237-263.
11
Fookes, Clinton, Mamic, George, McCool, Christopher, & Sridharan, Sridha
(2008)
Normalisation and recognition of 3D face data using robust hausdorff metric.
In
Ceballos, S (Ed.) Proceedings of the Digital Image Computing: Techniques and Applications Conference DICTA 2008.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 124-129.
2
Fookes, Clinton & Sridharan, Sridha
(2010)
eigenGaze - covert behavioral biometric exploiting visual attention characteristics.
In
Bakar, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 654-657.
313
3
Franco, Luis, Sahama, Tony, & Croll, Peter
(2008)
Security Enhanced Linux to enforce Mandatory Access Control in Health Information Systems.
In
Yu P, P, Warren, J R, Patrick, J D, & Yearwood, J (Eds.) Health Data and Knowledge Management 2008.
Australian Computer Society, Australia, pp. 27-33.
Gauravaram, Praveen, McCullagh, Adrian, & Dawson, Edward
(2006)
Collision Attacks on MD5 and SHA-1: Is this the 'Sword of Damocles' for Electronic Commerce?
In
Clark, A, Mohay, G, & McPherson, M (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006.
University of Queensland, CD Rom, pp. 73-88.
Ghaemmaghami, Houman, Baker, Brendan, Vogt, Robert, & Sridharan, Sridha
(2010)
Noise robust voice activity detection using features extracted from the time-domain autocorrelation function.
In
Hirose, K, Nakamura, S, & Kaboyashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association.
International Speech Communication Association, CD Rom, pp. 3118-3121.
Ghaemmaghami, Houman, Dean, David, Sridharan, Sridha, & McCowan, Iain
(2010)
Noise robust voice activity detection using normal probability testing and time-domain histogram analysis.
In
Douglas, S (Ed.) Proceedings of the 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 4470-4473.
Gill, Rupinder, Smith, Jason, & Branagan, Mark
(2007)
Managing Security Effects of WLAN Deployments in Critical Infrastructure Control Systems.
In
Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007.
Australian Homeland Security Research Centre, Australia, pp. 236-247.
Gill, Rupinder, Smith, Jason, & Clark, Andrew
(2006)
Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks.
In
Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54].
Australian Computer Society, Australia, pp. 221-230.
486
19
Gill, Rupinder, Smith, Jason, & Clark, Andrew
(2006)
Specification-Based Intrusion Detection in WLANs.
In
Payne, C, Schuba, C, & Samarati, P (Eds.) Proceedings of the 22nd Annual Computer Security Applications Conference.
IEEE Computer Society, United States of America, pp. 141-150.
Gill, Rupinder, Smith, Jason, Looi, Mark, & Clark, Andrew
(2005)
Passive Techniques for Detecting Session Hijacking Attacks in IEEE 802.11 Wireless Networks.
In
Kerr, K, Clark, A, & Mohay, G (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream: Proceedings.
University of Queensland, CD Rom, pp. 26-38.
1,170
43
Goh, Vik, Zimmermann, Jacob, & Looi, Mark
(2010)
Intrusion detection system for encrypted networks using secret-sharing schemes.
In
Min, G, Abu, N, Huay, H, Ahmad, R, MdSaid, M, Mas'ud, M, et al. (Eds.) Proceedings of 2nd International Cryptology Conference 2010.
Penerbit Universiti, Malaysia, pp. 126-132.
317
4
Goh, Vik, Zimmermann, Jacob, & Looi, Mark
(2009)
Towards intrusion detection for encrypted networks.
In
Tjoa, S, Weippl, E, & Jakoubi, S (Eds.) Proceedings of the International Conference on Availability, Reliability and Security.
IEEE Computer Society, United States of America, pp. 540-545.
Goonasekera, Nuwan, Caelli, Bill, & Sahama, Tony
(2009)
50 years of isolation.
In
Reif, W, Wang, G, Nieto, J G, & Indulska, J (Eds.) Symposia and Workshops on Ubiquitous, Autonomic, and Trusting Computing.
IEEE Computer Society, United States, pp. 54-60.
315
3
Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan
(2010)
Attribute-based authenticated key exchange.
In
Hawkes, P & Steinfeld, R (Eds.) Information Security and Privacy: 15th Australasian Conference, ACISP 2010 Proceedings [Lecture Notes in Computer Science, Volume 6168].
Springer, Germany, pp. 300-317.
Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan
(2009)
Modelling key compromise impersonation attacks on group key exchange protocols.
In
Tsudik, G & Jarecki, S (Eds.) Public Key Cryptography: 12th International Conference on Practice and Theory in Public Key Cryptography, Proceedings [Lecture Notes in Computer Science, Vol 5443].
Springer, Germany, pp. 105-123.
48
Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan
(2009)
Universally composable contributory group key exchange.
In
Li, W, Susilo, W, Tupakula, U, Safavi-Naini, R, & Varadharajan, V (Eds.) ASIAN ACM Symposium on Information, Computer and Communications Security: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security.
Association for Computing Machinery, United States, pp. 146-156.
13
Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan, & Manulis, Mark
(2010)
Generic one round group key exchange in the standard model.
In
Lee, D & Hong, S (Eds.) Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers [Lecture Notes in Computer Science, Volume 5984].
Springer, Germany, pp. 1-15.
797
23
Hassanzadeh, Reza, Sahama, Tony, & Fidge, Colin
(2010)
A secure framework and related protocols for ubiquitous access to electronic health records using Java SIM cards.
In
Takeda, H (Ed.) Proceedings of the First IMIA/IFIP Joint Symposium, E-Health 2010 [IFIP Advances in Information and Communication Technology, 2010, Volume 335].
Springer, Germany, pp. 102-113.
Henricksen, Matthew, Caelli, William, & Croll, Peter
(2007)
Securing Grid Data Using Mandatory Access Controls.
In
Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery.
Australian Computer Society, Australia, pp. 25-32.
571
3
Himawan, Ivan, McCowan, Iain, & Lincoln, Mike
(2008)
Microphone array beamforming approach to blind speech separation.
In
Renals, S, Bourland, H, & Popescu-Belis, A (Eds.) Machine Learning for Multimodal Interaction.
Springer, Germany, pp. 295-305.
17
6
Himawan, Ivan, McCowan, Iain, & Sridharan, Sridha
(2010)
Clustering of ad-hoc microphone arrays for robust blind beamforming.
In
Douglas, S (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing.
IEEE Xplore, United States, pp. 2814-2817.
Himawan, Ivan, Sridharan, Sridha, & McCowan, Iain
(2008)
Dealing with uncertainty in microphone placement in a microphone array speech recognition system.
In
Sayad, A (Ed.) Proceedings of the 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 1565-1568.
Hirschbichler, Marianne, Boyd, Colin, & Boles, Wageeh
(2008)
A multiple-control fuzzy vault.
In
Korba, L, Marsh, S, & Safavi-Naini, R (Eds.) Proceedings of Sixth Annual Conference on Privacy, Security and Trust, 2008.
IEEE Computer Society, United States, pp. 36-47.
8
5
Hisil, Huseyin, Wong, Kenneth, Carter, Gary, & Dawson, Ed
(2009)
Faster group operations on elliptic curves.
In
Susilo, W & Brankovic, L (Eds.) Information Security 2009 : proceedings of the 7th Australasian Information Security Conference.
Australian Computer Society, Australia, pp. 7-19.
206
32
Hisil, Huseyin, Wong, Kenneth, Carter, Gary, & Dawson, Ed
(2009)
Jacobi quartic curves revisited.
In
Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Proceedings [Lecture Notes in Computer Science, Volume 5594].
Springer, Germany, pp. 452-468.
30
18
Hisil, Huseyin, Wong, Kenneth, Carter, Gary, & Dawson, Ed
(2008)
Twisted Edwards curves revisited.
In
Peiprzyk, J (Ed.) Advances in Cryptology: 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, Proceedings [Lecture Notes in Computer Science, 5350].
Springer, Germany, pp. 326-343.
150
115
Islam, Asadul, Corney, Malcolm, Mohay, George, Clark, Andrew, Bracher, Shane, Raub, Tobias, & Flegel, Ulrich
(2011)
Detecting collusive fraud in enterprise resource planning systems.
In
Shenoi, S & Petersen, G (Eds.) Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361].
Springer, Germany, pp. 143-154.
489
3
Islam, Asadul, Corney, Malcolm, Mohay, George, Clark, Andrew, Bracher, Shane, Raub, Tobias, & Flegel, Ulrich
(2010)
Fraud detection in ERP systems using scenario matching.
In
Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330].
Springer, Germany, pp. 112-123.
Ismail, Roslan, Boyd, Colin, Josang, Audun, & Russel, S
(2003)
Strong Privacy In Reputation Systems.
In
Chae, K & Yung, M (Eds.) Information security applications: proceedings of the 4th International Workshop.
Springer, United States of America, p. 1.
Josang, Audun
(2006)
Online Reputation Systems for the Health Sector.
In
Au, R, Croll, P, & Morarji, H (Eds.) Proceedings of the National E-Health Privacy and Security Symposium 2006.
QUT, Australia, Queensland, Brisbane, pp. 78-88.
5
Josang, Audun, Alzomai, Mohammed, & Suriadi, Suriadi
(2007)
Usability and Privacy in Identity Management Architectures.
In
Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery.
Australian Computer Society, Australia, pp. 143-152.
1,349
84
Josang, Audun, Gollmann, Dieter, & Au, Wai
(2006)
A Method for Access Authorisation Through Delegation Networks.
In
Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006.
Australian Computer Society, Australia, New South Wales, Sydney, pp. 165-174.
10
Josang, Audun, Hayward, Ross, & Pope, Simon
(2006)
Trust Network Analysis with Subjective Logic.
In
Dobbie, G & Estivill-Castro, V (Eds.) Conference Proceedings of the Twenty-Ninth Australasian Computer Science Conference (ACSW 2006).
Australian Computer Society, CD Rom, pp. 85-94.
2,265
273
Khan, Roheena, Corney, Malcolm, Clark, Andrew, & Mohay, George
(2009)
A role mining inspired approach to representing user behaviour in ERP systems.
In
Gen, Mitsuo & Oyabu, Takashi (Eds.) Proceedings of Asia Pacific Industrial Engineering & Management Systems Conference 2009.
APIEMS Society, Japan, pp. 2541-2552.
572
Kiani Harchegani, Mehdi, Clark, Andrew, & Mohay, George
(2008)
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks.
In
Tjoa, S, Weippl, E R, & Jakoubi, S (Eds.) Proceedings of the Third International Conference on Availability, Security and Reliability (ARES 2008).
IEEE Computer Society, United States, pp. 47-55.
Kiani Harchegani, Mehdi, Clark, Andrew, & Mohay, George
(2007)
Length Based Modelling of HTTP Traffic for Detecting SQL Injection Attacks.
In
Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007.
Australian Homeland Security Research Centre, Australia, pp. 67-78.
Kleinschmidt, Tristan, Boyrazp, Pinar, Boril, Hynek, Sridharan, Sridha, & Hansen, John
(2009)
Assessment of speech dialog systems using multi-modal cognitive load analysis and driving performance metrics.
In
Sable, A & Prasad, K (Eds.) Proceedings of the IEEE International Conference on Vehicular Electronics and Safety.
Institute of Electrical and Electronics Engineers Inc., India, pp. 167-172.
454
3
Kleinschmidt, Tristan, Mason, Michael, Wong, Eddie, & Sridharan, Sridha
(2009)
The Australian English speech corpus for in-car speech processing.
In
Lee, L (Ed.) Proceedings of the 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., Online, pp. 4177-4180.
Kleinschmidt, Tristan, Sridharan, Sridha, & Mason, Michael
(2010)
The application of phonetic distribution normalisation to likelihood-maximising speech enhancement for robust ASR.
In
Hajek, J, Tabain, M, Grayden, D, Butcher, A, & Fletcher, J (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology.
The Australasian Speech Science and Technology Association Inc, Australia, pp. 118-121.
62
Kleinschmidt, Tristan, Sridharan, Sridha, & Mason, Michael
(2010)
The effect of dialect mismatch on likelihood-maximising speech enhancement for noise-robust speech recognition.
In
Hajek, J, Tabain, M, Grayden, D, Butcher, A, & Fletcher, J (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology.
The Australasian Speech Science and Technology Association Inc, Australia, pp. 114-117.
90
Kush, Nishchal Singh, Foo, Ernest, Ahmed, Ejaz, Ahmed, Irfan, & Clark, Andrew
(2011)
Gap analysis of intrusion detection in smart grids.
In
Valli, C (Ed.) Proceedings of 2nd International Cyber Resilience Conference.
secau-Security Research Centre, Australia, pp. 38-46.
761
Lakemond, Ruan, Fookes, Clinton, & Sridharan, Sridha
(2009)
Dense correspondence extraction in difficult uncalibrated scenarios.
In
Shi, H, Zhang, Y, Lovell, B, Maeder, A, & Bottema, M J (Eds.) Proceedings of 2009 Digital Image Computing: Techniques and Applications.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 53-60.
Lakemond, Ruan, McKinnon, David, Fookes, Clinton, & Sridharan, Sridha
(2008)
A feature clustering algorithm for scale-space analysis of image structures.
In
Wysocki, B & Wysocki, T (Eds.) Proceedings of the 1st International Conference on Signal Processing and Telecommunication Systems.
DSP for Communication Systems, Australia, pp. 186-192.
360
Lee, Kaleb
(2010)
A two-step mutual authentication protocol based on randomized hash-lock for small RFID networks.
In
Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security.
IEEE Computer Society, United States of America, pp. 527-533.
650
6
Lin, Frank, Denman, Simon, Chandran, Vinod, & Sridharan, Subramanian
(2007)
Automatic Tracking, Super-Resolution and Recognition of Human Faces from Surveillance Video.
In
Sako, H (Ed.) Proceedings of IAPR Conference on Machine Vision Applications.
Seiki Tsushinsya, Japan, pp. 37-40.
157
4
Lin, Frank, Fookes, Clinton, Chandran, Vinod, & Sridharan, Sridha
(2006)
The Role of Motion Models in Super-Resolving Surveillance Video for Face Recognition.
In
He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006.
IEEE Computer Society, CD Rom, pp. 1-6.
322
4
Lin, Frank, Fookes, Clinton, Chandran, Vinod, & Sridharan, Subramanian
(2005)
Investigation into Optical Flow Super-Resolution for Surveillance Applications.
In
Lovell, B & Maeder, A (Eds.) WDIC 2005: APRS Workshop on Digital Image Computing: Workshop Proceedings.
University of QLD, CD Rom, pp. 73-78.
524
Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan
(2010)
Efficient certificateless KEM in the standard model.
In
Lee, D & Hong, S (Eds.) Information Security and Cryptology - ICISC 2009: 12th International Conference, Revised Selected Papers [Lecture Notes in Computer Science, Volume 5984].
Springer, Germany, pp. 34-46.
Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan
(2009)
Strongly secure certificateless key agreement.
In
Waters, B & Shacham, H (Eds.) Pairing-Based Cryptography: Third International Conference, Pairing 2009, Proceedings [Lecture Notes in Computer Science, Vol 5671].
Springer, Germany, pp. 206-230.
Liu, Junbin, O'Rourke, Damien, Wark, Tim, Denman, Simon, & Sridharan, Sridha
(2010)
A distributed protocol for object tracking in wireless multimedia sensor networks.
In
Gubbi, J, Corke, P, Marusic, S, & Palaniswami, M (Eds.) Proceedings of the Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 67-72.
1
Liu, Junbin, O'Rourke, Damien, Wark, Tim, Lakemond, Ruan, & Sridharan, Sridha
(2009)
Camera calibration in wireless multimedia sensor networks.
In
Law, Y, Gubbi, J, Marusic, S, & Palaniswami, M (Eds.) Proceedings of the 2009 Fifth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
IEEE Victorian Section, Australia, pp. 301-306.
207
4
Liu, Vicky, Caelli, Bill, May, Lauren, & Croll, Peter
(2008)
Open Trusted Health Informatics Structure (OTHIS).
In
Yu, P, Warren, J R, Patrick, J D, & Yearwood, J (Eds.) Proceedings of the Second Australasian Workshop on Health Data and Knowledge Management (HDKM 2008).
Australian Computer Society, Australia, pp. 35-63.
355
Liu, Vicky, Caelli, Bill, May, Lauren, & Sahama, Tony
(2009)
Privacy and security in open and trusted health information systems.
In
Warren, J R (Ed.) Proceeding of the Third Australasian Workshop on Health Informatics and Knowledge Management.
Australian Computer Society, Australia, pp. 25-30.
297
Liu, Vicky, Caelli, Bill, Smith, Jason, May, Lauren, Lee, Min Hui, Ng, Zi, Foo, Jin, & Li, Weihao
(2010)
A secure architecture for Australia's index based e-health environment.
In
Maeder, A & Hansen, D (Eds.) Proceedings of 4th Australasian Workshop on Health Informatics and Knowledge Management.
Australian Computer Society, Australia, pp. 7-16.
425
Liu, Vicky, Caelli, William, & May, Lauren
(2006)
Strengthening Legal Compliance for Privacy in Electronic Health Information Systems: A Review and Analysis.
In
Au, R, Croll, P, & Morarji, H (Eds.) Proceedings of the National E-Health Privacy and Security Symposium 2006.
QUT, Australia, Queensland, Brisbane, pp. 51-66.
1,357
2
Liu, Vicky, Franco, Luis, Caelli, Bill, May, Lauren, & Sahama, Tony
(2009)
Open and trusted information systems/health informatics access control (OTHIS/HIAC).
In
Susilo, W & Brankovic, L (Eds.) Proceeding of the Seventh Australasian Information Security Conference (AISC 2009).
Australian Computer Society, Australia, pp. 99-108.
216
4
Liu, Vicky, May, Lauren, Caelli, William, & Croll, Peter
(2007)
A Sustainable Approach to Security and Privacy in Health Information Systems.
In
Toleman, M, Roberts, & Cater-Steel, A (Eds.) Proceedings of the 18th Australasian Conference on Information Systems.
The University of Southern Queensland, Australia, pp. 255-265.
568
4
Longley, Dennis, Branagan, Mark, Caelli, Bill, & Kwok, Lam For
(2008)
Feasibility of automated information security compliance auditing.
In
Cimato, S, Jajodia, S, & Samarati, P (Eds.) Proceedings of the IFIP TC11 23rd International Information Security Conference [IFIP International Federation for Information Processing, Volume 278].
Springer, United States, pp. 493-508.
3
2
Low, Rouhshi, Burdon, Mark, Christensen, Sharon, Duncan, Bill, Barnes, Paul, & Foo, Ernest
(2010)
Protecting the protectors : legal liabilities from the use of Web 2.0 for Australian disaster response.
In
Michael, K (Ed.) Proceedings of the 2010 IEEE International Symposium on Technology and Society: Social Implications of Emerging Technologies.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 411-418.
Lucey, Patrick, Howlett, Jessica, Cohn, Jeff, Lucey, Simon, Sridharan, Sridha, & Ambadar, Zara
(2008)
Improving pain recognition through better utilisation of temporal information.
In
Gocke, R, Lucey, P, & Lucey, S (Eds.) Proceedings of the International Conference on Auditory-Visual Speech Processing 2008.
AVISA, CD Rom, pp. 167-172.
24
Lucey, Patrick, Lucey, Simon, Cox, Mark, Sridharan, Sridha, & Cohn, Jeff
(2008)
Comparing object alignment algorithms with appearance variation: forward-additive vs inverse-composition.
In
Wu, Q, Li, W, Siu, W C, Feng, D, Guan, L, Sikora, T, et al. (Eds.) Proceedings of the 2008 IEEE 10th Workshop on Multimedia Signal Processing.
Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 337-342.
2
Lucey, Patrick, Potamianos, Gerasimos, & Sridharan, Sridha
(2008)
Patch-based analysis of visual speech from multiple views.
In
Gocke, R, Lucey, P, & Lucey, S (Eds.) Proceedings of the International Conference on Auditory-Visual Speech Processing 2008.
AVISA, CD Rom, pp. 69-74.
306
Lucey, Patrick, Potamianos, Gerasimos, & Sridharan, Subramanian
(2007)
An Extended Pose-Invariant Lipreading System.
In
Swerts, M, Vroomem, J, & Krahmer, E (Eds.) Proceedings of the Workshop on Audio-Visual Speech Processing: Cognitive and Computational Approaches.
Tilburg University, Netherlands, pp. 1-5.
282
Lucey, Patrick, Sridharan, Sridha, & Dean, David
(2008)
Continuous pose-invariant lipreading.
In
Burnham, D (Ed.) Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST 2008).
International Speech Communication Association, CD Rom, pp. 2679-2682.
Mamic, George, Fookes, Clinton, & Sridharan, Sridha
(2006)
Human Face Reconstruction Using Bayesian Deformable Models.
In
He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006.
IEEE Computer Society, CD Rom, pp. 1-6.
585
Marrington, Andrew, Branagan, Mark, & Smith, Jason
(2007)
Forensic Challenges in Service Oriented Architectures.
In
Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007.
Australian Homeland Security Research Centre, Australia, Australian Capital Territory, Canberra, pp. 356-366.
395
Marrington, Andrew, Mohay, George, Clark, Andrew, & Morarji, Hasmukh
(2007)
Event-Based Computer Profiling for the Forensic Reconstruction of Computer Activity.
In
Clark, A, Mohay, G, & McPherson, M (Eds.) AusCERT 2007, IT-Security: Finding the Balance.
University of Queensland, Australia, pp. 71-87.
1,373
Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew
(2006)
Computer Profiling to Assist Computer Forensic Investigations.
In
Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference.
Australian Homeland Security Research Centre, Australia, pp. 287-301.
Marrington, Andrew, Mohay, George, Morarji, Hasmukh, & Clark, Andrew
(2010)
A model for computer profiling.
In
Slay, J, Simon, M, & Osborne, G (Eds.) Proceedings of the 5th International Conference on Availability, Reliability, and Security.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 635-640.
McCool, Christopher, Cook, James, Chandran, Vinod, & Sridharan, Sridha
(2006)
Feature Modelling of PCA Difference Vectors for 2D and 3D Face Recognition.
In
He, X, Hints, T, Piccardi, M, Pavlidis, I, & Regazzoni, C (Eds.) Proceedings of the IEEE International Conference on Video and Signal Based Surveillance 2006.
IEEE Computer Society, CD Rom, pp. 1-6.
645
3
McCool, Christopher, Mamic, George, Fookes, Clinton, & Sridharan, Sridha
(2008)
Normalisation of 3D face data.
In
Wysocki, B & Wysocki, T (Eds.) Proceedings of the 1st International Conference on Signal Processing and Communication Systems, CSPCS'2007.
DSP for Communication Systems, Australia, pp. 1-7.
McKinnon, David, Lakemond, Ruan, Fookes, Clinton, & Sridharan, Sridha
(2008)
Ground-plane based projective reconstruction for surveillance camera networks.
In
Wysocki, B & Wysocki, T (Eds.) Proceedings of the 1st International Conference on Signal Processing and Telecommunication Systems, ICSPCS 2007.
DSP for Communication Systems, Australia, pp. 423-428.
165
Mclaren, Mitchell, Baker, Brendan, Vogt, Robert, & Sridharan, Sridha
(2010)
Exploiting multiple feature sets in data-driven impostor dataset selection for speaker verification.
In
Douglas, S (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 4434-4437.
Mclaren, Mitchell, Vogt, Robert, Baker, Brendan, & Sridharan, Sridha
(2010)
QUT Speaker Identity Verification system for EVALITA 2010.
In
Bakar, Sy, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 49-52.
208
1
Mclaren, Mitchell, Vogt, Robert, Baker, Brendan, & Sridharan, Subramanian
(2007)
A Comparison of Session Variability Compensation Techniques for SVM-Based Speaker Recognition.
In
van Son, R & Van hamme, H (Eds.) Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007).
Casual Productions Pty Ltd, CD Rom, pp. 790-793.
511
4
Mohay, George, Ahmed, Ejaz, Bhatia, Sajal, Nadarajan, Anitha, Ravindran, B., Tickle, Alan, & Vijayasarathy, R.
(2011)
Detection and mitigation of high-rate flooding attacks.
In
Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection.
Springer, India, pp. 131-181.
6
Molland (Visiting Scholar), Hoverd & Helleseth, Tor
(2005)
A Linear Weakness in the Klimov-Shamir T-function.
In
Grant, A & Kennedy, R (Eds.) Proceedings of the 2005 IEEE International Symposium on Information Theory (ISIT 05).
Institute of Electrical and Electronics Engineers Inc., CD Rom, pp. 1106-1110.
7
Mosca, Michele & Stebila, Douglas
(2010)
Quantum Coins.
In
Bruen, Aiden A & Wehlau, David L (Eds.) Proceeding of the Contemporary Mathematics: Error-Correcting Codes, Finite Geometrices and Cryptography.
American Mathematical Society, United States, pp. 35-47.
339
36
Navarathna, Rajitha, Dean, David, Lucey, Patrick, Sridharan, Sridha, & Fookes, Clinton
(2010)
Cascading appearance-based features for visual voice activity detection.
In
Ishi, C, Tanaka, A, Tamura, S, Sekiyama, K, & Sakamoto, S (Eds.) Proceedings of The 9th International Conference on Auditory-Visual Speech Processing (AVSP2010).
Auditory-visual Speech Processing (AVSP), CD Rom, pp. 3-7.
154
Navarathna, Rajitha, Dean, David, Lucey, Patrick, Sridharan, Sridha, & Fookes, Clinton
(2010)
Recognising audio-visual speech in vehicles using the AVICAR database.
In
Hajek, J, Tabain, M, Grayden, D, Butcher, A, & Fletcher, J (Eds.) Proceedings of the 13th Australasian International Conference on Speech Science and Technology.
The Australasian Speech Science and Technology Association Inc, Australia, pp. 110-113.
260
Navarathna, Rajitha, Lucey, Patrick, Dean, David, Fookes, Clinton, & Sridharan, Sridha
(2010)
Lip detection for audio-visual speech recognition in-car environment.
In
Bakar, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 598-601.
404
16
Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan
(2010)
Automating computational proofs for public-key-based key exchange.
In
Heng, S & Kurosawa, K (Eds.) Provable Security: 4th International Conference, ProvSec 2010, Proceedings [Lecture Notes in Computer Science, Volume 6402].
Springer, Germany, pp. 53-69.
Nguyen Thanh, Kien, Fookes, Clinton, & Sridharan, Sridha
(2010)
Fusing shrinking and expanding active contour models for robust iris segmentation.
In
Bakar, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 185-188.
392
19
Nguyen Thanh, Kien, Fookes, Clinton, Sridharan, Sridha, & Denman, Simon
(2010)
Focus-score weighted super-resolution for uncooperative iris recognition at a distance and on the move.
In
Green, R & Bainbridge-Smith, A (Eds.) Proceedings of the 25th International Conference of Image and Vision Computing New Zealand IVCNZ-2010.
University of Canterbury, New Zealand, pp. 1-8.
309
15
Panichprecha, Sorot, Zimmermann, Jacob, Mohay, George, & Clark, Andrew
(2007)
Multi-Step Scenario Matching Based on Unification.
In
Valli, C & Woodward, A (Eds.) Proceedings of the 5th Australian Digital Forensics Conference.
Edith Cowan University, CD Rom, pp. 87-96.
363
Panichprecha, Sorot, Zimmermann, Jakub, Mohay, George, & Clark, Andrew
(2006)
An Event Abstraction Model for Signature-Based Intrusion Detection Systems.
In
Rajendran, S (Ed.) Proceedings of the International Conference on Information Security and Computer Forensics.
Allied Publishers Pvt Ltd, India, pp. 151-162.
Peng, Kun, Boyd, Colin, & Dawson, Edward
(2006)
Sealed-Bid Micro Auctions.
In
Yngstrom, L, Lindskog, S, Rannenberg, K, & Fischer-Hubner, S (Eds.) Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006) [IFIP International Federation for Information Processing, Volume 201].
Springer, United States of America, pp. 246-257.
258
1
Peng, Kun & Dawson, Edward
(2007)
A Range Test Secure in the Active Adversary Model.
In
Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery.
Australian Computer Society, Australia, pp. 159-162.
138
6
Peng, Kun, Dawson, Edward, Gonzalez-Nieto, Juan, Okamoto, Eiji, & Lopez, Javier
(2005)
A Novel Method to Maintain Privacy in Mobile Agent Applications.
In
Mu, Y, Li, Y, Wang, H, & Desmedt, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005.
Spreinger-Verlag, Germany, pp. 247-260.
Pham, Quan, Reid, Jason, McCullagh, Adrian, & Dawson, Ed
(2008)
Commitment issues in delegation process.
In
Miller, M & Brankovic, L (Eds.) Proceedings of the Sixth Australasian Information Security Conference.
Australian Computer Society, Australia, pp. 27-38.
176
10
Pham, Quan, Reid, Jason, McCullagh, Adrian, & Dawson, Ed
(2009)
On a taxonomy of delegation.
In
Lopez, J & Gritzalis, D (Eds.) Emerging challenges for security, privacy and trust : proceedings of the 24th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2009, Volume 297].
Springer, Germany, pp. 353-363.
Radke, Ken, Boyd, Colin, Brereton, Margot, & Gonzalez Nieto, Juan
(2010)
How HCI design influences web security decisions.
In
Kraal, B & Viller, S (Eds.) Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction.
Association for Computing Machinery, Australia, pp. 252-255.
264
2
Raghavan, Sriram, Clark, Andrew, & Mohay, George
(2009)
FIA: An open forensic integration architecture for composing digital evidence.
In
Sorell, Matthew (Ed.) Forensics in Telecommunications, Information and Multimedia : Proceedings of the 2nd International Conference [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009, Volume 8].
Springer, Germany, pp. 83-94.
1,299
14
Reid, Jason & Caelli, William
(2005)
DRM, Trusted Computing and Operating System Architecture.
In
Buyya, R, Montague, P, Sheppard, S, Coddington, P, Wendelborn, A, & Safavi-Naini, R (Eds.) ACSW Frontiers 2005: Proceedings of the 3rd Australasian Workshop on Grid Computing and e-Research and the 3rd Australasian Information Security Workshop [Conferences in Research and Practice in Information Technology, Volume 44].
Australian Computer Society, Australia, pp. 127-136.
1,287
21
Reid, Jason, Gonzalez Nieto, Juan, Tang, Tee, & Senadji, Bouchra
(2007)
Detecting Relay Attacks with Timing-Based Protocols.
In
Deng, R & Samarati, P (Eds.) Proceedings of the ACM Symposium on Information, Computer, and Communications Security.
The Association for Computing Machinery, Singapore, pp. 204-213.
2,314
159
Ring, Jared, Choo, Kim, Foo, Ernest, & Looi, Mark
(2006)
A New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography.
In
Clark, A, Mohay, G, & McPherson, M (Eds.) Proceedings of the AusCERT Asia Pacific Information Technology Security Conference 2006.
University of Queensland, CD Rom, pp. 57-72.
1,047
Ring, Jared, Foo, Ernest, & Looi, Mark
(2007)
On Ensuring Continuity of Mobile Communications in a Disaster Environment.
In
Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007.
Australian Homeland Security Research Centre, Australia, pp. 268-277.
215
Ring, Jared, Foo, Ernest, & Looi, Mark
(2007)
A Secure Billing Architecture for 4G Wireless Networks.
In
Clark, A, Mohay, G, & McPherson, M (Eds.) AusCERT 2007.
University of Queensland, Australia, pp. 14-30.
328
Ross, David, Clark, Andrew, & Looi, Mark
(2007)
Securely Deploying IEEE 802.11 WLANs.
In
Clark, A, Mohay, G, & McPherson, M (Eds.) AusCERT 2007.
University of Queensland, Australia, pp. 50-70.
792
8
Ryan, David, Denman, Simon, Fookes, Clinton, & Sridharan, Sridha
(2010)
Crowd counting using group tracking and local features.
In
Porikli, F (Ed.) Proceedings - IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2010.
IEEE Computer Society, United States, pp. 218-224.
1,201
23
Ryan, David, Denman, Simon, Fookes, Clinton, & Sridharan, Sridha
(2008)
Scene invariant crowd counting for real-time surveillance.
In
Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems (ICSPCS'2008).
Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-7.
347
7
Sahama, Tony & Croll, Peter
(2007)
A Data Warehouse Architecture for Clinical Data Warehousing.
In
Warren, J, Roddick, J, Steketee, C, Brankovic, L, Coddington, P, & Wendelborn, A (Eds.) ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery.
Australian Computer Society, Australia, pp. 227-232.
3,207
45
Salim, Farzad, Reid, Jason, Dulleck, Uwe, & Dawson, Ed
(2010)
Towards a game theoretic authorisation model.
In
Baras, J S, Alpcan, T, & Buttyan, L (Eds.) Decision and Game Theory for Security: First International Conference, GameSec 2010, Proceedings [Lecture Notes in Computer Science, Volume 6442].
Springer, Germany, pp. 208-219.
Salim, Farzad, Sheppard, Nicholas, & Safavi-Naini, Reihaneh
(2010)
A rights management approach to securing data distribution in coalitions.
In
Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security.
IEEE Computer Society, United States of America, pp. 560-567.
161
5
Scheffer, Nicholas, Vogt, Robert, Kajarekar, Sachin, & Pelecanos, Jason
(2009)
Combination strategies for a factor analysis phone-conditioned speaker verification system.
In
Lee, L (Ed.) Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2009.
Institute of Electrical and Electronics Engineers Inc., Online, pp. 4053-4056.
448
5
Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George, Ahmed, Ejaz, & Mackie, James
(2010)
A distributed denial of service testbed.
In
Hilty, L M, Berleur, J, & Hercheui, M (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience [IFIP Advances in Information and Communication Technology, 2010, Volume 328].
Springer, Germany, pp. 338-349.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark
(2009)
Multi-vehicles interaction graph model for cooperative collision warning system.
In
Zheng, N (Ed.) Proceedings of IEEE Intelligent Vehicles Symposium 2009.
Institute of Electrical and Electronic Engineers (IEEE), Online, pp. 929-934.
Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark
(2010)
A multicast routing scheme for efficient safety message dissemination in VANET.
In
Guo, Y J & Shafi, M (Eds.) Proceedings of the 2010 IEEE Wireless Communications and Networking Conference.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-6.
633
31
Simpson, Leonie, Henricksen, Matthew, & Yap, Wun-She
(2009)
Improved cryptanalysis of the common scrambling algorithm stream cipher.
In
Boyd, C & Gonzalez Nieto, J (Eds.) Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Proceedings [Lecture Notes in Computer Science, Volume 5594].
Springer, Germany, pp. 108-121.
Smith, Jason
(2007)
Denial of Service Vulnerabilities in IEEE 802.11i.
In
Lai, J, Mendis, P, Dawson, E, & Abbass, H (Eds.) Recent Advances in Security Technology 2007.
Australian Homeland Security Research Centre, Australia, pp. 202-213.
Smith, Jason, Ahmed, Ejaz, Chellappan, C., Meenakshi, S., Raghavan, S., Suriadi, Suriadi, & Tickle, Alan
(2011)
DoS vulnerabilities in IPv6.
In
Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection.
Springer, India, pp. 299-321.
Smith, Jason, Gill, Rupinder, & Clark, Andrew
(2006)
On Securing Wireless LAN Access to Government Information Systems.
In
Lai, J, Mendis, P, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference.
Australian Homeland Security Research Centre, Australia, pp. 440-453.
1,068
Smith, Jason, Gonzalez-Nieto, Juan, & Boyd, Colin
(2006)
Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework.
In
Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54].
Australian Computer Society, Australia, pp. 125-134.
25
Soar, Jeffrey & Croll, Peter
(2007)
Assistive Technologies for the Frail Elderly, Chronic Illness Sufferers and People with Disabilities - A Case Study of the Development of a Smart Home.
In
Toleman, M, Roberts, D, & Cater-Steel, A (Eds.) ACIS2007 Proceedings of the 18th Australasian Conference on Information Systems.
The University of Southern Queensland, CD ROM, pp. 937-944.
1,090
15
Stebila, Douglas, Mosca, Michele, & Lutkenhaus, Norbet
(2010)
The case for quantum key distribution.
In
Pascazio, S, Sergienko, A, & Villoresi, P (Eds.) Quantum Communication and Quantum Networking : First International Conference Revised Selected Papers [Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010, Volume 36].
Springer, Germany, pp. 283-296.
385
27
Strange, Andrew & Chandran, Vinod
(2006)
A Novel Approach for GPR Antenna Height Estimation.
In
Chen, C C, Sato, M, Yarovoy, A G, & Johnson, J T (Eds.) Proceedings of the 11th International Conference on Ground Penetrating Radar.
The Ohio State University, CD Rom, pp. 1-4.
Sun, Donald, Boyd, Colin, & Gonzalez Nieto, Juan
(2010)
Delegation in predicate encryption supporting disjunctive queries.
In
Weber, C, Rannenberg, K, & Varadharajan, V (Eds.) Security and Privacy - Silver Linings in the Cloud, Proceedings of 25th IFIP TC 11 International Information Security Conference [IFIP Advances in Information and Communication Technology, 2010, Volume 330].
Springer, Germany, pp. 229-240.
Sun, Yong, Ma, Lin, Robinson, Warwick, & Fidge, Colin
(2010)
Using decision trees in economizer repair decision making.
In
Pecht, M (Ed.) Proceedings of the 2010 IEEE - Prognostics and System Health Management Conference (PHM-2010 Macau).
Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-6.
1,080
2
Suriadi, Suriadi, Ashley, Paul, & Josang, Audun
(2007)
Future Standardization Areas for Identity Management Systems.
In
Mont, M, Griffin, P, Camenisch, J, Claessens, J, & Fischer-Hubner, S (Eds.) Proceedings of 2nd PRIME Standardization Workshop.
IBM Research Laboratory , Ruschlikon, www.prime-project.eu/events/standardisation-ws2, pp. 1-8.
273
Suriadi, Suriadi, Clark, Andrew, & Schmidt, Desmond
(2010)
Validating denial of service vulnerabilities in web services.
In
Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) Proceeding of the 2010 Fourth International Conference on Network and System Security.
IEEE Computer Society, United States, pp. 175-182.
910
16
Suriadi, Suriadi, Foo, Ernest, & Josang, Audun
(2007)
A User-Centric Federated Single Sign-on System.
In
Li, K, Qu, W, Jin, H, Cao, Z, & Xiang, Y (Eds.) 2007 IFIP International Conference on Network and Parallel Computing Workshops.
IEEE Computer Society, United States of America, pp. 99-106.
Suriadi, Suriadi, Foo, Ernest, & Smith, Jason
(2008)
A user-centric protocol for conditional anonymity revocation.
In
Lioy, A, Furnell, S, & Katsikas, S K (Eds.) Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008, Proceedings [Lecture Notes in Computer Science, Vol5185].
Springer, Germany, pp. 185-194.
7
4
Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest
(2009)
Modelling and verification of privacy enhancing protocols.
In
Breitman, K & Cavalcanti, A (Eds.) Formal Methods and Software Engineering: 11th International Conference on Formal Engineering Methods ICFEM 2009, Proceedings [Lecture Notes in Computer Science, 5885].
Springer, Germany, pp. 127-146.
5
2
Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh
(2010)
Risk modelling the transition of SCADA system to IPv6.
In
Hilty, L, Berleur, J, & Hercheui, M (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience [IFIP Advances in Information and Communication Technology, 2010, Volume 328].
Springer, Germany, pp. 384-395.
1
2
Taylor, Trevor, Geva, Shlomo, & Boles, Wageeh
(2006)
Early Results in Vision-Based Map Building.
In
Sitte, J, Murase, K, Kubota, N, Naniwa, T, & Sekiyama, K (Eds.) Proceedings of the 3rd International Symposium on Autonomous Minirobots for Research and Edutainment.
Springer, Germany, pp. 207-216.
Teo, Sui, Simpson, Leonie, & Dawson, Ed
(2010)
Bias in the nonlinear filter generator output sequence.
In
Min, G, Abu, N, Huay, H, Ahmad, R, MdSaid, M, Mas'ud, M, et al. (Eds.) Proceedings of 2nd International Cryptology Conference 2010.
Penerbit Universiti, Malaysia, pp. 40-46.
1
Teo, Sui-Guan, Al Mashrafi, Mufeed, Simpson, Leonie, & Dawson, Ed
(2009)
Analysis of authenticated encryption stream ciphers.
In
Kozan, E (Ed.) Proceedings of the 20th National Conference of Australian Society for Operations Research and the 5th International Intelligent Logistics System Conferences.
QUT Publications / Australian Society for Operations Research, Australia, Queensland, Brisbane, pp. 1-16.
616
Tickle, Alan, Ahmed, Ejaz, Bhaskar, Surinder, Mohay, George, Panichprecha, Sorot, Raghavan, S., Ravindran, B., Schmidt, Desmond, & Suriadi, Suriadi
(2011)
Background.
In
Dawson, E & Raghavan, S V (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection.
Springer, India, pp. 9-40.
1
Tong, Valerie, Clark, Andrew, & Me, Ludovic
(2010)
Specifying and enforcing a fine-grained information flow policy: model and experiments.
In
You, I (Ed.) Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications.
Jowua, Japan, pp. 56-71.
280
9
Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan
(2007)
Cost-Based and Time-Based Analysis of DoS-Resistance in HIP.
In
Dobbie, G (Ed.) Computer Science 2007: Proceedings of the 30th Australasian Computer Science Conference (CRPIT, Volume 62).
Australian Computer Society, Australia, pp. 191-200.
186
7
Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan
(2006)
Using Coloured Petri Nets to Simulate DoS-resistant Protocols.
In
Jensen, K (Ed.) 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools.
University of Aarhus, Denmark, pp. 261-280.
163
Vogt, Robert, Baker, Brendan, & Sridharan, Sridha
(2008)
Factor analysis subspace estimation for speaker verification with short utterances.
In
Gocke, R, Loakes, D, Wagner, M, Burnham, D, & Fletcher, J (Eds.) Proceedings of Interspeech 2008 incorporating SST 2008.
Casual Productions Pty Ltd, CD Rom, pp. 853-856.
Vogt, Robert, Pelecanos, Jason, Scheffer, Nicholas, Kajarekar, Sachin, & Sridharan, Sridha
(2009)
Within-session variability modelling for factor analysis speaker verification.
In
Moore, R (Ed.) Proceedings of the 10th Annual Conference of the International Speech Communication Association.
International Speech Communication Association, United Kingdom, pp. 1563-1566.
207
9
Vogt, Robert, Sridharan, Sridha, & Mason, Michael
(2008)
Making confident speaker verification decisions with minimal speech.
In
Gocke, R, Loakes, D, Wagner, M, Burnham, D, & Fletcher, J (Eds.) Proceedings of Interspeech 2008 incorporating SST 2008.
Casual Productions Pty Ltd, CD-Rom, pp. 1405-1408.
Vu, Ngoc-Vinh, Ye, Hua, Whittington, Jim, Devlin, John, & Mason, Michael
(2010)
Small footprint implementation of dual-microphone delay-and-sum beamforming for in-car speech enhancement.
In
Hansen, J H L (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 1482-1485.
21
14
Wallace, Roy, Baker, Brendan, Vogt, Robert, & Sridharan, Sridha
(2009)
The effect of language models on phonetic decoding for spoken term detection.
In
Larson, M, deJong, F, Kohler, J, Kraaij, W, & Ordelman, R (Eds.) Proceedings of the third workshop on searching spontaneous conversational speech.
Association for Computing Machinery (ACM), United States, pp. 31-36.
341
7
Wallace, Roy, Thambiratnam, Kit, & Seide, Frank
(2009)
Unsupervised speaker adaptation for telephone call transcription.
In
Lee, L (Ed.) Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., United States of America, pp. 4393-4396.
Wallace, Roy, Vogt, Robert, Baker, Brendan, & Sridharan, Sridha
(2010)
Optimising figure of merit for phonetic spoken term detection.
In
Hansen, J H L (Ed.) Proceedings of the 35th IEEE International Conference on Acoustics, Speech, and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 5298-5301.
Wallace, Roy, Vogt, Robert, & Sridharan, Sridha
(2009)
Spoken term detection using fast phonetic decoding.
In
Lee, L (Ed.) Proceedings from the 2009 IEEE International Conference on Acoustics, Speech, and Signal Processing.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 4881-4884.
Wang, David, Vogt, Robert, Mason, Michael, & Sridharan, Sridha
(2008)
Automatic audio segmentation using the Generalized Likelihood Ratio.
In
Wysocki, B & Wysocki, T (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communication Systems, 2008.
DSP for Communication Systems / IEEE, CD Rom, pp. 1-5.
227
15
Wang, David, Vogt, Robert, & Sridharan, Sridha
(2010)
Bayes factor based speaker clustering for speaker diarization.
In
Baker, S, Hamila, R, Salleh, S, & Boashash, B (Eds.) Proceedings of the 10th International Conference on Information Sciences, Signal Processing and their Applications, ISSPA 2010.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 61-64.
Wang, David, Vogt, Robert, & Sridharan, Sridha
(2010)
Bayes factor based speaker segmentation for speaker diarization.
In
Hirose, K, Nakamura, S, & Kobayashi, T (Eds.) Proceedings of the 11th Annual Conference of the International Speech Communication Association.
International Speech Communication Association, Japan, pp. 1405-1408.
Wang, Dong, Himawan, Ivan, Frankel, Joe, & King, Simon
(2008)
A posterior approach for microphone array based speech recognition.
In
Burnham, D (Ed.) Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech 2008) incorporating the 12th Australasian International Conference on Speech Science and Technology (SST).
International Speech Communication Association, CD Rom, pp. 996-999.
White, Andrew, Tickle, Alan, & Clark, Andrew
(2010)
Overcoming reputation and proof-of-work systems in botnets.
In
Hu, J, Zhou, W, Xiang, Y, Sadeghi, A, & Samarati, P (Eds.) 2010 Fourth International Conference on Network and System Security.
IEEE Computer Society, United States, pp. 120-127.
444
2
Whittington, Jim, Deo, Kapeel, Kleinschmidt, Tristan, & Mason, Michael
(2008)
FPGA Implementation of Spectral Subtraction for In-Car Speech Enhancement and Recognition.
In
Wysock, T & Wysocki, B (Eds.) Proceedings of the 2nd International Conference on Signal Processing and Communications Systems.
Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-8.
880
11
Whittington, Jim, Ye, Hua, Kamalakannan, K, Vu, Ngoc-Vinh, Mason, Michael, Kleinschmidt, Tristan, & Sridharan, Sridha
(2010)
Low-cost hardware speech enhancement for improved speech recognition in automotive environments.
In
Doyle, N (Ed.) The 24th ARRB Conference Proceedings.
ARRB Group Ltd., CD Rom, pp. 1-17.
467
Wong, Kenneth, Carter, Gary, & Dawson, Edward
(2006)
Implementation of Extension Field Arithmetic with Applications to Torus-Based Cryptology.
In
Dorfer, G, Muller, W, Winkler, R, Goldstern, M, & Eigenthaler, G (Eds.) Contributions to General Algebra 17.
Verlag Johannes Heyn, Germany, pp. 201-216.
Woo, Chaw, Du, Jiang, & Pham, Binh
(2005)
Geometrically Robust Digital Image Watermarking Using Scale Normalisation and Flowline Curvature.
In
III, Edward J Delp & Wong, Ping Wah (Eds.) Security, Stenography, and Watermarking of Multimedia Contents VII.
SOIE & IS&T (co-published), USA, pp. 528-538.
Woo, Chaw-Seng, Du, Jiang, & Pham, Binh
(2005)
Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images.
In
Lovell, B & Maeder, A (Eds.) Workshop Proceedings: WDIC 2005 APRS Workshop on Digital Image Computing.
University of Queensland, Australia, Queensland, Brisbane, pp. 43-48.
2,093
Woo, Chaw-Seng, Du, Jiang, & Pham, Binh
(2005)
Performance Factors Analysis of Wavelet-Based Watermarking Method.
In
Buyya, R, Montague, P, & Coddington, P (Eds.) ACSW Frontiers 2005.
Australian Computer Society, Australia, New South Wales, Sydney, pp. 89-98.
740
15
Z'Aba, Muhammad, Raddum, Havard, Henricksen, Matthew, & Dawson, Ed
(2008)
Bit-pattern based integral attack.
In
Nyberg, Kaisa (Ed.) Fast Software Encryption: 15th International Workshop, FSE 2008 Revised Selected Papers [Lecture Notes in Computer Science, Volume 5086].
Springer, Germany, pp. 363-381.
66
42
Z'Aba, Muhammad, Raddum, Havard, Simpson, Leonie, Dawson, Ed, Henricksen, Matthew, & Wong, Kenneth
(2009)
Algebraic analysis of LEX.
In
Susilo, W & Brankovic, L (Eds.) Information Security 2009 : proceedings of the 7th Australasian Information Security Conference.
Australian Computer Society, Australia, pp. 33-45.
201
2
Z'Aba, Muhammad, Simpson, Leonie, Dawson, Ed, & Wong, Kenneth
(2010)
Linearity within the SMS4 block cipher.
In
Bao, F, Lin, D, Yung, M, & Jing, J (Eds.) Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Revised Selected Papers [Lecture Notes in Computer Science, Volume 6151].
Springer, Germany, pp. 248-265.
486
1
Z'Aba, Muhammad, Wong, Kenneth, Dawson, Ed, & Simpson, Leonie
(2010)
Algebraic analysis of small scale LEX-BES.
In
Min, G, Abu, N, Huay, H, Ahmad, R, MdSaid, M, Mas'ud, M, et al. (Eds.) Proceedings of 2nd International Cryptology Conference 2010.
Penerbit Universiti, Malaysia, pp. 77-82.
210
2
Zimmermann, Jakub, Clark, Andrew, Mohay, George, Pouget, Fabien, & Dacier, Marc
(2005)
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
In
Huang, M Y (Ed.) Proceedings, First International Workshop on Systematic Approaches to Digital Forensic Engineering - SADFE 2005.
IEEE Computer Society, United States of America, pp. 89-104.
Zimmermann, Jakub & Mohay, George
(2006)
Distributed Intrusion Detection in Clusters Based on Non-Interference.
In
Ma, T, Buyya, R, Susilo, W, Steketee, C, & Safavi-Naini, R (Eds.) ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the 4th Australasian Information Security Workshop (Network Security) (AISW-NetSec 2006) [CRPIT, Volume 54].
Australian Computer Society, Australia, pp. 89-96.
4
Contribution to Journal
Barnes, Paul, Charles, Michael, Branagan, Mark, & Knight, Alistair
(2007)
Intelligence and Anticipation: Issues in Security, Risk and Crisis Management.
International Journal of Risk Assessment and Management, 7(8), pp. 1209-1223.
889
1
Betts, Martin, Black, Peter, Christensen, Sharon, Dawson, Edward, Du, Rong, Duncan, Bill, Foo, Ernest, & Gonzalez Nieto, Juan
(2006)
Towards Secure and Legal E-Tendering.
Journal of Information Technology in Construction, 11(e-Commerce in Construction), pp. 89-102.
Burdon, Mark, Gonzalez Nieto, Juan, Christensen, Sharon, Dawson, Edward, Duncan, William, & Lane, William
(2007)
Access Control in Federated Databases: How Legal Issues Shape Security.
Lecture Notes in Computer Science, 4656, Article number: EGOV 2007 228-239.
278
Chen, Kevin, Henricksen, Matthew, Millan, William, Fuller, Joanne, Simpson, Leonie, Dawson, Edward, Lee, Hoo-Jae, & Moon, Sang-Jae
(2005)
Dragon: A Fast Word Based Stream Cipher.
Lecture Notes in Computer Science, 3506, Article number: ICISC 33-50.
443
15
Choo, Kim, Boyd, Colin, & Cliff, Yvonne
(2006)
The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang and Yen-Sun Protocols.
Computer Communications, 29(15), pp. 2788-2797.
Chua, K, Chandran, Vinod, Acharya, Rajendra, & Lim, C.M.
(2008)
Computer-based analysis of cardiac state using entropies, recurrence plots and poincare geometry.
Journal of Medical Engineering and Technology, 32(4), pp. 263-272.
27
Denman, Simon, Lamb, Todd, Fookes, Clinton, Chandran, Vinod, & Sridharan, Sridha
(2010)
Multi-spectral fusion for surveillance systems.
Computers and Electrical Engineering, 36(4), pp. 643-663.
Ha, Jae-Cheol, Kim, Hwan-Koo, Park, Jea-Hoon, Moon, Sang-Jae, Gonzalez Nieto, Juan, & Boyd, Colin
(2007)
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System.
Lecture Notes in Computer Science, 4809, Article number: USN 2007 557-567.
5
Lopez, Javier, Montenegro, Jose, Vivas, Jose, Okamoto, Eiji, & Dawson, Edward
(2005)
Specification and Design of Advanced Authentication and Authorisation Services.
Computer Standards and Interfaces, 27(5), pp. 467-478.
22
15
Lucey, Patrick, Cohn, Jeffrey, Matthews, Iain, Lucey, Simon, Sridharan, Sridha, Howlett, Jessica, & Prkachin, Kenneth
(2011)
Automatically detecting pain in video through facial action units.
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 41(3), pp. 664-674.
211
158
Mclaren, Mitchell, Vogt, Robert, Baker, Brendan, & Sridharan, Sridha
(2010)
Data-driven background dataset selection for SVM-based speaker verification.
IEEE Transactions on Audio, Speech and Language Processing, 18(6), pp. 1496-1506.
Muhlbauer, Adam, Salim, Farzad, Safavi-Naini, Reihaneh, Sheppard, Nicholas P., & Surminen, Martin
(2008)
Location constraints in digital rights management.
Computer Communications, 31(6), pp. 1173-1180.
Peng, Kun, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon
(2005)
Ciphertext Comparison, a New Solution to the Millionaire Problem.
Lecture Notes in Computer Science, 3783, Article number: ICICS 84-96.
Pouget, Fabien, Dacier, Marc, Zimmermann, Jakub, Clark, Andrew, & Mohay, George
(2006)
Internet Attack Knowledge Discovery Via Clusters and Cliques of Attack Traces.
Journal of Information Assurance and Security, 1(1), pp. 21-32.
12
Smith, Jason, Tritilanunt, Suratose, Boyd, Colin, Gonzalez Nieto, Juan, & Foo, Ernest
(2007)
Denial-of-Service Resistance in Key Establishment.
International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
423
7
Tso, Raylin, Gonzalez Nieto, Juan, Okamoto, Takeshi, Boyd, Colin, & Okamoto, Eiji
(2007)
Verifier-Key-Flexible Universal Designated-Verifier Signatures.
Lecture Notes in Computer Science, 4887, pp. 403-421.
3
3
Wallace, Roy, Baker, Brendan, Vogt, Robert, & Sridharan, Sridha
(2011)
Discriminative optimisation of the figure of merit for phonetic spoken term detection.
IEEE Transactions on Audio, Speech and Language Processing, 19(6), pp. 1677-1687.
Conference [Discontinued]
Contribution to conference
Chapman, S.C., Mathews, K.L., Cooper, M., Jensen, N.M., Wang, E., Butler, D.G., Sheppard, J.A., & Sahama, T.R.
(2001)
Using environment characterization to interpret wheat yield in water-limited environments. In
10th Assembly of the Wheat Breeding Society fo Australian Inc., 2001-09-16 - 2001-09-21.
Liu, Vicky, Caelli, William, May, Lauren, Croll, Peter, & Henricksen, Matthew
(2007)
Current Approaches to Secure Health Information Systems are NOT Sustainable: An Analysis. In
12th World Congress on Health (Medical) Informatics, 2007-08-20 - 2007-08-24.
187
Samad, Kashan, Ahmed, Ejaz, Mahmood, Waqar, Sharif, Kashif, & Chaudhry, Ahsan A.
(2005)
Efficient clustering approach for intrusion detection in adhoc networks. In
Student Conference on Engineering Sciences and Technology, 2005-08-27 - 2005-08-27.
151
2
Shafiq, Mohammed O., Ali, Arshad, Ahmed, Ejaz, Ahmed, Hafiz F., & Suguri, Hiroki
(2005)
Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In
23rd IASTED International Multi Conference on Applied Informatics : Parallel and Distributed Computing and Networks (PDCN), 2005-02-01 - 2005-02-28.
141
Report [Discontinued]
QUT Thesis
Thesis
Working Paper
Other Contribution
Dawson, Edward P., Christensen, Sharon A., Foo, Ernest, Josang, Audun, Gauravaram, Praveen S., O'Shea, Kathryn L., & McNamara, Judith
(2006)
Electronic Contract Administration – Legal and Security Issues Literature Review.
Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, Wang, Hua, Clark, Andrew J., Mohay, George M., Khan, Roheena Q., & Corney, Malcolm W.
(2012)
Detecting anomalous user activity.
64
This list was generated on Sun Aug 4 11:46:18 2024 AEST.