Andrew J. Clark
Affiliations:- Information Security Institute, Queensland University of Technology (QUT), Brisbane, Queensland, Australia
According to our database1,
Andrew J. Clark
authored at least 62 papers
between 1987 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
1
1
2
1
1
3
1
2
1
2
2
1
4
7
2
3
4
4
5
3
2
2
2
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
Pre-processing training data improves accuracy and generalisability of convolutional neural network based landscape semantic segmentation.
CoRR, 2023
2013
Proceedings of the Influence of Technology on Social Network Analysis and Mining, 2013
2011
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines.
Digit. Investig., 2011
Comput. Secur., 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Proceedings of the IEEE International Conference on Web Services, 2011
Proceedings of the Ninth Australasian Information Security Conference, 2011
2010
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010
2009
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Forensics in Telecommunications, 2009
2008
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks.
Proceedings of the The Third International Conference on Availability, 2008
2006
Digit. Investig., 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Manag. Sci., 2004
Simpler methods for generating better Boolean functions with good cryptographic properties.
Australas. J Comb., 2004
Towards Context-aware Security: An Authorization Architecture for Intranet Environments.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Denial of Service Issues in Voice Over IP Networks.
Proceedings of the ICETE 2004, 2004
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Generalising Event Forensics Across Multiple Domains.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004
2003
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
ECF - Event Correlation for Forensics.
Proceedings of the 1st Australian Computer, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2000
IEEE Trans. Computers, 2000
Future Gener. Comput. Syst., 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Inversion Attack and Branching.
Aust. Comput. J., 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher.
Cryptologia, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Proceedings of the Fast Software Encryption, 1996
1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1987
Proceedings of the Advances in Cryptology, 1987