Barry Irwin
Orcid: 0000-0002-2727-2124
According to our database1,
Barry Irwin
authored at least 66 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
Cloud Telescope: A distributed architecture for capturing Internet Background Radiation.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
2019
South Afr. Comput. J., 2019
Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019
2018
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018
Exploration and Design of a Synchronous Message Passing Framework for a CPU-NPU Heterogeneous Architecture.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018
2017
Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2017
Proceedings of the 2017 Information Security for South Africa, 2017
Proceedings of the 2017 Information Security for South Africa, 2017
Proceedings of the 2017 Information Security for South Africa, 2017
Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise.
Proceedings of the 9th International Conference on Signal Processing Systems, 2017
2016
Int. J. Cyber Warf. Terror., 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 2016 Information Security for South Africa, 2016
Proceedings of the 2016 Information Security for South Africa, 2016
Proceedings of the 2016 Information Security for South Africa, 2016
Proceedings of the 2016 Information Security for South Africa, 2016
Investigating Multi-Thread Utilization as a Software Defence Mechanism Against Side Channel Attacks.
Proceedings of the 8th International Conference on Signal Processing Systems, 2016
Proceedings of the 2nd International Conference on Frontiers of Signal Processing, 2016
2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
2014
On the viability of pro-active automated PII breach detection: A South African case study.
Proceedings of the Southern African Institute for Computer Scientist and Information Technologists Annual Conference 2014, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the ICT and Society, 2014
2013
Towards a GPU accelerated virtual machine for massively parallel packet classification and filtering.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Real-time distributed malicious traffic monitoring for honeypots and network telescopes.
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 5th International Conference on Cyber Conflict, 2013
2012
Proceedings of the 2012 South African Institute of Computer Scientists and Information Technologists Conference, 2012
Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains.
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model.
Proceedings of the ICT Critical Infrastructures and Society, 2012
2011
Proceedings of the Information Security South Africa Conference 2011, 2011
2010
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010
Data classification for artificial intelligence construct training to aid in network incident identification using network telescope data.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010
2009
Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2009
GPU packet classification using OpenCL: a consideration of viable classification methods.
Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers.
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems.
Proceedings of the Information Security South Africa Conference 2009, 2009
A comparison of the resource requirements of SNORT and BRO in production networks.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009
2008
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering, 2008
2007
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007
An Investigation into the Performance of General Sorting on Graphics Processing Units.
Proceedings of the Advances in Computer and Information Sciences and Engineering, 2007
2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the 4th International Conference on Virtual Reality, 2006
2005
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the Advances in Digital Forensics, 2005