Ian Welch
Orcid: 0000-0002-5968-182XAffiliations:
- Victoria University of Wellington, New Zealand
- University of Newcastle, Newcastle Upon Tyne, UK (PhD 2005)
According to our database1,
Ian Welch
authored at least 107 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction.
Comput. Secur., 2025
2024
Appl. Soft Comput., 2024
2023
Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution.
Comput. Secur., June, 2023
ACM Comput. Surv., 2023
Investigating Cybersecurity Risks and the Responses of Home Workers in Aotearoa New Zealand.
Proceedings of the 35th Australian Computer-Human Interaction Conference, 2023
Proceedings of the Australasian Conference on Information Systems, 2023
2022
Future Gener. Comput. Syst., 2022
A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework.
CoRR, 2022
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Comput. Secur., 2022
Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599].
Comput. Secur., 2022
Probabilistic modelling of deception-based security framework using markov decision process.
Comput. Secur., 2022
Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection.
Appl. Soft Comput., 2022
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022
Automatically evolving malice scoring models through utilisation of genetic programming: a cooperative coevolution approach.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
2021
CoRR, 2021
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
Failure Modes and Effects Analysis (FMEA) of Honeypot-Based Cybersecurity Experiment for IoT.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Internet of Things (IoT) Privacy and Security: A User-Focused Study of Aotearoa New Zealand Home Users.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
Survey on geographic visual display techniques in epidemiology: Taxonomy and characterization.
J. Ind. Inf. Integr., 2020
A survey on the architecture, application, and security of software defined networking: Challenges and open issues.
Internet Things, 2020
How do they find us? A study of geolocation tracking techniques of malicious web sites.
Comput. Secur., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Particle Swarm Optimization: A Wrapper-Based Feature Selection Method for Ransomware Detection and Classification.
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020
2019
Automatic Device Selection and Access PolicyGeneration based on User Preference for IoTActivity Workflow.
CoRR, 2019
Modelling and Prediction of Resource Utilization of Hadoop Clusters: A Machine Learning Approach.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019
Automatic Device Selection and Access Policy Generation Based on User Preference for IoT Activity Workflow.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection.
Proceedings of the Advances in Information and Computer Security, 2019
A genetic programming approach to feature selection and construction for ransomware, phishing and spam detection.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network.
IEEE Access, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Towards Secure Smart Home IoT: Manufacturer and User Network Access Control Framework.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Impacts of Power Factor Control Schemes in Time Series Power Flow Analysis for Centralized PV Plants Using Wavelet Variability Model.
IEEE Trans. Ind. Informatics, 2017
Impact of centralized photovoltaic systems on utility power factor profile using the wavelet variability model.
Proceedings of the 2017 IEEE Innovative Smart Grid Technologies - Asia, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Learning Under Data Shift for Domain Adaptation: A Model-Based Co-clustering Transfer Learning Solution.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2016
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016
Proceedings of the 28th IEEE International Conference on Tools with Artificial Intelligence, 2016
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
2015
Comput. Networks, 2015
Proceedings of the International Telecommunication Networks and Applications Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2013
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
Prax. Inf.verarb. Kommun., 2012
J. Netw. Comput. Appl., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012
2011
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011
A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Ninth Australasian Information Security Conference, 2011
Proceedings of the Ninth Australasian Information Security Conference, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
Proceedings of the International Conference on Computational Science, 2010
Event log messages as a human interface, or, "do you pine for the days when men were men and wrote their own device drivers?".
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010
Proceedings of the User Interfaces 2010, 2010
2009
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots.
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the 10th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction, 2009
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009
Proceedings of the User Interfaces 2009, Tenth Australasian User Interface Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Identification of malicious web pages through analysis of underlying DNS and web server relationships.
Proceedings of the LCN 2008, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008
2007
Digit. Investig., 2007
2006
IEEE Secur. Priv., 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
2005
Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code.
PhD thesis, 2005
2004
Proceedings of the RAM-SE'04-ECOOP'04 Workshop on Reflection, 2004
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
2003
2002
J. Comput. Secur., 2002
Structured Handling of Online Interface Upgrades in Integrating Dependable Systems of Systems.
Proceedings of the Scientific Engineering for Distributed Java Applications, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Proceedings of the Metalevel Architectures and Separation of Crosscutting Concerns, 2001
Proceedings of the Object-Oriented Technology ECOOP 2001 Workshop Reader, 2001
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29, 2001
2000
Proceedings of the Addendum to the 2000 Proceedings of the Conference on Object-Oriented Programming Systems, 2000
Proceedings of the Computer Security, 2000
1999
Using Coordinated Atomic Actions to Design Safety-Critical Systems: a Production Cell Case Study.
Softw. Pract. Exp., 1999
Proceedings of the Meta-Level Architectures and Reflection, 1999
Proceedings of the Reflection and Software Engineering, 1999
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 1999
Runtime Implementation of Aspects Using Kava.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999
1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998