Ian Welch

Orcid: 0000-0002-5968-182X

Affiliations:
  • Victoria University of Wellington, New Zealand
  • University of Newcastle, Newcastle Upon Tyne, UK (PhD 2005)


According to our database1, Ian Welch authored at least 105 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution.
Comput. Secur., June, 2023

A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights.
ACM Comput. Surv., 2023

Investigating Cybersecurity Risks and the Responses of Home Workers in Aotearoa New Zealand.
Proceedings of the 35th Australian Computer-Human Interaction Conference, 2023

IndigiCloud - Enacting Māori Data Sovereignty.
Proceedings of the Australasian Conference on Information Systems, 2023

2022
Autoencoder-based feature construction for IoT attacks clustering.
Future Gener. Comput. Syst., 2022

A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework.
CoRR, 2022

A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Comput. Secur., 2022

Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599].
Comput. Secur., 2022

Probabilistic modelling of deception-based security framework using markov decision process.
Comput. Secur., 2022

Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection.
Appl. Soft Comput., 2022

Advanced Persistent Threat Detection: A Particle Swarm Optimization Approach.
Proceedings of the 32nd International Telecommunication Networks and Applications Conference, 2022

Automatically evolving malice scoring models through utilisation of genetic programming: a cooperative coevolution approach.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

2021
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights.
CoRR, 2021

Automated Behavior-based Malice Scoring of Ransomware Using Genetic Programming.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Failure Modes and Effects Analysis (FMEA) of Honeypot-Based Cybersecurity Experiment for IoT.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Internet of Things (IoT) Privacy and Security: A User-Focused Study of Aotearoa New Zealand Home Users.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Survey on geographic visual display techniques in epidemiology: Taxonomy and characterization.
J. Ind. Inf. Integr., 2020

A survey on the architecture, application, and security of software defined networking: Challenges and open issues.
Internet Things, 2020

How do they find us? A study of geolocation tracking techniques of malicious web sites.
Comput. Secur., 2020

A Measurement Study of IoT-Based Attacks Using IoT Kill Chain.
Proceedings of the 19th IEEE International Conference on Trust, 2020

IoT Attacks: Features Identification and Clustering.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Achieving IoT Devices Secure Sharing in Multi-User Smart Space.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Particle Swarm Optimization: A Wrapper-Based Feature Selection Method for Ransomware Detection and Classification.
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020

2019
Automatic Device Selection and Access PolicyGeneration based on User Preference for IoTActivity Workflow.
CoRR, 2019

Modelling and Prediction of Resource Utilization of Hadoop Clusters: A Machine Learning Approach.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019

Automatic Device Selection and Access Policy Generation Based on User Preference for IoT Activity Workflow.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Geolocation Tracking and Cloaking of Malicious Web Sites.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection.
Proceedings of the Advances in Information and Computer Security, 2019

A genetic programming approach to feature selection and construction for ransomware, phishing and spam detection.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

IoT Application-Centric Access Control (ACAC).
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Fog-Assisted SDN Controlled Framework for Enduring Anomaly Detection in an IoT Network.
IEEE Access, 2018

A new multi classifier system using entropy-based features in DDoS attack detection.
Proceedings of the 2018 International Conference on Information Networking, 2018

Enhanced Event Reliability in Wireless Sensor Networks.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Towards Secure Smart Home IoT: Manufacturer and User Network Access Control Framework.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Impacts of Power Factor Control Schemes in Time Series Power Flow Analysis for Centralized PV Plants Using Wavelet Variability Model.
IEEE Trans. Ind. Informatics, 2017

Impact of centralized photovoltaic systems on utility power factor profile using the wavelet variability model.
Proceedings of the 2017 IEEE Innovative Smart Grid Technologies - Asia, 2017

A framework for flexible interdomain routing in transit ISPs.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Cluster-than-Label: Semi-Supervised Approach for Domain Adaptation.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Learning Under Data Shift for Domain Adaptation: A Model-Based Co-clustering Transfer Learning Solution.
Proceedings of the Knowledge Management and Acquisition for Intelligent Systems, 2016

Network-wide virtual firewall using SDN/OpenFlow.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Novel Features for Web Spam Detection.
Proceedings of the 28th IEEE International Conference on Tools with Artificial Intelligence, 2016

Towards SDN Network Proofs - Taming a Complex System.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Application of HAZOP to the Design of Cyber Security Experiments.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Machine Learning Based Web Spam Filtering Approach.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Measurement of IP and network tracking behaviour of malicious websites.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Reliability in wireless sensor networks: A survey and challenges ahead.
Comput. Networks, 2015

Global and local knowledge in SDN.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

VisRAID: Visualizing Remote Access for Intrusion Detection.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
YALIH, Yet Another Low Interaction Honeyclient.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Restrictions Affecting New Zealanders' Access to the Internet: A Local Study.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Security analysis of a protocol for pollution attack detection.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

WCMT: Web censorship monitoring tool.
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2013

Efficient and secure data aggregation for smart metering networks.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

Anatomy of Drive-by Download Attack.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A Practical Approach to System Preservation Workflows.
Prax. Inf.verarb. Kommun., 2012

Security threats and solutions in MANETs: A case study using AODV and SAODV.
J. Netw. Comput. Appl., 2012

A Novel Scoring Model to Detect Potential Malicious Web Pages.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A hybrid recognition and recall based approach in graphical passwords.
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012

2011
Verifying Digital Provenance in Web Services.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction.
Proceedings of the Ninth Australasian Information Security Conference, 2011

Identification of Potential Malicious Web Pages.
Proceedings of the Ninth Australasian Information Security Conference, 2011

Two-Stage Classification Model to Detect Malicious Web Pages.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
A protocol for verification of an auction without revealing bid values.
Proceedings of the International Conference on Computational Science, 2010

Event log messages as a human interface, or, "do you pine for the days when men were men and wrote their own device drivers?".
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010

Internet Sensor Grid: Experiences with Passive and Active Instruments.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

The Effect of User Interface Delay in Thin Client Mobile Games.
Proceedings of the User Interfaces 2010, 2010

2009
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Remotely shooting asteroids on our mobile phone.
Proceedings of the 10th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction, 2009

Automating Malware Scanning Using Workflows.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Using Remotely Executing Software via a Mobile Device.
Proceedings of the User Interfaces 2009, Tenth Australasian User Interface Conference, 2009

Measurement Study on Malicious Web Servers in the .nz Domain.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Special track on Programming for Separation of Concerns: editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Identification of malicious web pages through analysis of underlying DNS and web server relationships.
Proceedings of the LCN 2008, 2008

Identifying and Analyzing Web Server Attacks.
Proceedings of the Advances in Digital Forensics IV, 2008

Designing Workflows for Grid Enabled Internet Instruments.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

2007
Capture - A behavioral analysis tool for applications and documents.
Digit. Investig., 2007

2006
Intrusion-tolerant middleware: the road to automatic security.
IEEE Secur. Priv., 2006

Policy-driven reflective enforcement of security policies.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Trustworthy Auctions for Grid-Style Economies.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code.
PhD thesis, 2005

2004
Reflections on Programming with Grid Toolkits.
Proceedings of the RAM-SE'04-ECOOP'04 Workshop on Reflection, 2004

A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Re-engineering Security as a Crosscutting Concern.
Comput. J., 2003

2002
Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code.
J. Comput. Secur., 2002

Structured Handling of Online Interface Upgrades in Integrating Dependable Systems of Systems.
Proceedings of the Scientific Engineering for Distributed Java Applications, 2002

A Structured Approach to Handling On-Line Interface Upgrades.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Aspects of Exceptions at the Meta-level.
Proceedings of the Metalevel Architectures and Separation of Crosscutting Concerns, 2001

Panel: The Next 700 Distributed Object Systems.
Proceedings of the Object-Oriented Technology ECOOP 2001 Workshop Reader, 2001

Kava - Using Byte code Rewriting to add Behavioural Reflection to Java.
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems, January 29, 2001

2000
Kava - a powerful and portable reflective Java (poster session).
Proceedings of the Addendum to the 2000 Proceedings of the Conference on Object-Oriented Programming Systems, 2000

Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.
Proceedings of the Computer Security, 2000

1999
Using Coordinated Atomic Actions to Design Safety-Critical Systems: a Production Cell Case Study.
Softw. Pract. Exp., 1999

From Dalang to Kava - The Evolution of a Reflective Java Extension.
Proceedings of the Meta-Level Architectures and Reflection, 1999

Kava - A Reflective Java Based on Bytecode Rewriting.
Proceedings of the Reflection and Software Engineering, 1999

Supporting Real World Security Models in Java.
Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '99), 1999

Runtime Implementation of Aspects Using Kava.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

1998
A Reflective Java Class Loader.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Dynamic Adaptation of the Security Properties of Applications and Components.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Adaptation of Connectors in Software Architectures.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998


  Loading...