Lynn Margaret Batten
Orcid: 0000-0003-4525-2423Affiliations:
- Deakin University
According to our database1,
Lynn Margaret Batten
authored at least 95 papers
between 1983 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2020
Proceedings of the Applications and Techniques in Information Security, 2020
2019
Electron. Commer. Res., 2019
Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017).
Concurr. Comput. Pract. Exp., 2019
2018
J. Netw. Syst. Manag., 2018
IEEE Access, 2018
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Future Gener. Comput. Syst., 2017
Enterp. Inf. Syst., 2017
Concurr. Comput. Pract. Exp., 2017
Introduction to the Special section on Aadvanced Computing in Networking and Intelligent Systems.
Comput. Electr. Eng., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
Proceedings of the Applications and Techniques in Information Security, 2016
Proceedings of the Applications and Techniques in Information Security, 2016
2015
Int. J. Cloud Comput., 2015
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015
Proceedings of the Future Network Systems and Security - First International Conference, 2015
2014
Future Gener. Comput. Syst., 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the International Conference on Data Science and Advanced Analytics, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
J. Netw. Comput. Appl., 2013
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
An adaptive approach to information discovery in multi-dimensional wireless sensor networks.
Proceedings of the Seventh International Conference on Sensing Technology, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
2012
A Comparison of the Classification of Disparate Malware Collected in Different Time Periods.
J. Networks, 2012
Int. J. Secur. Networks, 2012
Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations.
Int. J. Digit. Crime Forensics, 2012
Proceedings of the 7th International Workshop on Digital Forensics and Incident Analysis, 2012
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Electron. Commer. Res., 2011
Proceedings of the Information Security Technology for Applications, 2011
Dealing with Rogue Virtual Machines in a Cloud Services Environment.
Proceedings of the CLOSER 2011, 2011
Prevention of Information Harvesting in a Cloud Services Environment.
Proceedings of the CLOSER 2011, 2011
2010
Proceedings of the Handbook of Research on Computational Forensics, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks.
J. Netw. Comput. Appl., 2009
Proceedings of the NTMS 2009, 2009
Proceedings of the MSN 2009, 2009
An automated classification system based on the strings of trojan and virus families.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the Intelligent Distributed Computing III, Proceedings of the 3rd International Symposium on Intelligent Distributed Computing, 2009
Proceedings of the Forensics in Telecommunications, 2009
2008
Secur. Commun. Networks, 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
Proceedings of the Information Systems Development, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the Intelligence and Security Informatics, 2008
2007
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005
Proceedings of the Australasian Conference on Information Systems, 2005
2004
Proceedings of the 17th Bled eConference: eGlobal, 2004
2003
A New Method for Locating the Global Optimum: Application of the Cutting Angle Method to Molecular Structure Prediction.
Proceedings of the Computational Science - ICCS 2003, 2003
2002
J. Glob. Optim., 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
2000
IEEE Trans. Inf. Theory, 2000
1999
1997
1993
A characterization of finite linear spaces on v points, n<sup>2</sup><=v<(n+1)<sup>2</sup>, andb=n<sup>2</sup>+n+3 lines, n>=10.
Discret. Math., 1993
The nonexistence of finite linear spaces with v=n<sup>2</sup> points and b=n<sup>2</sup>+n+2 lines.
Discret. Math., 1993
The theory of finite linear spaces - combinatorics of points and lines.
Cambridge University Press, ISBN: 978-0-521-33317-7, 1993
1991
1989
1988
Embedding pseudo-complements of quadrics in <i>PG</i>(<i>n</i>, <i>q</i>), <i>n</i> geq 3, <i>q</i> geq 2.
J. Comb. Theory A, 1988
1984
Discret. Math., 1984
1983