Andrew Clark
Andrew Clark
Adjunct Associate Professor of Information Security, Queensland University of Technology
E-mail confirmado em qut.edu.au
Título
Citado por
Citado por
Ano
Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark
computers & security 30 (6-7), 353-375, 2011
3032011
Heuristic design of cryptographically strong balanced Boolean functions
W Millan, A Clark, E Dawson
International conference on the theory and applications of cryptographic …, 1998
1681998
Optimisation heuristics for cryptology
AJ Clark
Queensland University of Technology, 1998
1121998
Smart hill climbing finds better boolean functions
W Millan, A Clark, E Dawson
Workshop on Selected Areas in Cryptology 1997, 50-63, 1997
1021997
Evolutionary heuristics for finding cryptographically strong S-boxes
W Millan, L Burnett, G Carter, A Clark, E Dawson
International Conference on Information and Communications Security, 263-274, 1999
961999
An effective genetic algorithm for finding highly nonlinear Boolean functions
W Millan, A Clark, E Dawson
International conference on information and communications security, 149-158, 1997
931997
Physical protection of cryptographic devices
AJ Clark
Workshop on the Theory and Application of of Cryptographic Techniques, 83-93, 1987
791987
Boolean function design using hill climbing methods
W Millan, A Clark, E Dawson
Australasian conference on information security and privacy, 1-11, 1999
671999
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
662000
A correlation method for establishing provenance of timestamps in digital evidence
B Schatz, G Mohay, A Clark
digital investigation 3, 98-107, 2006
652006
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
R Gill, J Smith, A Clark
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
632006
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks
M Kiani, A Clark, G Mohay
2008 Third International Conference on Availability, Reliability and …, 2008
622008
Specification-based intrusion detection in WLANs
R Gill, J Smith, A Clark
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 141-152, 2006
592006
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
582002
Modern optimisation algorithms for cryptanalysis
A Clark
Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information …, 1994
571994
Optimisation heuristics for the automated cryptanalysis of classical ciphers
A Clark, E Dawson
Journal of Combinatorial Mathematics and Combinatorial Computing 28, 63-86, 1998
541998
Generalized inversion attack on nonlinear filter generators
JD Golic, A Clark, E Dawson
IEEE Transactions on computers 49 (10), 1100-1109, 2000
512000
A novel sliding window based change detection algorithm for asymmetric traffic
E Ahmed, A Clark, G Mohay
2008 IFIP International Conference on Network and Parallel Computing, 168-175, 2008
472008
Rich event representation for computer forensics
B Schatz, G Mohay, A Clark
Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management …, 2004
472004
A technique for detecting new attacks in low-interaction honeypot traffic
S Almotairi, A Clark, G Mohay, J Zimmermann
2009 Fourth International Conference on Internet Monitoring and Protection, 7-13, 2009
422009
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20