1. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Anomalous Taint Detection

    Cavallaro, L. & Sekar, R., 1 Jun 2008.

    Research output: Working paper

  3. Published

    Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R., 2008, 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 21 Oct 2019, In : IEEE Access. 7, p. 154018-154034 17 p.

    Research output: Contribution to journalArticle

  6. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L., 16 Aug 2018, In : IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticle

  7. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M., 2014, The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, p. 496-511. 16 p.

    Research output: Contribution to conferencePaper

  12. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In : The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticle

  13. Published

    AntiCheetah: Trustworthy computing in an outsourced (cheating) environment

    Di Pietro, R., Lombardi, F., Martinelli, F. & Sgandurra, D., 2015, In : Future Generation Computer Systems. 48, p. 28-38 11 p.

    Research output: Contribution to journalArticle

  14. Published

    AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing

    Pietro, R. D., Lombardi, F., Martinelli, F. & Sgandurra, D., 1 Dec 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing. p. 371-379 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published
  16. Published
  17. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In : IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticle

  18. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Unpublished
  21. Published

    Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. p. 1426-1432 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Application of Grid Security to Personal Distributed Environments

    Tomlinson, A. & Schwiderski-Grosche, S., 1 Oct 2004, p. 68-78. 11 p.

    Research output: Contribution to conferencePaper

  23. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  24. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

Previous 1...9 10 11 12 13 14 15 16 ...83 Next