Segui
Lynn Batten
Lynn Batten
Email verificata su deakin.edu.au
Titolo
Citata da
Citata da
Anno
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
3972013
Combinatorics of finite geometries
LM Batten
(No Title), 1997
2761997
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
2642010
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
1892008
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International conference on malicious and unwanted software …, 2009
1862009
The theory of finite linear spaces: combinatorics of points and lines
LM Batten, A Beutelspacher
(No Title), 1993
1431993
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1222010
E-commerce: protecting purchaser privacy to enforce trust
G Antoniou, L Batten
Electronic commerce research 11, 421-456, 2011
1192011
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1112001
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of information security and applications 36, 90-100, 2017
952017
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
752012
Algebraic Attacks over GF(q)
LM Batten
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on …, 2005
672005
Public key cryptography: applications and attacks
LM Batten
John Wiley & Sons, 2013
602013
Fast algorithm for the cutting angle method of global optimization
LM Batten, G Beliakov
Journal of Global Optimization 24 (2), 149-161, 2002
512002
Games, graphs and circular arguments
DN Walton, LM Batten
Logique et Analyse 27 (106), 133-164, 1984
491984
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ...
Proceedings of the ACM international conference on computing frontiers, 461-466, 2016
472016
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
412012
Microsoft and Amazon: A comparison of approaches to cloud security
G Tajadod, L Batten, K Govinda
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
382012
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Information Security Technology for Applications: 16th Nordic Conference on …, 2012
352012
Determining sets
LM Batten
Australasian Journal of Combinatorics 22, 167-176, 2000
342000
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20