Classification of malware based on integrated static and dynamic features R Islam, R Tian, LM Batten, S Versteeg Journal of Network and Computer Applications 36 (2), 646-656, 2013 | 397 | 2013 |
Combinatorics of finite geometries LM Batten (No Title), 1997 | 276 | 1997 |
Differentiating malware from cleanware using behavioural analysis R Tian, R Islam, L Batten, S Versteeg 2010 5th international conference on malicious and unwanted software, 23-30, 2010 | 264 | 2010 |
Function length as a tool for malware classification R Tian, LM Batten, SC Versteeg 2008 3rd international conference on malicious and unwanted software …, 2008 | 189 | 2008 |
An automated classification system based on the strings of trojan and virus families R Tian, L Batten, R Islam, S Versteeg 2009 4th International conference on malicious and unwanted software …, 2009 | 186 | 2009 |
The theory of finite linear spaces: combinatorics of points and lines LM Batten, A Beutelspacher (No Title), 1993 | 143 | 1993 |
Classification of malware based on string and function feature selection R Islam, R Tian, L Batten, S Versteeg 2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010 | 122 | 2010 |
E-commerce: protecting purchaser privacy to enforce trust G Antoniou, L Batten Electronic commerce research 11, 421-456, 2011 | 119 | 2011 |
Broadcast anti-jamming systems Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk Computer Networks 35 (2-3), 223-236, 2001 | 111 | 2001 |
Cyber security attacks to modern vehicular systems L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten Journal of information security and applications 36, 90-100, 2017 | 95 | 2017 |
Analysis of malicious and benign android applications M Alazab, V Moonsamy, L Batten, P Lantz, R Tian 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 75 | 2012 |
Algebraic Attacks over GF(q) LM Batten Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on …, 2005 | 67 | 2005 |
Public key cryptography: applications and attacks LM Batten John Wiley & Sons, 2013 | 60 | 2013 |
Fast algorithm for the cutting angle method of global optimization LM Batten, G Beliakov Journal of Global Optimization 24 (2), 149-161, 2002 | 51 | 2002 |
Games, graphs and circular arguments DN Walton, LM Batten Logique et Analyse 27 (106), 133-164, 1984 | 49 | 1984 |
New directions in IoT privacy using attribute-based authentication G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ... Proceedings of the ACM international conference on computing frontiers, 461-466, 2016 | 47 | 2016 |
Towards an understanding of the impact of advertising on data leaks V Moonsamy, M Alazab, L Batten International journal of security and networks 7 (3), 181-193, 2012 | 41 | 2012 |
Microsoft and Amazon: A comparison of approaches to cloud security G Tajadod, L Batten, K Govinda 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 38 | 2012 |
Feature reduction to speed up malware classification V Moonsamy, R Tian, L Batten Information Security Technology for Applications: 16th Nordic Conference on …, 2012 | 35 | 2012 |
Determining sets LM Batten Australasian Journal of Combinatorics 22, 167-176, 2000 | 34 | 2000 |