Lynn Batten
Lynn Batten
Geverifieerd e-mailadres voor deakin.edu.au
Geciteerd door
Geciteerd door
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
Combinatorics of finite geometries
LM Batten, LM Batten
Cambridge University Press, 1997
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International conference on malicious and unwanted software …, 2009
The theory of finite linear spaces: combinatorics of points and lines
LM Batten, LM Batten, A Beutelspacher
Cambridge University Press, 1993
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
E-commerce: protecting purchaser privacy to enforce trust
G Antoniou, L Batten
Electronic commerce research 11 (4), 421-456, 2011
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of information security and applications 36, 90-100, 2017
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
Algebraic Attacks over GF(q)
LM Batten
International Conference on Cryptology in India, 84-91, 2004
Fast algorithm for the cutting angle method of global optimization
LM Batten, G Beliakov
Journal of Global Optimization 24 (2), 149-161, 2002
Public key cryptography: applications and attacks
LM Batten
John Wiley & Sons, 2013
Games, graphs and circular arguments
DN Walton, LM Batten
Logique et Analyse 27 (106), 133-164, 1984
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
Determining sets
LM Batten
Australasian Journal of Combinatorics 22, 167-176, 2000
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ...
Proceedings of the ACM International Conference on Computing Frontiers, 461-466, 2016
Microsoft and Amazon: A comparison of approaches to cloud security
G Tajadod, L Batten, K Govinda
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Nordic Conference on Secure IT Systems, 176-188, 2011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20