default search action
Andrew J. Clark
Person information
- affiliation: Information Security Institute, Queensland University of Technology (QUT), Brisbane, Queensland, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i1]Andrew J. Clark, Stuart R. Phinn, Peter F. Scarth:
Pre-processing training data improves accuracy and generalisability of convolutional neural network based landscape semantic segmentation. CoRR abs/2304.14625 (2023)
2010 – 2019
- 2013
- [p1]Lyta Penna, Andrew J. Clark, George M. Mohay:
Enhancing Child Safety in MMOGs. The Influence of Technology on Social Network Analysis and Mining 2013: 471-495 - 2011
- [j16]Jonathan J. Davis, Andrew J. Clark:
Data preprocessing for anomaly based network intrusion detection: A review. Comput. Secur. 30(6-7): 353-375 (2011) - [j15]Andrew Marrington, Ibrahim M. Baggili, George M. Mohay, Andrew J. Clark:
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines. Digit. Investig. 8(Supplement): S52-S61 (2011) - [c45]Malcolm Corney, George M. Mohay, Andrew J. Clark:
Detection of Anomalies from User Profiles Generated from System Logs. AISC 2011: 23-32 - [c44]Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu:
Defending Web Services against Denial of Service Attacks Using Client Puzzles. ICWS 2011: 25-32 - [c43]Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:
Detecting Collusive Fraud in Enterprise Resource Planning Systems. IFIP Int. Conf. Digital Forensics 2011: 143-153 - [c42]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed:
User-representative feature selection for keystroke dynamics. NSS 2011: 229-233 - 2010
- [j14]Valérie Viet Triem Tong, Andrew J. Clark, Ludovic Mé:
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 56-71 (2010) - [c41]Andrew Marrington, George M. Mohay, Hasmukh Morarji, Andrew J. Clark:
A Model for Computer Profiling. ARES 2010: 635-640 - [c40]Lyta Penna, Andrew J. Clark, George M. Mohay:
A Framework for Improved Adolescent and Child Safety in MMOs. ASONAM 2010: 33-40 - [c39]Desmond Allan Schmidt, Suriadi Suriadi, Alan Tickle, Andrew J. Clark, George M. Mohay, Ejaz Ahmed, James Mackie:
A Distributed Denial of Service Testbed. HCC 2010: 338-349 - [c38]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Asadul K. Islam:
Continuous Biometric Authentication: Can It Be More Practical? HPCC 2010: 647-652 - [c37]Andrew White, Alan Tickle, Andrew J. Clark:
Overcoming Reputation and Proof-of-Work Systems in Botnets. NSS 2010: 120-127 - [c36]Suriadi Suriadi, Andrew J. Clark, Desmond Allan Schmidt:
Validating Denial of Service Vulnerabilities in Web Services. NSS 2010: 175-182 - [c35]Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:
Fraud Detection in ERP Systems Using Scenario Matching. SEC 2010: 112-123
2000 – 2009
- 2009
- [c34]Sriram Raghavan, Andrew J. Clark, George M. Mohay:
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. e-Forensics 2009: 83-94 - [c33]Ejaz Ahmed, Andrew J. Clark, George M. Mohay:
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. NordSec 2009: 104-119 - 2008
- [c32]Mehdi Kiani, Andrew J. Clark, George M. Mohay:
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. ARES 2008: 47-55 - [c31]Saleh I. Almotairi, Andrew J. Clark, George M. Mohay, Jacob Zimmermann:
Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component Analysis. NPC Workshops 2008: 147-154 - [c30]Ejaz Ahmed, Andrew J. Clark, George M. Mohay:
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic. NPC Workshops 2008: 168-175 - 2007
- [e2]Christopher Krügel, Richard Lippmann, Andrew J. Clark:
Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings. Lecture Notes in Computer Science 4637, Springer 2007, ISBN 978-3-540-74319-4 [contents] - 2006
- [j13]Bradley L. Schatz, George M. Mohay, Andrew J. Clark:
A correlation method for establishing provenance of timestamps in digital evidence. Digit. Investig. 3(Supplement): 98-107 (2006) - [c29]Rupinder Gill, Jason Smith, Andrew J. Clark:
Specification-Based Intrusion Detection in WLANs. ACSAC 2006: 141-152 - [c28]David Duncombe, George M. Mohay, Andrew J. Clark:
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. ACSW 2006: 135-144 - [c27]Rupinder Gill, Jason Smith, Andrew J. Clark:
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. ACSW 2006: 221-230 - [c26]Jonathon Abbott, Jim Bell, Andrew J. Clark, Olivier Y. de Vel, George M. Mohay:
Automated recognition of event scenarios for digital forensics. SAC 2006: 293-300 - 2005
- [c25]Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, John Hynd:
An Improved Execution Integrity Solution for Mobile Agents. ACISP 2005: 170-183 - [c24]Stig Andersson, Andrew J. Clark, George M. Mohay, Bradley L. Schatz, Jacob Zimmermann:
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. ACSAC 2005: 49-58 - [c23]Jacob Zimmermann, Andrew J. Clark, George M. Mohay, Fabien Pouget, Marc Dacier:
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. SADFE 2005: 89-104 - [c22]Lyta Penna, Andrew J. Clark, George M. Mohay:
Challenges of Automating the Detection of Paedophile Activity on the Internet. SADFE 2005: 206-222 - 2004
- [j12]L. Burnett, William Millan, Ed Dawson, Andrew J. Clark:
Simpler methods for generating better Boolean functions with good cryptographic properties. Australas. J Comb. 29: 231-248 (2004) - [j11]Andrew J. Clark, Herbert E. Scarf:
Optimal Policies for a Multi-Echelon Inventory Problem. Manag. Sci. 50(12-Supplement): 1782-1790 (2004) - [j10]Andrew J. Clark:
Comments on "Optimal Policies for a Multi-Echelon Inventory Problem". Manag. Sci. 50(12-Supplement): 1794-1795 (2004) - [c21]Bradley L. Schatz, George M. Mohay, Andrew J. Clark:
Generalising Event Forensics Across Multiple Domains. Australian Computer, Network & Information Forensics Conference 2004: 136-144 - [c20]Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew J. Clark:
A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. Cryptographic Algorithms and their Uses 2004: 125-139 - [c19]Jason Reid, Andrew J. Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan:
Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237 - [c18]Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. ICICS 2004: 343-357 - [c17]Chris Wullems, Mark Looi, Andrew J. Clark:
Towards Context-aware Security: An Authorization Architecture for Intranet Environments. PerCom Workshops 2004: 132-137 - 2003
- [c16]Nathan Carey, George M. Mohay, Andrew J. Clark:
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. ACSAC 2003: 245-254 - [c15]George M. Mohay, Kevin Chen, Andrew J. Clark:
ECF - Event Correlation for Forensics. Australian Computer, Network & Information Forensics Conference 2003 - [c14]Chris Wullems, Mark Looi, Andrew J. Clark:
Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. ISCC 2003: 1251-1258 - 2002
- [j9]Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson:
Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) - [c13]Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee, William Millan, Sang-Jae Moon, Leonie Simpson:
The LILI-II Keystream Generator. ACISP 2002: 25-39 - [c12]Nathan Carey, Andrew J. Clark, George M. Mohay:
IDS Interoperability and Correlation Using IDMEF and Commodity Systems. ICICS 2002: 252-264 - 2000
- [j8]Ed Dawson, Andrew J. Clark, Mark Looi:
Key management in a non-trusted distributed environment. Future Gener. Comput. Syst. 16(4): 319-329 (2000) - [j7]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Generalized Inversion Attack on Nonlinear Filter Generators. IEEE Trans. Computers 49(10): 1100-1109 (2000) - [c11]Agung Budi Prasetijo, Paul Ashley, Mark Looi, Andrew J. Clark, Gary Gaskell:
A Three-Party HTTP Proxy to Support Internet Content Regulation. ACISP 2000: 89-96 - [c10]Lauren May, Lyta Penna, Andrew J. Clark:
An Implementation of Bitsliced DES on the Pentium MMXTM Processor. ACISP 2000: 112-122 - [e1]Ed Dawson, Andrew J. Clark, Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1841, Springer 2000, ISBN 3-540-67742-9 [contents]
1990 – 1999
- 1999
- [j6]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Inversion Attack and Branching. Aust. Comput. J. 31(2): 44-53 (1999) - [c9]William Millan, Andrew J. Clark, Ed Dawson:
Boolean Function Design Using Hill Climbing Methods. ACISP 1999: 1-11 - [c8]Jovan Dj. Golic, Andrew J. Clark, Ed Dawson:
Inversion Attack and Branching. ACISP 1999: 88-102 - [c7]William Millan, L. Burnett, Gary Carter, Andrew J. Clark, Ed Dawson:
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. ICICS 1999: 263-274 - 1998
- [c6]William Millan, Andrew J. Clark, Ed Dawson:
Heuristic Design of Cryptographically Strong Balanced Boolean Functions. EUROCRYPT 1998: 489-499 - 1997
- [j5]Andrew J. Clark:
Key recovery - why, how, who?. Comput. Secur. 16(8): 669-674 (1997) - [j4]Andrew J. Clark, Ed Dawson:
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher. Cryptologia 21(2): 129-138 (1997) - [c5]William Millan, Andrew J. Clark, Ed Dawson:
An effective genetic algorithm for finding highly nonlinear Boolean Functions. ICICS 1997: 149-158 - 1996
- [j3]Andrew J. Clark:
Cryptographic controls - the eternal triangle, . Comput. Secur. 15(7): 576-584 (1996) - [j2]Andrew J. Clark, Ed Dawson, Helen Bergen:
Combinatorial Optimization and the Knapsack Cipher. Cryptologia 20(1): 85-93 (1996) - [c4]Andrew J. Clark, Jovan Dj. Golic, Ed Dawson:
A Comparison of Fast Correlation Attacks. FSE 1996: 145-157 - 1995
- [c3]Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew J. Clark, Abdollah Khodkar, Ed Dawson:
Discrete Optimisation and Fast Correlation Attacks. Cryptography: Policy and Algorithms 1995: 186-200 - 1994
- [j1]Ed Dawson, Andrew J. Clark:
Divide and Conquer Attacks on Certain Classes of Stream Ciphers. Cryptologia 18(1): 25-40 (1994) - [c2]Gary Carter, Andrew J. Clark, Lauren Nielsen:
DESV-1: A Variation of the Data Encryption Standard (DES). ASIACRYPT 1994: 427-430
1980 – 1989
- 1987
- [c1]Andrew J. Clark:
Physical Protection of Cryptographic Devices. EUROCRYPT 1987: 83-93
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint