default search action
Barry Irwin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [d2]Fabricio Bortoluzzi, Lucas Silvero Beiler, Barry Irwin, Carla M. Westphall:
Cloud Telescope Internet Background Radiation August 2023. IEEE DataPort, 2024 - [d1]Fabricio Bortoluzzi, Lucas Silvero Beiler, Barry Irwin, Carla M. Westphall:
Cloud Telescope Internet Background Radiation May 2023. IEEE DataPort, 2024 - 2023
- [c61]Fabricio Bortoluzzi, Barry Irwin, Lucas Silvero Beiler, Carla Merkle Westphall:
Cloud Telescope: A distributed architecture for capturing Internet Background Radiation. CloudNet 2023: 77-85
2010 – 2019
- 2019
- [j3]Sean Pennefather, Karen L. Bradshaw, Barry Irwin:
Design and Evaluation of Bulk Data Transfer Extensions for the NFComms Framework. South Afr. Comput. J. 31(2) (2019) - [c60]Stones Dalitso Chindipha, Barry Irwin, Alan Herbert:
Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets. SAICSIT 2019: 20:1-20:8 - 2018
- [c59]Sean Pennefather, Karen L. Bradshaw, Barry Irwin:
Exploration and Design of a Synchronous Message Passing Framework for a CPU-NPU Heterogeneous Architecture. IPDPS Workshops 2018: 46-56 - [c58]Gregory Linklater, Christian Smith, Alan Herbert, Barry Irwin:
Toward distributed key management for offline authentication. SAICSIT 2018: 10-19 - [c57]Sean Pennefather, Karen L. Bradshaw, Barry Irwin:
Extending the NFComms framework for bulk data transfers. SAICSIT 2018: 39-48 - 2017
- [c56]Ibraheem Frieslaar, Barry Irwin:
Investigating the Utilization of the Secure Hash Algorithm to Generate Electromagnetic Noise. ICSPS 2017: 164-169 - [c55]Ibraheem Frieslaar, Barry Irwin:
Investigating the electromagnetic side channel leakage from a Raspberry Pi. ISSA 2017: 24-31 - [c54]Sean Pennefather, Barry Irwin:
Design and application of link: A DSL for network frame manipulation. ISSA 2017: 48-55 - [c53]Javan Mnjama, Greg Foster, Barry Irwin:
A privacy and security threat assessment framework for consumer health wearables. ISSA 2017: 66-73 - [c52]Ibraheem Frieslaar, Barry Irwin:
Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable. SAICSIT 2017: 15:1-15:10 - 2016
- [j2]Ignatius Swart, Barry Irwin, Marthie Grobler:
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion. Int. J. Cyber Warf. Terror. 6(3): 17-30 (2016) - [c51]Ibraheem Frieslaar, Barry Irwin:
A Multi-threading approach to Secure VERIFYPIN. ICFSP 2016: 32-37 - [c50]Ibraheem Frieslaar, Barry Irwin:
Investigating Multi-Thread Utilization as a Software Defence Mechanism Against Side Channel Attacks. ICSPS 2016: 189-193 - [c49]Yusuf Moosa Motara, Barry Irwin:
SHA-1 and the Strict Avalanche Criterion. ISSA 2016: 35-40 - [c48]Johannes S. Vorster, Renier P. van Heerden, Barry Irwin:
The pattern-richness of Graphical passwords. ISSA 2016: 69-76 - [c47]Lauren Rudman, Barry Irwin:
Dridex: Analysis of the traffic and automatic generation of IOCs. ISSA 2016: 77-84 - [c46]Alan Herbert, Barry Irwin:
Adaptable exploit detection through scalable NetFlow analysis. ISSA 2016: 121-128 - [c45]Ibraheem Frieslaar, Barry Irwin:
Towards a Software Approach to Mitigate Correlation Power Analysis. SECRYPT 2016: 403-410 - [i1]Yusuf Motara, Barry Irwin:
SHA-1 and the Strict Avalanche Criterion. CoRR abs/1609.00616 (2016) - 2015
- [c44]Lauren Rudman, Barry V. W. Irwin:
Characterization and analysis of NTP amplification based DDoS attacks. ISSA 2015: 1-5 - [c43]Peter M. Wrench, Barry V. W. Irwin:
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis. ISSA 2015: 1-8 - 2014
- [c42]Renier van Heerden, Mercia M. Malan, Francois Mouton, Barry Irwin:
Human Perception of the Measurement of a Network Attack Taxonomy in Near Real-Time. HCC 2014: 280-292 - [c41]Jameel Haffejee, Barry Irwin:
Testing antivirus engines to determine their effectiveness as a security layer. ISSA 2014: 1-6 - [c40]Sean Pennefather, Barry Irwin:
An exploration of geolocation and traffic visualisation using network flows. ISSA 2014: 1-6 - [c39]Ignus P. Swart, Barry Irwin, Marthie Grobler:
Towards a platform to visualize the state of South Africa's information security. ISSA 2014: 1-8 - [c38]Peter M. Wrench, Barry Irwin:
Towards a sandbox for the deobfuscation and dissection of PHP malware. ISSA 2014: 1-8 - [c37]Ignus P. Swart, Barry Irwin, Marthie Grobler:
On the viability of pro-active automated PII breach detection: A South African case study. SAICSIT 2014: 251 - 2013
- [c36]Barry Irwin:
A baseline study of potentially malicious activity across five network telescopes. CyCon 2013: 1-17 - [c35]Alan Herbert, Barry Irwin:
A kernel-driven framework for high performance internet routing simulation. ISSA 2013: 1-6 - [c34]Samuel Oswald Hunter, Barry Irwin, Etienne Stalmans:
Real-time distributed malicious traffic monitoring for honeypots and network telescopes. ISSA 2013: 1-9 - [c33]Pierre Jacobs, Alapan Arnab, Barry Irwin:
Classification of Security Operation Centers. ISSA 2013: 1-7 - [c32]Alastair Nottingham, Barry Irwin:
A high-level architecture for efficient packet trace analysis on GPU co-processors. ISSA 2013: 1-8 - [c31]Ignus P. Swart, Marthie Grobler, Barry Irwin:
Visualization of a data leak. ISSA 2013: 1-8 - [c30]Alastair Nottingham, Barry Irwin:
Towards a GPU accelerated virtual machine for massively parallel packet classification and filtering. SAICSIT 2013: 27-36 - 2012
- [j1]Renier van Heerden, Barry Irwin, Ivan D. Burke, Louise Leenen:
A Computer Network Attack Taxonomy and Ontology. Int. J. Cyber Warf. Terror. 2(3): 12-25 (2012) - [c29]Renier van Heerden, Heloise Pieterse, Barry Irwin:
Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model. HCC 2012: 226-236 - [c28]Samuel O. Hunter, Etienne Stalmans, Barry Irwin, John Richter:
Remote fingerprinting and multisensor data fusion. ISSA 2012: 1-8 - [c27]Barry Irwin:
A network telescope perspective of the Conficker outbreak. ISSA 2012: 1-8 - [c26]Etienne Stalmans, Samuel O. Hunter, Barry Irwin:
Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains. ISSA 2012: 1-7 - [c25]Alastair Nottingham, John Richter, Barry Irwin:
CaptureFoundry: a GPU accelerated packet capture analysis tool. SAICSIT 2012: 343-352 - 2011
- [c24]Samuel O. Hunter, Barry Irwin:
Tartarus: A honeypot based malware tracking and mitigation framework. ISSA 2011 - 2010
- [c23]Alastair Nottingham, Barry Irwin:
Parallel packet classification using GPU co-processors. SAICSIT 2010: 231-241 - [c22]Bradley Cowie, Barry Irwin:
Data classification for artificial intelligence construct training to aid in network incident identification using network telescope data. SAICSIT 2010: 356-360
2000 – 2009
- 2009
- [c21]Richard J. Barnett, Barry Irwin:
A comparison of the resource requirements of SNORT and BRO in production networks. IADIS AC (2) 2009: 94-97 - [c20]Alastair Nottingham, Barry Irwin:
Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers. ISSA 2009: 99-116 - [c19]George-Christian Pranschke, Barry Irwin, Richard J. Barnett:
Automated Firewall Rule Set Generation Through Passive Traffic Inspection. ISSA 2009: 243-252 - [c18]Richard J. Barnett, Barry Irwin:
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems. ISSA 2009: 269-278 - [c17]Bradley Cowie, Barry Irwin, Richard J. Barnett:
Management, Processing and Analysis of Cryptographic Network Protocols. ISSA 2009: 479-488 - [c16]Fred Otten, Barry Irwin, Hannah Thinyane:
Evaluating text preprocessing to improve compression on maillogs. SAICSIT 2009: 44-53 - [c15]Alastair Nottingham, Barry Irwin:
GPU packet classification using OpenCL: a consideration of viable classification methods. SAICSIT 2009: 160-169 - 2008
- [c14]Richard J. Barnett, Barry Irwin:
Performance Effects of Concurrent Virtual Machine Execution in VMware Workstation 6. SCSS (2) 2008: 329-333 - [c13]Barry Irwin, Blake Friedman:
Spam Construction Trends. ISSA 2008: 1-12 - [c12]Richard J. Barnett, Barry Irwin:
Towards a taxonomy of network scanning techniques. SAICSIT 2008: 1-7 - 2007
- [c11]Nick Pilkington, Barry Irwin:
An Investigation into the Performance of General Sorting on Graphics Processing Units. SCSS (1) 2007: 360-365 - [c10]Barry Irwin, Nick Pilkington:
High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping. VizSEC 2007: 147-158 - [c9]Barry Irwin, Jean-Pierre van Riel:
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope. VizSEC 2007: 255-273 - 2006
- [c8]Jean-Pierre van Riel, Barry Irwin:
InetVis, a visual tool for network telescope traffic analysis. Afrigraph 2006: 85-89 - [c7]Bradley Clayton, Barry Irwin, Alfredo Terzoli:
Integrating Secure RTP into the Open Source VoIP PBX Asterisk. ISSA 2006: 1-12 - [c6]Fred Otten, Barry Irwin, Hannah Slay:
The Need for Centralised, Cross Platform Information Aggregation. ISSA 2006: 1-12 - [c5]Jean-Pierre van Riel, Barry Irwin:
Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot. ISSA 2006: 1-12 - [c4]Dominic White, Barry Irwin:
Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks? ISSA 2006: 1-18 - 2005
- [c3]Yusuf Motara, Barry Irwin:
In-Kernel Cryptographic Executable Verification. IFIP Int. Conf. Digital Forensics 2005: 303-313 - [c2]Russell Cloran, Barry Irwin:
Trust on the Web. ISSA 2005: 1-9 - [c1]Barry Irwin:
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams. ISSA 2005: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint