Andrew Clark
Andrew Clark
Adjunct Associate Professor of Information Security, Queensland University of Technology
Verified email at qut.edu.au
Title
Cited by
Cited by
Year
Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark
computers & security 30 (6-7), 353-375, 2011
2982011
Heuristic design of cryptographically strong balanced Boolean functions
W Millan, A Clark, E Dawson
International conference on the theory and applications of cryptographic …, 1998
1671998
Optimisation heuristics for cryptology
AJ Clark
Queensland University of Technology, 1998
1111998
Smart hill climbing finds better boolean functions
W Millan, A Clark, E Dawson
Workshop on Selected Areas in Cryptology 1997, 50-63, 1997
1021997
Evolutionary heuristics for finding cryptographically strong S-boxes
W Millan, L Burnett, G Carter, A Clark, E Dawson
International Conference on Information and Communications Security, 263-274, 1999
961999
An effective genetic algorithm for finding highly nonlinear Boolean functions
W Millan, A Clark, E Dawson
International conference on information and communications security, 149-158, 1997
931997
Physical protection of cryptographic devices
AJ Clark
Workshop on the Theory and Application of of Cryptographic Techniques, 83-93, 1987
791987
Boolean function design using hill climbing methods
W Millan, A Clark, E Dawson
Australasian conference on information security and privacy, 1-11, 1999
671999
A correlation method for establishing provenance of timestamps in digital evidence
B Schatz, G Mohay, A Clark
digital investigation 3, 98-107, 2006
652006
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
652000
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
R Gill, J Smith, A Clark
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
632006
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks
M Kiani, A Clark, G Mohay
2008 Third International Conference on Availability, Reliability and …, 2008
622008
Specification-based intrusion detection in WLANs
R Gill, J Smith, A Clark
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 141-152, 2006
592006
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
582002
Modern optimisation algorithms for cryptanalysis
A Clark
Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information …, 1994
571994
Optimisation heuristics for the automated cryptanalysis of classical ciphers
A Clark, E Dawson
Journal of Combinatorial Mathematics and Combinatorial Computing 28, 63-86, 1998
541998
Generalized inversion attack on nonlinear filter generators
JD Golic, A Clark, E Dawson
IEEE Transactions on computers 49 (10), 1100-1109, 2000
512000
Rich event representation for computer forensics
B Schatz, G Mohay, A Clark
Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management …, 2004
472004
A novel sliding window based change detection algorithm for asymmetric traffic
E Ahmed, A Clark, G Mohay
2008 IFIP International Conference on Network and Parallel Computing, 168-175, 2008
462008
A technique for detecting new attacks in low-interaction honeypot traffic
S Almotairi, A Clark, G Mohay, J Zimmermann
2009 Fourth International Conference on Internet Monitoring and Protection, 7-13, 2009
422009
The system can't perform the operation now. Try again later.
Articles 1–20