Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0803 Computer Software > 080303 Computer System Security"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | M | S | T
Number of items at this level: 6.

B

Balingit, Rodel, Trevathan, Jarrod, and Read, Wayne (2009) Analysing bidding trends in online auctions. In: Proceedings of the 2009 Sixth International Conference on Information Technology: new generations, pp. 928-933. From: Sixth International Conference on Information Technology: new generations, 27-29 April 2009, Las Vegas, Nevada, USA.

M

McCabe, Alan, and Trevathan, Jarrod (2009) Handwritten signature verification using complementary statistical models. Journal of Computers, 4 (7). pp. 670-680.

S

Shah, Ripan, Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2009) A proactive approach to preventing phishing attacks using a Pshark. In: Proceedings of the Sixth International Conference on Information Technology , pp. 915-921. From: Sixth International Conference on Information Technology , 27-29 April 2009, Nevada, USA.

T

Trevathan, Jarrod, Read, Wayne, Ghodosi, Hossein, and Atkinson, Ian (2011) Privacy and anonymity in untrusted data stores. In: Conferences in Research and Practice in Information Technology (115), pp. 75-84. From: ADC 2011 22nd Australasian Database Conference, January 17 - 20 2011, Perth, WA, Australia.

Trevathan, Jarrod, McCabe, Alan, and Read, Wayne (2009) Online payments using handwritten signature verification. In: Proceedings of the 2009 Sixth International Conference on Information Technology: new generations, pp. 901-907. From: 2009 Sixth International Conference on Information Technology: new generations, 27-29 April 2009, Las Vegas, Nevada, USA.

Trevathan, Jarrod, Read, Wayne, and Goel, Rajni (2008) Online auction deception using a shill bidding agent. Journal of Scientific and Practical Computing, 2 (2). pp. 23-38.

This list was generated on Thu Apr 24 22:26:35 2014 EST.