Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0803 Computer Software > 080303 Computer System Security"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | C | M | S | T | W | Z
Number of items at this level: 18.

B

Balingit, Rodel, Trevathan, Jarrod, and Read, Wayne (2009) Analysing bidding trends in online auctions. In: Proceedings of the 2009 Sixth International Conference on Information Technology: new generations. pp. 928-933. From: Sixth International Conference on Information Technology: new generations, 27-29 April 2009, Las Vegas, Nevada, USA.

C

Chen, Chao, Zhang, Jun, Chen, Xiao, Xiang, Yang, and Zhou, Wanlei (2015) 6 million spam tweets: a large ground truth for timely Twitter spam detection. In: Proceedings of the IEEE International Conference on Communications. pp. 7065-7070. From: ICC 2015: IEEE International Conference on Communications, 8-12 June 2015, London, UK.

Chen, Chao, Zhang, Jun, Xiang, Yang, and Zhou, Wanlei (2015) Asymmetric self-learning for tackling Twitter spam drift. In: Proceedings of the IEEE Conference on Computer Communications Workshops. pp. 208-213. From: INFOCOM WKSHPS 2015: IEEE Conference on Computer Communications Workshops, 26 April - 1 May 2015, Hong Kong.

Chen, Chao, Zhang, Jun, Xie, Yi, Xiang, Yang, Zhou, Wanlei, Hassan, Mohammad Mehedi, AlElaiwi, Abdulhameed, and Alrubaian, Majed (2015) A performance evaluation of machine learning-based streaming spam tweets detection. IEEE Transactions on Computational Social Systems, 2 (3). pp. 65-76.

M

McCabe, Alan, and Trevathan, Jarrod (2009) Handwritten signature verification using complementary statistical models. Journal of Computers, 4 (7). pp. 670-680.

S

Shah, Ripan, Trevathan, Jarrod, Read, Wayne, and Ghodosi, Hossein (2009) A proactive approach to preventing phishing attacks using a Pshark. In: Proceedings of the Sixth International Conference on Information Technology. pp. 915-921. From: Sixth International Conference on Information Technology, 27-29 April 2009, Nevada, USA.

T

Trevathan, Jarrod, Read, Wayne, Ghodosi, Hossein, and Atkinson, Ian (2011) Privacy and anonymity in untrusted data stores. In: Conferences in Research and Practice in Information Technology (115) pp. 75-84. From: ADC 2011 22nd Australasian Database Conference, January 17 - 20 2011, Perth, WA, Australia.

Trevathan, Jarrod, McCabe, Alan, and Read, Wayne (2009) Online payments using handwritten signature verification. In: Proceedings of the 2009 Sixth International Conference on Information Technology: new generations. pp. 901-907. From: 2009 Sixth International Conference on Information Technology: new generations, 27-29 April 2009, Las Vegas, Nevada, USA.

Trevathan, Jarrod, Read, Wayne, and Goel, Rajni (2008) Online auction deception using a shill bidding agent. Journal of Scientific and Practical Computing, 2 (2). pp. 23-38.

W

Wang, Yu, Chen, Chao, and Xiang, Yang (2015) Unknown pattern extraction for statistical network protocol identification. In: Proceedings of the IEEE Conference on Local Computer Networks. pp. 506-509. From: LCN 2015: 40th IEEE Conference on Local Computer Networks, 26-29 October 2016, Clearwater Beach, FL, USA.

Wen, Sheng, Haghighi, Mohammad Sayad, Chen, Chao, Xiang, Yang, Zhou, Wanlei, and Jia, Weijia (2015) A sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Transactions on Computers, 64. pp. 640-653.

Wu, Di, Chen, Xiao, Chen, Chao, Zhang, Jun, Xiang, Yang, and Zhou, Wanlei (2014) On addressing the imbalance problem: a correlated KNN approach for network traffic classification. In: Lecture Notes in Computer Science (8792) pp. 138-151. From: NSS 2014: 8th International Conference on Network and System Security, 15-17 October 2014, Xi'an, China.

Z

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei, and Xiang, Yong (2013) Internet traffic classification by aggregating correlated naive Bayes predictions. IEEE Transactions on Information Forensics and Security, 8 (1). pp. 5-15.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2013) Robust network traffic identification with unknown applications. In: Proceedings of the 8th ACM SIGSAC symposium on Information, Computer and Communications Security. pp. 405-414. From: ASIA CCS 2013: 8th ACM SIGSAC symposium on Information, Computer and Communications Security, 8-10 May 2013, Hanzhou, China.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2013) Semi-supervised and compound classification of network traffic. In: International Conference on Distributed Computing Systems Workshops. pp. 617-621. From: 2012 32nd International Conference on Distributed Computing Systems Workshops, 18-21 June 2012, Macau, China.

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei, and Vasilakos, Athanasios V. (2013) An effective network traffic classification method with unknown flow detection. IEEE Transactions on Network and Service Management, 10 (2). pp. 133-147.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2012) Classification of correlated Internet traffic flows. In: Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications. pp. 490-496. From: TrustCom 2012: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 25-27 June 2012, Liverpool, UK.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2012) Semi-supervised and compound classification of network traffic. In: Proceedings of the 32nd Internation Conference on Distributed Computing Systems Workshops. pp. 617-621. From: ICDCSW 2012: 32nd International Conference on Distributed Computing Systems Workshops, 18-21 June 2012, Macua, China.

This list was generated on Mon Aug 15 22:59:21 2022 AEST.