Follow
Lynn Batten
Lynn Batten
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
3662013
Combinatorics of finite geometries
LM Batten
(No Title), 1997
2741997
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
2492010
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
1822008
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International conference on malicious and unwanted software …, 2009
1752009
The theory of finite linear spaces: combinatorics of points and lines
LM Batten, A Beutelspacher
(No Title), 1993
1431993
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
1132010
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1082001
E-commerce: protecting purchaser privacy to enforce trust
G Antoniou, L Batten
Electronic commerce research 11, 421-456, 2011
1062011
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of information security and applications 36, 90-100, 2017
882017
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
752012
Algebraic Attacks over GF(q)
LM Batten
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on …, 2005
642005
Public key cryptography: applications and attacks
LM Batten
John Wiley & Sons, 2013
572013
Fast algorithm for the cutting angle method of global optimization
LM Batten, G Beliakov
Journal of Global Optimization 24 (2), 149-161, 2002
492002
Games, graphs and circular arguments
DN Walton, LM Batten
Logique et Analyse 27 (106), 133-164, 1984
471984
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, ...
Proceedings of the ACM international conference on computing frontiers, 461-466, 2016
412016
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
412012
Microsoft and Amazon: A comparison of approaches to cloud security
G Tajadod, L Batten, K Govinda
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
362012
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Information Security Technology for Applications: 16th Nordic Conference on …, 2012
362012
Determining sets
LM Batten
Australasian Journal of Combinatorics 22, 167-176, 2000
342000
The system can't perform the operation now. Try again later.
Articles 1–20