Lynn Batten
Lynn Batten
Verified email at
Cited by
Cited by
Combinatorics of finite geometries
LM Batten, LM Batten
Cambridge University Press, 1997
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International Conference on Malicious and Unwanted Software …, 2009
The theory of finite linear spaces: combinatorics of points and lines
LM Batten, A Beutelspacher
Cambridge University Press, 2009
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
E-commerce: protecting purchaser privacy to enforce trust
G Antoniou, L Batten
Electronic commerce research 11 (4), 421, 2011
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
Algebraic Attacks over GF(q)
LM Batten
International Conference on Cryptology in India, 84-91, 2004
Fast algorithm for the cutting angle method of global optimization
LM Batten, G Beliakov
Journal of Global Optimization 24 (2), 149-161, 2002
Public key cryptography: applications and attacks
LM Batten
John Wiley & Sons, 2013
Games, graphs and circular arguments
DN Walton, LM Batten
Logique et Analyse 27 (106), 133-164, 1984
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of information security and applications 36, 90-100, 2017
Determining sets
LM Batten
Australasian Journal of Combinatorics 22, 167-176, 2000
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Nordic Conference on Secure IT Systems, 176-188, 2011
Detecting deception in online social networks
JS Alowibdi, UA Buy, SY Philip, L Stenneth
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
Microsoft and Amazon: A comparison of approaches to cloud security
G Tajadod, L Batten, K Govinda
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20