Lynn Batten
Lynn Batten
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Combinatorics of finite geometries
LM Batten, LM Batten
Cambridge University Press, 1997
2281997
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
2082013
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
1772010
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
1422008
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International Conference on Malicious and Unwanted Software …, 2009
1362009
The theory of finite linear spaces: combinatorics of points and lines
LM Batten, A Beutelspacher
Cambridge University Press, 2009
1202009
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
1012001
E-commerce: protecting purchaser privacy to enforce trust
G Antoniou, L Batten
Electronic commerce research 11 (4), 421, 2011
862011
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
862010
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
572012
Algebraic Attacks over GF(q)
LM Batten
International Conference on Cryptology in India, 84-91, 2004
542004
Fast algorithm for the cutting angle method of global optimization
LM Batten, G Beliakov
Journal of Global Optimization 24 (2), 149-161, 2002
492002
Games, graphs and circular arguments
DN Walton, LM Batten
Logique et Analyse 27 (106), 133-164, 1984
361984
Public key cryptography: applications and attacks
LM Batten
John Wiley & Sons, 2013
352013
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of information security and applications 36, 90-100, 2017
332017
Determining sets
LM Batten
Australasian Journal of Combinatorics 22, 167-176, 2000
332000
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Nordic Conference on Secure IT Systems, 176-188, 2011
312011
Detecting deception in online social networks
JS Alowibdi, UA Buy, SY Philip, L Stenneth
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
302014
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
302012
Microsoft and Amazon: A comparison of approaches to cloud security
G Tajadod, L Batten, K Govinda
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
262012
The system can't perform the operation now. Try again later.
Articles 1–20