Andrew Clark
Andrew Clark
Adjunct Associate Professor of Information Security, Queensland University of Technology
Verified email at
Cited by
Cited by
Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark
computers & security 30 (6-7), 353-375, 2011
Heuristic design of cryptographically strong balanced Boolean functions
W Millan, A Clark, E Dawson
International conference on the theory and applications of cryptographic …, 1998
Optimisation heuristics for cryptology
AJ Clark
Queensland University of Technology, 1998
Smart hill climbing finds better boolean functions
W Millan, A Clark, E Dawson
Workshop on Selected Areas in Cryptology 1997, 50-63, 1997
Evolutionary heuristics for finding cryptographically strong S-boxes
W Millan, L Burnett, G Carter, A Clark, E Dawson
International Conference on Information and Communications Security, 263-274, 1999
An effective genetic algorithm for finding highly nonlinear Boolean functions
W Millan, A Clark, E Dawson
International conference on information and communications security, 149-158, 1997
Search for the Decays and in CDF Run II
T Aaltonen, J Adelman, T Akimoto, BÁ González, S Amerio, D Amidei, ...
Physical review letters 102 (20), 201801, 2009
Physical protection of cryptographic devices
AJ Clark
Workshop on the Theory and Application of of Cryptographic Techniques, 83-93, 1987
Search for and Decays in Collisions with CDF II
A Abulencia, D Acosta, J Adelman, T Affolder, T Akimoto, MG Albrow, ...
Physical review letters 95 (22), 221805, 2005
Boolean function design using hill climbing methods
W Millan, A Clark, E Dawson
Australasian conference on information security and privacy, 1-11, 1999
Measurement of the -hadron production cross section using decays to final states in collisions at
T Aaltonen, J Adelman, T Akimoto, BA Gonzalez, S Amerio, D Amidei, ...
Physical Review D 79 (9), 092003, 2009
A correlation method for establishing provenance of timestamps in digital evidence
B Schatz, G Mohay, A Clark
digital investigation 3, 98-107, 2006
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks
M Kiani, A Clark, G Mohay
2008 Third International Conference on Availability, Reliability and …, 2008
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
R Gill, J Smith, A Clark
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
Specification-based intrusion detection in WLANs
R Gill, J Smith, A Clark
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 141-152, 2006
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
Modern optimisation algorithms for cryptanalysis
A Clark
Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information …, 1994
Optimisation heuristics for the automated cryptanalysis of classical ciphers
A Clark, E Dawson
Journal of Combinatorial Mathematics and Combinatorial Computing 28, 63-86, 1998
Generalized inversion attack on nonlinear filter generators
JD Golic, A Clark, E Dawson
IEEE Transactions on computers 49 (10), 1100-1109, 2000
The system can't perform the operation now. Try again later.
Articles 1–20