Andrew Clark
Andrew Clark
Adjunct Associate Professor of Information Security, Queensland University of Technology
Verified email at qut.edu.au
Title
Cited by
Cited by
Year
Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark
computers & security 30 (6-7), 353-375, 2011
3152011
Heuristic design of cryptographically strong balanced Boolean functions
W Millan, A Clark, E Dawson
International conference on the theory and applications of cryptographic …, 1998
1741998
Optimisation heuristics for cryptology
AJ Clark
Queensland University of Technology, 1998
1161998
Smart hill climbing finds better boolean functions
W Millan, A Clark, E Dawson
Workshop on Selected Areas in Cryptology 1997, 50-63, 1997
1021997
Evolutionary heuristics for finding cryptographically strong S-boxes
W Millan, L Burnett, G Carter, A Clark, E Dawson
International Conference on Information and Communications Security, 263-274, 1999
981999
An effective genetic algorithm for finding highly nonlinear Boolean functions
W Millan, A Clark, E Dawson
International conference on information and communications security, 149-158, 1997
931997
Search for the Decays and in CDF Run II
T Aaltonen, J Adelman, T Akimoto, BÁ González, S Amerio, D Amidei, ...
Physical review letters 102 (20), 201801, 2009
922009
Physical protection of cryptographic devices
AJ Clark
Workshop on the Theory and Application of of Cryptographic Techniques, 83-93, 1987
811987
Search for and Decays in Collisions with CDF II
A Abulencia, D Acosta, J Adelman, T Affolder, T Akimoto, MG Albrow, ...
Physical review letters 95 (22), 221805, 2005
732005
Boolean function design using hill climbing methods
W Millan, A Clark, E Dawson
Australasian conference on information security and privacy, 1-11, 1999
691999
Measurement of the -hadron production cross section using decays to final states in collisions at
T Aaltonen, J Adelman, T Akimoto, BA Gonzalez, S Amerio, D Amidei, ...
Physical Review D 79 (9), 092003, 2009
672009
A correlation method for establishing provenance of timestamps in digital evidence
B Schatz, G Mohay, A Clark
digital investigation 3, 98-107, 2006
662006
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
662000
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks
M Kiani, A Clark, G Mohay
2008 Third International Conference on Availability, Reliability and …, 2008
642008
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
R Gill, J Smith, A Clark
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
632006
Specification-based intrusion detection in WLANs
R Gill, J Smith, A Clark
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 141-152, 2006
602006
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
592002
Modern optimisation algorithms for cryptanalysis
A Clark
Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information …, 1994
591994
Optimisation heuristics for the automated cryptanalysis of classical ciphers
A Clark, E Dawson
Journal of Combinatorial Mathematics and Combinatorial Computing 28, 63-86, 1998
561998
Generalized inversion attack on nonlinear filter generators
JD Golic, A Clark, E Dawson
IEEE Transactions on computers 49 (10), 1100-1109, 2000
522000
The system can't perform the operation now. Try again later.
Articles 1–20