Andrew Clark
Andrew Clark
Adjunct Associate Professor of Information Security, Queensland University of Technology
Verified email at
Cited by
Cited by
Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark
computers & security 30 (6-7), 353-375, 2011
Heuristic design of cryptographically strong balanced Boolean functions
W Millan, A Clark, E Dawson
International conference on the theory and applications of cryptographic …, 1998
Optimisation heuristics for cryptology
AJ Clark
Queensland University of Technology, 1998
Smart hill climbing finds better boolean functions
W Millan, A Clark, E Dawson
Workshop on Selected Areas in Cryptology 1997, 50-63, 1997
Evolutionary heuristics for finding cryptographically strong S-boxes
W Millan, L Burnett, G Carter, A Clark, E Dawson
International Conference on Information and Communications Security, 263-274, 1999
An effective genetic algorithm for finding highly nonlinear Boolean functions
W Millan, A Clark, E Dawson
International conference on information and communications security, 149-158, 1997
Physical protection of cryptographic devices
AJ Clark
Workshop on the Theory and Application of of Cryptographic Techniques, 83-93, 1987
Boolean function design using hill climbing methods
W Millan, A Clark, E Dawson
Australasian conference on information security and privacy, 1-11, 1999
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
A correlation method for establishing provenance of timestamps in digital evidence
B Schatz, G Mohay, A Clark
digital investigation 3, 98-107, 2006
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
R Gill, J Smith, A Clark
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks
M Kiani, A Clark, G Mohay
2008 Third International Conference on Availability, Reliability and …, 2008
Specification-based intrusion detection in WLANs
R Gill, J Smith, A Clark
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 141-152, 2006
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Australasian Conference on Information Security and Privacy, 25-39, 2002
Modern optimisation algorithms for cryptanalysis
A Clark
Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information …, 1994
Optimisation heuristics for the automated cryptanalysis of classical ciphers
A Clark, E Dawson
Journal of Combinatorial Mathematics and Combinatorial Computing 28, 63-86, 1998
Generalized inversion attack on nonlinear filter generators
JD Golic, A Clark, E Dawson
IEEE Transactions on computers 49 (10), 1100-1109, 2000
Rich event representation for computer forensics
B Schatz, G Mohay, A Clark
Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management …, 2004
A novel sliding window based change detection algorithm for asymmetric traffic
E Ahmed, A Clark, G Mohay
2008 IFIP International Conference on Network and Parallel Computing, 168-175, 2008
A technique for detecting new attacks in low-interaction honeypot traffic
S Almotairi, A Clark, G Mohay, J Zimmermann
2009 Fourth International Conference on Internet Monitoring and Protection, 7-13, 2009
The system can't perform the operation now. Try again later.
Articles 1–20