Andrew Clark
Andrew Clark
Adjunct Associate Professor of Information Security, Queensland University of Technology
Verified email at
Cited by
Cited by
Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark
computers & security 30 (6-7), 353-375, 2011
Heuristic design of cryptographically strong balanced Boolean functions
W Millan, A Clark, E Dawson
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
A study of the histology and morphology of the digestive tract of the common eel (Anguilla anguilla)
AJ Clarke, DM Witcomb
Journal of Fish Biology 16 (2), 159-170, 1980
Optimisation heuristics for cryptology
AJ Clark
Queensland University of Technology, 1998
An effective genetic algorithm for finding highly nonlinear Boolean functions
W Millan, A Clark, E Dawson
Information and Communications Security: First International Conference …, 1997
Smart hill climbing finds better boolean functions
W Millan, A Clark, E Dawson
Workshop on Selected Areas in Cryptology 63, 1997
Evolutionary heuristics for finding cryptographically strong S-boxes
W Millan, L Burnett, G Carter, A Clark, E Dawson
Information and Communication Security: Second International Conference …, 1999
Physical protection of cryptographic devices
AJ Clark
Advances in Cryptology—EUROCRYPT’87: Workshop on the Theory and Application …, 1988
The LILI-128 keystream generator
E Dawson, A Clark, J Golic, W Millan, L Penna, L Simpson
Proceedings of first NESSIE Workshop, 2000
Boolean function design using hill climbing methods
W Millan, A Clark, E Dawson
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
A correlation method for establishing provenance of timestamps in digital evidence
B Schatz, G Mohay, A Clark
digital investigation 3, 98-107, 2006
Evaluation of anomaly based character distribution models in the detection of SQL injection attacks
M Kiani, A Clark, G Mohay
2008 Third International Conference on Availability, Reliability and …, 2008
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
R Gill, J Smith, A Clark
Proceedings of the 2006 Australasian workshops on Grid computing and e …, 2006
Modern optimisation algorithms for cryptanalysis
A Clark
Proceedings of ANZIIS'94-Australian New Zealnd Intelligent Information …, 1994
The LILI-II keystream generator
A Clark, E Dawson, J Fuller, J Golić, HJ Lee, W Millan, SJ Moon, ...
Information Security and Privacy: 7th Australasian Conference, ACISP 2002 …, 2002
Generalized inversion attack on nonlinear filter generators
JD Golic, A Clark, E Dawson
IEEE Transactions on computers 49 (10), 1100-1109, 2000
Optimisation heuristics for the automated cryptanalysis of classical ciphers
A Clark, E Dawson
Journal of Combinatorial Mathematics and Combinatorial Computing 28, 63-86, 1998
A novel sliding window based change detection algorithm for asymmetric traffic
E Ahmed, A Clark, G Mohay
2008 IFIP International Conference on Network and Parallel Computing, 168-175, 2008
Specification-based intrusion detection in WLANs
R Gill, J Smith, A Clark
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 141-152, 2006
Rich event representation for computer forensics
B Schatz, G Mohay, A Clark
Proceedings of the Fifth Asia-Pacific Industrial Engineering and Management …, 2004
The system can't perform the operation now. Try again later.
Articles 1–20