Prof Lynn Batten

STAFF PROFILE

Position

Chair In Mathematics

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Publications

Filter by

2017

Cyber security attacks to modern vehicular systems

L Pan, X Zheng, H Chen, H Luan, H Bootwala, L Batten

(2017), Vol. 36, pp. 90-100, Journal of information security and applications, Amsterdam, The Netherlands, C1

journal
2016

New directions in IoT privacy using attribute-based authentication

G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, I Natgunanathan

(2016), pp. 461-466, 2016 ACM International Conference on Computing Frontiers Proceedings, Como, Italy, E1

conference

A new sign-change attack on the Montgomery ladders

L Batten, M Amain

(2016), Vol. 651, pp. 3-14, ATIS 2016 : Proceedings of the 6th International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Mobile money in the Australasian region - a technical security perspective

S Parasa, L Batten

(2016), Vol. 651, pp. 154-162, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference
2015

Novel approach for information discovery in autonomous wireless sensor networks

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

chapter

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

S Ballesteros, L Pan, L Batten, G Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1

conference

Smartphone applications, malware and data theft

L Batten, V Moonsamy, M Alazab

(2015), Vol. 412, pp. 15-24, ICC3 : Proceedings of the 2nd International Conference on Computational Intelligence, Cyber Security & Computational Models, Coimbatore, Tamil Nadu, India, B1-1

chapter

Cryptographic public key length prediction

M Amain, L Batten

(2015), Vol. 557, pp. 27-35, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1

chapter

Survey in smartphone malware analysis techniques

M Alazab, L Batten

(2015), pp. 105-130, New threats and countermeasures in digital crime and cyber terrorism, Hershey, Pa., B1

chapter

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs

Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), pp. 88-93, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1

conference

Cloud omnibus system for evaluating cloud market services

W Priyardarshani, L Batten, G Wikramanayake, A Kelarev

(2015), Vol. 4, pp. 335-352, International journal of cloud computing, Olney, Eng., C1

journal
2014

vPELS : An e-learning social environment for VLSI design with content security using DRM

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1

journal

An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones

Y Rahulamathavan, V Moonsamy, L Batten, S Shunliang, M Rajarajan

(2014), Vol. 8544, pp. 430-437, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

chapter

The 0-1 Knapsack polytope - a starting point for cryptanalysis of Knapsack ciphers?

V Mak-Hau, L Batten

(2014), Vol. 490, pp. 171-182, Communications in Computer and Information Science, Berlin, Germany, B1

chapter

Android applications: data leaks via advertising libraries

V Moonsamy, L Batten

(2014), pp. 314-317, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1

conference

A solution for privacy-preserving, remote access to sensitive data

K Singh, J Zhong, L Batten, P Bertok

(2014), pp. 309-313, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1

conference

Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL Pinning and DNSSec

V Moonsamy, L Batten

(2014), pp. 5-13, Proceedings of the 12th Australian Information Security Management Conference, Perth, WA, E1

conference

Sharing sensitive medical data sets for research purposes - a case study

K Singh, J Rong, L Batten

(2014), pp. 555-562, DSAA 2014 : Proceedings of the International Data Science and Advanced Analytics Conference, Shanghai, China, E1

conference

PELS: A noble architecture and framework for a personal E-learning system (PELS)

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1

journal

Energy efficient information discovery approach for range queries in multi-dimensional WSNs

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1

conference
2013

Classification of malware based on integrated static and dynamic features

R Islam, R Tian, L Batten, S Versteeg

(2013), Vol. 36, pp. 646-656, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

eLearning content authentication using bipartite matching

J Dewan, M Chowdhury, L Batten

(2013), pp. 51-55, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Honolulu, Hawaii, E1

conference

An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents

J Dewan, M Chowdhury, L Batten

(2013), Vol. 10, pp. 236-241, E-Learning and digital media, Oxford, England, C1

journal

Information discovery in multidimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1

conference

An attack-resistant hybrid data-privatization method with low information loss

K Singh, L Batten

(2013), pp. 263-271, Trust management VII, Berlin, Germany, B1

chapter

Contrasting permission patterns between clean and malicious android applications

V Moonsamy, J Rong, S Liu, G Li, L Batten

(2013), pp. 69-85, Security and privacy in communication networks, Berlin, Germany, B1

chapter

Can smartphone users turn off tracking service settings?

V Moonsamy, L Batten, M Shore

(2013), pp. 455-463, MoMM 2013 : Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, Vienna, Austria, E1

conference

An adaptive approach to information discovery in multi-dimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 203-208, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1

conference
2012

Feature reduction to speed up malware classification

V Moonsamy, R Tian, L Batten

(2012), pp. 176-188, Information security technology for applications, Berlin , Germany, B1

chapter

A comparison of the classification of disparate malware collected in different time periods

R Islam, R Tian, V Moonsamy, L Batten

(2012), Vol. 7, pp. 946-955, Journal of networks, Oulu, Finland, C1

journal

Using hypothesis generation in event profiling for digital forensic investigations

L Pan, N Khan, L Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1

conference

Analysis of malicious and benign Android applications

M Alazab, V Moonsamy, L Batten, R Tian, P Lantz

(2012), pp. 608-616, ICDCSW 2012 : Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, E1

conference

Zero permission android applications - attacks and defenses

V Moonsamy, L Batten

(2012), pp. 5-9, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Hypothesis generation and testing in event profiling for digital forensic investigations

L Batten, L Pan, N Khan

(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1

journal

Securing data privacy on mobile devices in emergency health situations

K Singh, J Zhong, V Mirchandani, L Batten, P Bertok

(2012), pp. 119-130, Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers, Berlin, Germany, B1

chapter

Microsoft and Amazon : a comparison of approaches to cloud security

G Tajadod, L Batten, K Govinda

(2012), pp. 539-544, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Taipei, Taiwan, E1

conference

An efficient solution for privacy-preserving, secure remote access to sensitive data

K Singh, J Zhong, L Batten, P Bertok

(2012), pp. 173-191, ACSIT 2012 : Proceedings of the 2012 International Conference of Advanced Computer Science and Information Technology, Chennai, India, E1

conference

Towards an understanding of the impact of advertising on data leaks

V Moonsamy, M Alazab, L Batten

(2012), Vol. 7, pp. 181-193, International journal of security and networks, London, England, C1

journal
2011

E-commerce : protecting purchaser privacy to enforce trust

G Antoniou, L Batten

(2011), Vol. 11, pp. 421-456, Electronic commerce research, New York, N. Y., C1

journal

Heraclitus : a LFSR-based stream cipher with key dependent structure

B Colbert, A Dekker, L Batten

(2011), pp. 141-145, ICCSP 2011 - International Conference on Communications and Signal Processing, Kerala, India, E1

conference

Prevention of information harvesting in a cloud services environment

L Batten, J Abawajy, R Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Dealing with rogue virtual machines in a cloud services environment

B Colbert, L Batten

(2011), pp. 43-48, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Implementing recovery in low-resource stationary wireless sensor networks

B Li, L Batten, R Doss

(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1

chapter

Smartphone malware based on synchronisation vulnerabilities

M Alazab, A Alazab, L Batten

(2011), pp. 1-6, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications, Sydney, N.S.W., E1

conference

A comparison of the classification of disparate malware collected in different time periods

R Islam, R Tian, V Moonsamy, L Batten

(2011), pp. 22-27, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference
2010

Wireless broadcast encryption based on smart cards

X Yi, L Batten

(2010), Vol. 16, pp. 153-165, Wireless networks, New York, N.Y., C1

journal

Classification of malware based on string and function feature selection

R Islam, R Tian, L Batten, S Versteeg

(2010), pp. 9-17, CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, Ballarat, Victoria, E1

conference

Differentiating malware from cleanware using behavioural analysis

R Tian, R Islam, L Batten, S Versteeg

(2010), pp. 23-30, MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, Nancy, France, E1

conference

Network resilience in low-resource mobile wireless sensor networks

B Li, L Batten, R Doss

(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1

chapter

The padding scheme for RSA signatures

L Batten, C Wolf

(2010), pp. 1-7, ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, Melbourne, Victoria, E1

conference

Using relationship-building in event profiling for digital forensic investigations

L Batten, L Pan

(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1

conference
2009

Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks

B Li, L Batten

(2009), Vol. 32, pp. 377-387, Journal of network and computer applications, London, England, C1

journal

A privacy preserving e-payment scheme

G Antoniou, G Antoniou, L Batten, L Batten, S Narayan, S Narayan, U Parampalli, U Parampalli

(2009), Vol. 237, pp. 197-202, Studies in Computational Intelligence, Berlin, Germany, B1

chapter

Robust correctness testing for digital forensic tools

L Pan, L Batten

(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1

conference

An anonymity revocation technology for anonymous communication

G Antoniou, L Batten, U Parampalli

(2009), pp. 329-337, Information systems development : towards a service provision society, New York, N.Y., B1

chapter

Robust performance testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1

journal

Fast recovery from node compromise in wireless sensor networks

B Li, R Doss, L Batten, W Schott

(2009), pp. 1-6, NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, E1

conference

Lightweight authentication for recovery in wireless sensor networks

B Li, L Batten, R Doss

(2009), pp. 465-471, MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, Fujian Province, China, E1

conference

An automated classification system based on the strings of trojan and virus families

R Tian, L Batten, R Islam, S Versteeg

(2009), pp. 23-30, MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, Montréal, Quebec, Canada, E1

conference
2008

Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks

S Al-Hinai, L Batten, B Colbert

(2008), Vol. 4990, pp. 201-215, Lecture notes in computer science, Berlin, Germany, C1

journal

Designing information systems which manage or avoid privacy incidents

G Antoniou, L Batten, U Parampalli

(2008), Vol. 5376, pp. 131-142, Lecture notes in computer science, Berlin, Germany, C1

journal

A trusted approach to e-commerce

G Antoniou, L Batten, U Parampalli

(2008), Vol. 5159, pp. 119-132, Lecture notes in computer science, Berlin, Germany, C1

journal

Efficient broadcast key distribution with dynamic revocation

L Batten, X Yi

(2008), Vol. 1, pp. 351-362, Security and communication networks, Malden, Mass., C1

journal

Teaching digital forensics to undergraduate students

L Batten, L Pan

(2008), Vol. 6, pp. 54-56, IEEE security & privacy, New York, N.Y., C1

journal

Function length as a tool for malware classification

R Tian, L Batten, S Versteeg

(2008), pp. 69-76, Proceedings of the 3rd International Conference on Malicious and Unwanted Software : MALWARE 2008, Alexandria, Va., E1

conference

Measure of integrity leakage in live forensic context

L Pan, A Savoldi, P Gubian, L Batten

(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1

conference
2007

Linear spaces: geometric aspects

L Batten

(2007), pp. 506-512, Handbook of combinatorial designs, Boca Raton, FL, B1

chapter

Extending abelian groups to rings

L Batten, R Coulter, M Henderson

(2007), Vol. 82, pp. 297-313, Journal of the Australian mathematical society, Melbourne, Vic., C1

journal

A French-Australian comparison of responsibilities for the monitoring of security and privacy issues resulting from the introduction of new technologies

L Batten, G LeGrand

(2007), Vol. 13, pp. 15-30, Journal of Contemporary Issues in Business and Government, Bentley, W.A., C1

journal

Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks

B Li, L Batten

(2007), pp. 2507-2510, WICOM 2007 Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, E1

conference

Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks

B Li, L Batten

(2007), pp. 156-163, 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, Dalian, China, E1

conference

A lower bound on effective performance testing for digital forensic tools

L Pan, L Batten

(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Seattle, Washington, E1

conference

An effective and efficient testing methodology for correctness testing for file recovery tools

L Pan, L Batten

(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1

conference

Monitoring employees emails without violating their privacy right

G Antoniou, U Parampalli, L Batten

(2007), pp. 46-50, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1

conference

Compressed nested certificates provide more efficient PKI

A Jancic, L Batten

(2007), pp. 40-50, IWAP 2007 : Proceedings of the Sixth International Workshop for Applied PKC, Perth, Western Australia, E1

conference
2006

Information sharing in supply chain systems

L Batten, R Savage

(2006), pp. 67-82, Global integrated supply chain systems, Hershey, Pa., B1

chapter

A French-Australian comparison of attitudes towards security and privacy in modern information technologies

L Batten, G LeGrand

(2006), pp. 415-424, Internet society II advances in education, commerce & governance, Southampton, England, B1

chapter

Algebraic attacks on clock-controlled stream ciphers

S Al-Hinai, L Batten, B Colbert, K Wong

(2006), Vol. 4058, pp. 1-16, Lecture notes in computer science, Berlin, Germany, C1

journal

Skew arcs and Wagner's [23, 14, 5] code

M Davidson, L Batten

(2006), Vol. 56, pp. 191-201, Journal of combinatorial mathematics and combinatorial computing, Winnipeg, Canada, C1

journal

Algebraic attacks on clock-controlled cascade ciphers

K Wong, B Colbert, L Batten, S Al-Hinai

(2006), Vol. 4329, pp. 32-47, Lecture Notes in Computer Science, Berlin, Germany, C1

journal

Government responsibilities for the monitoring of security and privacy issues around new information technologies - a French-Australian comparison

G LeGrand, L Batten

(2006), pp. 208-219, Recent advances in security technology : proceedings of the 2006 RNSA Security Technology Conference, Canberra, 2006, Canberra, A.C.T., E1

conference
2005

Securing small business - the role of information technology policy

L Batten, T Castleman

(2005), Proceedings of the 16th Australasian Conference on Information Systems, Sydney, Australia, E1

conference

Reproducibility of digital evidence in forensic investigations

L Pan, L Batten

(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1

conference
2004

Algebraic attacks over GF(q)

L Batten

(2004), Vol. 3348, pp. 84-91, Lecture notes in computer science, Berlin, Germany, C1

journal

Engaging suppliers in electronic trading across industry sectors

L Batten, T Castleman, C Chan, D Coulthard, R Savage, L Wilkins

(2004), pp. 182-199, Multi-disciplinary solutions to industry & government's e-business challenges : proceedings of the IFIP WG8.4 Working Conference on E-business, Salzburg, Austria, June 18-19 2004, Salzburg, Austria, E1

conference

Ecommerce strategy in a multi-sector trading environment - quandaries for SMEs

D Coulthard, T Castleman, L Batten

(2004), pp. 1-13, 17th Bled eCommerce Conference : eGlobal, Bled, Slovenia, June 21-24, 2004, conference proceedings, Bled, Slovenia, E1

conference
2003

Predicting molecular structures: an application of the cutting angle method

K Lim, G Beliakov, L Batten

(2003), Vol. 5, pp. 3884-3890, Physical chemistry chemical physics : PCCP, Cambridge, England, C1

journal

Permutations with a distinct difference property

L Batten, S Sane

(2003), Vol. 261, pp. 59-67, Discrete mathematics, Amsterdam, Netherlands, C1

journal

A new method for locating the global optimum : application of the cutting angle method to molecular structure prediction

K Lim, G Beliakov, L Batten

(2003), pp. 1040-1049, ICCS 2003 : Proceedings of the 2003 International Conference on Computational Science, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003 : proceedings, Melbourne, Vic. and St. Petersburg, Russia, E1

conference

The major drawbacks to the use of wireless communication products in education

L Batten, M Chowdhury, J Drew

(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Etransactions in the Australian supply chain setting

L Batten, R Savage

(2003), ICEB 2003 : Proceeding of the Third International Conference on Electronic Business, Singapore, E1

conference

E-business security strategies for SMEs

L Batten, S Wasif

(2003), Conference Proceedings - M-Business, E-Commerce and the Impact of Broadband on Regional Development and Business Prospects : Perth : June 22-24, 2003, Perth, Western Australia, E1

conference
2002

Fast algorithm for the cutting angle method of global optimization

L Batten, G Beliakov

(2002), Vol. 24, pp. 149-161, Journal of global optimization, Dordrecht, The Netherlands, C1

journal

Decompositions of finite projective planes

L Batten

(2002), Vol. 1, pp. 149-159, International mathematical journal, Japan, C1

journal

Information warfare incident monitoring - government or public responsibility?

L Batten, M Warren

(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, WA, E1

conference

Security management: an information systems setting

M Warren, L Batten

(2002), pp. 257-270, Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, Melbourne, Vic., E1

conference
2001

Blocking semiovals of Type (1,M+1,N+1)

L Batten, J Dover

(2001), Vol. 14, pp. 446-457, SIAM journal of discrete mathematics, Philadelphia, Pa., C1

journal

Inferring eye movements on the basis of head and visual target position

L Batten, B Whiten

(2001), pp. 41-59, Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, Adelaide, South Australia, E1

conference

Broadcast anti-jamming systems

Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk

(2001), Vol. 35, pp. 223-236, Computer networks, Amsterdam, The Netherlands, C1

journal

Grants

Australian Competitive Grants

Efficient and Secure Word-Based Stream Ciphers for Wireless Communications

Prof Edward Dawson, Prof Lynn Batten, Dr Leonie Simpson

ARC - Discovery Projects

  • 2006: $16,666

Analysis and classification of malicious code

Prof Kathryn Horadam, Prof Lynn Batten, A/Prof Serdar Boztas, Dr Timothy Ebringer, Mr Jakub Kaminski, Ms Ronghua Tian

ARC Linkage - Projects Rnd 2, ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry

  • 2010: $75,790
  • 2008: $34,145

Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments

Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten

ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry, ARC Linkage - Projects Rnd 1

  • 2014: $14,358
  • 2011: $26,843

Other Public Sector Funding

Recovery Mechanisms for Wireless Sensor Devices

Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm

  • 2009: $18,855
  • 2008: $67,348

Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments

Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten

  • 2010: $7,860

Industry and Other Funding

Scholarship, Computer malware analysis

Prof Lynn Batten, Ms Ronghua Tian

  • 2010: $76,227
  • 2008: $86,140
  • 2007: $30,000

AMSI Internship for Veelasha Moonsamy with NBN Co - User privacy in mobile applications

Prof Lynn Batten, Miss Veelasha Moonsamy

  • 2013: $24,581

AMSI Internship No. 2 for Veelasha Moonsamy with NBN Co

Prof Lynn Batten, Miss Veelasha Moonsamy

  • 2013: $23,000

Supervisions

Principal Supervisor
2015

Veelasha Moonsamy

Thesis entitled: Security and Privacy of Users' Personal Information on Smartphones

Doctor of Philosophy (Information Technology), School of Information Technology

Kalpana Singh

Thesis entitled: Aggregating Privatized Medical Data for Secure Querying Applications

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Luke Mason

Thesis entitled: On the Minimum Cardinality Problem in Intensity Modulated Radiotherapy

Doctor of Philosophy (Information Technology), School of Information Technology

Bai Li

Thesis entitled: Recovery Mechanisms on Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Ronghua Tian

Thesis entitled: An Integrated Malware Detection and Classification System

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ana Palavestra

Thesis entitled: Authentication in Public Key Encryption Schemes

Master of Science (Information Technology), School of Information Technology

2008

Lei Pan

Thesis entitled: A Performance Testing Framework for Digital Forensic Tools

Doctor of Philosophy (Information Technology), School of Information Technology

2004

Azmeri Khan

Thesis entitled: Many-Sample Location and Scale Test with Quantile-Function Error Distributions

Doctor of Philosophy (Information Technology), School of Information Technology

Michelle Cyganowski

Thesis entitled: A Quantile Distribution Approach to the One-Sample Location Problem

Master of Science (Information Technology), School of Information Technology

2003

Daniel Stonier

Thesis entitled: Stability Theory and Numerical Analysis of Non-autonomous Dynamical Systems

Doctor of Philosophy (Information Technology), School of Information Technology

2002

Thanh Binh Duong

Thesis entitled: Application of Real and Functional Analysis to Solve Boundary Value Problems

Doctor of Philosophy (Information Technology), School of Information Technology

Nicholas Yannios

Thesis entitled: Computational Aspects of the Numerical Solution of SDEs

Doctor of Philosophy (Information Technology), School of Information Technology

1998

Azmeri Khan

Thesis entitled: Adjusted adaptive cluster sampling

Master of Science, School of Information Technology

Associate Supervisor
2017

Jahangir Dewan

Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Warnakulasuriya Menik Randi Tissera

Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology