Prof Lynn Batten

STAFF PROFILE

Position

Chair In Mathematics

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Publications

Filter by

2015

Novel approach for information discovery in autonomous wireless sensor networks

Miss Menik Tissera, Dr Robin Ram Mohan Doss, Dr Gang Li, Prof Lynn Batten

(2015), pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

chapter

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs

Miss Menik Tissera, Dr Robin Ram Mohan Doss, Dr Gang Li, Prof Lynn Batten

(2015), pp. 88-93, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Piscataway, N.J., E1

conference

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

Mr Sherwin Ballesteros, Dr Lei Pan, Prof Lynn Batten, Dr Gang Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Amsterdam, The Netherlands, E1

conference

Cryptographic public key length prediction

Mr Mohammed Amain, Prof Lynn Batten

(2015), pp. 27-35, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1

chapter

Cloud omnibus system for evaluating cloud market services

W.P. Eureka Priyadarshani, Prof Lynn Batten, Gihan Wikramanayake, Dr Andrei Kelarev

(2015), Vol. 4, pp. 335-352, International journal of cloud computing, Olney, Eng., C1

journal

Survey in smartphone malware analysis techniques

Mr Moutaz Alazab, Prof Lynn Batten

(2015), pp. 105-130, New threats and countermeasures in digital crime and cyber terrorism, Hershey, Pa., B1

chapter
2014

The 0-1 Knapsack polytope – a starting point for cryptanalysis of Knapsack ciphers?

Dr Vicky Mak, Prof Lynn Batten

(2014), pp. 171-182, Applications and techniques in information security, Berlin, Germany, B1

chapter

An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones

Yogachandran Rahulamathavan, Miss Veelasha Moonsamy, Prof Lynn Batten, Su Shunliang, Muttukrishnan Rajarajan

(2014), pp. 430-437, Information security and privacy, Berlin, Germany, B1

chapter

vPELS : An e-learning social environment for VLSI design with content security using DRM

Mr Jahangir Dewan, Dr Morshed Chowdhury, Prof Lynn Batten

(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1

journal

A solution for privacy-preserving, remote access to sensitive data

Ms Kalpana Singh, Jian Zhong, Prof Lynn Batten, Dr Peter Bertok

(2014), pp. 309-313, Proceedings of 2014 International Symposium on Information Theory and its Applications, Piscataway, N.J., E1

conference

Android applications : Data leaks via advertising libraries

Miss Veelasha Moonsamy, Prof Lynn Batten

(2014), pp. 314-317, Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014, Piscataway, N.J., E1

conference

Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL Pinning and DNSSec

Miss Veelasha Moonsamy, Prof Lynn Batten

(2014), pp. 5-13, Proceedings of the 12th Australian Information Security Management Conference, Perth, WA, E1

conference

PELS: a noble architecture and framework for a personal E-learning system (PELS)

Mr Jahangir Dewan, Dr Morshed Chowdhury, Prof Lynn Batten

(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1

journal

Sharing sensitive medical data sets for research purposes - a case study

Ms Kalpana Singh, Ms Jia Rong, Prof Lynn Batten

(2014), pp. 555-562, DSAA 2014 : Proceedings of the International Data Science and Advanced Analytics Conference, Piscataway, NJ, E1

conference

Energy efficient information discovery approach for range queries in multi-dimensional WSNs

Miss Menik Tissera, Dr Robin Ram Mohan Doss, Dr Gang Li, Prof Lynn Batten

(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Piscataway, N.J., E1

conference
2013

Classification of malware based on integrated static and dynamic features

Dr Rafiq Islam, Ms Ronghua Tian, Prof Lynn Batten, Dr Steven Versteeg

(2013), Vol. 36, pp. 646-656, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

eLearning content authentication using bipartite matching

Mr Jahangir Dewan, Dr Morshed Chowdhury, Prof Lynn Batten

(2013), pp. 51-55, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Piscataway, N. J., E1

conference

An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents

Mr Jahangir Dewan, Dr Morshed Chowdhury, Prof Lynn Batten

(2013), Vol. 10, pp. 236-241, E-Learning and digital media, Oxford, England, C1

journal

Information discovery in multidimensional wireless sensor networks

Miss Menik Tissera, Dr Robin Ram Mohan Doss, Dr Gang Li, Prof Lynn Batten

(2013), pp. 54-59, ICOIN 2013 - Proceedings of the 27th International Conference on Information Networking, Piscataway, N.J., E1

conference

An attack-resistant hybrid data-privatization method with low information loss

Ms Kalpana Singh, Prof Lynn Batten

(2013), pp. 263-271, Trust management VII, Berlin, Germany, B1

chapter

Contrasting permission patterns between clean and malicious android applications

Miss Veelasha Moonsamy, Ms Jia Rong, Prof Lynn Batten

(2013), pp. 69-85, Security and privacy in communication networks, Berlin, Germany, B1

chapter

Can smartphone users turn off tracking service settings?

Miss Veelasha Moonsamy, Prof Lynn Batten, Malcolm Shore

(2013), pp. 455-463, MoMM 2013 : Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, Vienna, Austria, E1

conference

An adaptive approach to information discovery in multi-dimensional wireless sensor networks

Miss Menik Tissera, Dr Robin Ram Mohan Doss, Dr Gang Li, Prof Lynn Batten

(2013), pp. 203-208, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Piscataway, N.J., E1

conference
2012

A comparison of the classification of disparate malware collected in different time periods

Dr Rafiq Islam, Ms Ronghua Tian, Miss Veelasha Moonsamy, Prof Lynn Batten

(2012), Vol. 7, pp. 946-955, Journal of networks, Oulu, Finland, C1

journal

Using hypothesis generation in event profiling for digital forensic investigations

Dr Lei Pan, Mr Nisar Ahmed Khan, Prof Lynn Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Plymouth, E1

conference

Feature reduction to speed up malware classification

Miss Veelasha Moonsamy, Ms Ronghua Tian, Prof Lynn Batten

(2012), pp. 176-188, Information security technology for applications, Berlin , Germany, B1

chapter

Analysis of malicious and benign Android applications

Mr Moutaz Alazab, Miss Veelasha Moonsamy, Prof Lynn Batten, Ms Ronghua Tian, Patrik Lantz

(2012), pp. 608-616, ICDCSW 2012 : Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, Los Alamitos, Calif., E1

conference

An efficient solution for privacy-preserving, secure remote access to sensitive data

Ms Kalpana Singh, Jian Zhong, Prof Lynn Batten, Dr Peter Bertok

(2012), pp. 173-191, ACSIT 2012 : Proceedings of the 2012 International Conference of Advanced Computer Science and Information Technology, Chennai, India, E1

conference

Towards an understanding of the impact of advertising on data leaks

Miss Veelasha Moonsamy, Mr Moutaz Alazab, Prof Lynn Batten

(2012), Vol. 7, pp. 181-193, International journal of security and networks, London, England, C1

journal

Microsoft and Amazon : a comparison of approaches to cloud security

Golnoosh Tajadod, Prof Lynn Batten, K. Govinda

(2012), pp. 539-544, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Piscataway, N.J., E1

conference

Zero permission android applications - attacks and defenses

Miss Veelasha Moonsamy, Prof Lynn Batten

(2012), pp. 5-9, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Hypothesis generation and testing in event profiling for digital forensic investigations

Prof Lynn Batten, Dr Lei Pan, Mr Nisar Ahmed Khan

(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1

journal

Securing data privacy on mobile devices in emergency health situations

Ms Kalpana Singh, Jian Zhong, Vinod Mirchandani, Prof Lynn Batten, Dr Peter Bertok

(2012), pp. 119-130, Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers, Berlin, Germany, B1

chapter
2011

Heraclitus : a LFSR-based stream cipher with key dependent structure

Bernard Colbert, Anthony H. Dekker, Prof Lynn Batten

(2011), pp. 141-145, ICCSP 2011 - International Conference on Communications and Signal Processing, Piscataway, N.J., E1

conference

Prevention of information harvesting in a cloud services environment

Prof Lynn Batten, Prof Jemal Abawajy, Dr Robin Ram Mohan Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

E-commerce : protecting purchaser privacy to enforce trust

Giannakis Antoniou, Prof Lynn Batten

(2011), Vol. 11, pp. 421-456, Electronic commerce research, New York, N. Y., C1

journal

Dealing with rogue virtual machines in a cloud services environment

Bernard Colbert, Prof Lynn Batten

(2011), pp. 43-48, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Implementing recovery in low-resource stationary wireless sensor networks

Mr Bai Li, Prof Lynn Batten, Dr Robin Ram Mohan Doss

(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1

chapter

Smartphone malware based on synchronisation vulnerabilities

Mr Moutaz Alazab, Mr Ammar Al Azab, Prof Lynn Batten

(2011), pp. 1-6, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications, Sydney, N.S.W., E1

conference

A comparison of the classification of disparate malware collected in different time periods

Dr Rafiq Islam, Ms Ronghua Tian, Miss Veelasha Moonsamy, Prof Lynn Batten

(2011), pp. 22-27, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic, E1

conference
2010

Wireless broadcast encryption based on smart cards

Dr Xun Yi, Prof Lynn Batten

(2010), Vol. 16, pp. 153-165, Wireless networks, New York, N.Y., C1

journal

Classification of malware based on string and function feature selection

Dr Rafiq Islam, Ms Ronghua Tian, Prof Lynn Batten, Dr Steven Versteeg

(2010), pp. 9-17, CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, Piscataway, N.J., E1

conference

Differentiating malware from cleanware using behavioural analysis

Ms Ronghua Tian, Dr Rafiq Islam, Prof Lynn Batten, Dr Steven Versteeg

(2010), pp. 23-30, MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, Piscataway, N.J., E1

conference

Using relationship-building in event profiling for digital forensic investigations

Prof Lynn Batten, Dr Lei Pan

(2010), pp. -, e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1

conference

The padding scheme for RSA signatures

Prof Lynn Batten, Christopher Wolf

(2010), pp. 1-7, ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference

Network resilience in low-resource mobile wireless sensor networks

Mr Bai Li, Prof Lynn Batten, Dr Robin Ram Mohan Doss

(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1

chapter
2009

A privacy preserving e-payment scheme

Giannakis Antoniou, Prof Lynn Batten, Shivaramakrishnan Narayan, Dr Udaya Parampalli

(2009), pp. 197-202, Intelligent Distributed Computing III, Berlin, Germany, B1

chapter

Fast recovery from node compromise in wireless sensor networks

Mr Bai Li, Dr Robin Ram Mohan Doss, Prof Lynn Batten, Wolfgang Schott

(2009), pp. 1-6, NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, Piscataway, N. J., E1

conference

An anonymity revocation technology for anonymous communication

Giannakis Antoniou, Prof Lynn Batten, Dr Udaya Parampalli

(2009), pp. 329-337, Information systems development : towards a service provision society, New York, N.Y., B1

chapter

Lightweight authentication for recovery in wireless sensor networks

Mr Bai Li, Prof Lynn Batten, Dr Robin Ram Mohan Doss

(2009), pp. 465-471, MSN 2009 : Proceedings of the 5th International Conference on Mobile Ad-hoc and Sensor Networks, Piscataway, N. J., E1

conference

Robust performance testing for digital forensic tools

Dr Lei Pan, Prof Lynn Batten

(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1

journal

An automated classification system based on the strings of trojan and virus families

Ms Ronghua Tian, Prof Lynn Batten, Dr Rafiq Islam, Dr Steven Versteeg

(2009), pp. 23-30, MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, New York, N.Y., E1

conference

Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks

Mr Bai Li, Prof Lynn Batten

(2009), Vol. 32, pp. 377-387, Journal of network and computer applications, London, England, C1

journal

Robust correctness testing for digital forensic tools

Dr Lei Pan, Prof Lynn Batten

(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1

conference

A privacy preserving e-payment scheme

Giannakis Antoniou, Prof Lynn Batten, Shivaramakrishnan Narayan, Dr Udaya Parampalli

(2009), pp. 197-202, Intelligent distributed computing III, Berlin, Germany, B1-1

chapter
2008

Teaching digital forensics to undergraduate students

Prof Lynn Batten, Dr Lei Pan

(2008), Vol. 6, pp. 54-56, IEEE security & privacy, New York, N.Y., C1

journal

Function length as a tool for malware classification

Ms Ronghua Tian, Prof Lynn Batten, Dr Steven Versteeg

(2008), pp. 69-76, Proceedings of the 3rd International Conference on Malicious and Unwanted Software : MALWARE 2008, Los Alamitos, Calif., E1

conference

Designing information systems which manage or avoid privacy incidents

Giannakis Antoniou, Prof Lynn Batten, Dr Udaya Parampalli

(2008), Vol. 5376, pp. 131-142, Lecture notes in computer science, Berlin, Germany, C1

journal

Efficient broadcast key distribution with dynamic revocation

Prof Lynn Batten, Dr Xun Yi

(2008), Vol. 1, pp. 351-362, Security and communication networks, Malden, Mass., C1

journal

A trusted approach to e-commerce

Giannakis Antoniou, Prof Lynn Batten, Dr Udaya Parampalli

(2008), Vol. 5159, pp. 119-132, Lecture notes in computer science, Berlin, Germany, C1

journal

Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks

Sultan Al-Hinai, Prof Lynn Batten, Bernard Colbert

(2008), Vol. 4990, pp. 201-215, Lecture notes in computer science, Berlin, Germany, C1

journal

Measure of integrity leakage in live forensic context

Dr Lei Pan, A Savoldi, P Gubian, Prof Lynn Batten

(2008), pp. 534-537, IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China, Los Alamitos, Calif., E1-1

conference
2007

Monitoring employees emails without violating their privacy right

Giannakis Antoniou, Dr Udaya Parampalli, Prof Lynn Batten

(2007), pp. 46-50, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Los Alamitos, Calif., E1

conference

Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks

Mr Bai Li, Prof Lynn Batten

(2007), pp. 2507-2510, WICOM 2007 Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Piscataway, N.J., E1

conference

Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks

Mr Bai Li, Prof Lynn Batten

(2007), pp. 156-163, 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, Piscataway, N.J., E1

conference

A French-Australian comparison of responsibilities for the monitoring of security and privacy issues resulting from the introduction of new technologies

Prof Lynn Batten, Gwendal LeGrand

(2007), Vol. 13, pp. 15-30, Journal of Contemporary Issues in Business and Government, Bentley, W.A., C1

journal

An effective and efficient testing methodology for correctness testing for file recovery tools

Dr Lei Pan, Prof Lynn Batten

(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Piscataway, N.J., E1

conference

Compressed nested certificates provide more efficient PKI

Ana Jancic, Prof Lynn Batten

(2007), pp. 40-50, IWAP 2007 : Proceedings of the Sixth International Workshop for Applied PKC, Perth, W.A., E1

conference

A lower bound on effective performance testing for digital forensic tools

Dr Lei Pan, Prof Lynn Batten

(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Los Alamitos, Calif., E1

conference

Extending abelian groups to rings

Prof Lynn Batten, Dr Robert Coulter, Marie Henderson

(2007), Vol. 82, pp. 297-313, Journal of the Australian mathematical society, Melbourne, Vic., C1

journal

Linear spaces: geometric aspects

Prof Lynn Batten

(2007), pp. 506-512, Handbook of combinatorial designs, Boca Raton, FL, B1

chapter
2006

Skew arcs and Wagner's [23, 14, 5] code

Michelle Davidson, Prof Lynn Batten

(2006), Vol. 56, pp. 191-201, Journal of combinatorial mathematics and combinatorial computing, Winnipeg, Canada, C1

journal

Algebraic attacks on clock-controlled stream ciphers

Sultan Al-Hinai, Prof Lynn Batten, Bernard Colbert, Kenneth Koon-Ho Wong

(2006), Vol. 4058, pp. 1-16, Lecture notes in computer science, Berlin, Germany, C1

journal

Algebraic attacks on clock-controlled cascade ciphers

Kenneth Koon-Ho Wong, Bernard Colbert, Prof Lynn Batten, Sultan Al-Hinai

(2006), Vol. 4329, pp. 32-47, Lecture Notes in Computer Science, Berlin, Germany, C1

journal

Government responsibilities for the monitoring of security and privacy issues around new information technologies - a French-Australian comparison

Gwendal LeGrand, Prof Lynn Batten

(2006), pp. 208-219, Recent advances in security technology : proceedings of the 2006 RNSA Security Technology Conference, Canberra, 2006, Curtin, A.C.T., E1

conference

Information sharing in supply chain systems

Prof Lynn Batten, Mr Ron Savage

(2006), pp. 67-82, Global integrated supply chain systems, Hershey, Pa., B1

chapter

A French-Australian comparison of attitudes towards security and privacy in modern information technologies

Prof Lynn Batten, Gwendal LeGrand

(2006), pp. 415-424, Internet society II advances in education, commerce & governance, Southampton, England, B1

chapter
2005

Securing small business - the role of information technology policy

Prof Lynn Batten, Dr Tanya Castleman

(2005), pp. -, Proceedings of the 16th Australasian Conference on Information Systems, Sydney, N.S.W., E1

conference

Reproducibility of digital evidence in forensic investigations

Dr Lei Pan, Prof Lynn Batten

(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1

conference
2004

Ecommerce strategy in a multi-sector trading environment - quandaries for SMEs

Dr Darryl Coulthard, Dr Tanya Castleman, Prof Lynn Batten

(2004), pp. 1-13, 17th Bled eCommerce Conference : eGlobal, Bled, Slovenia, June 21-24, 2004, conference proceedings, Bled, Slovenia, E1

conference

Algebraic attacks over GF(q)

Prof Lynn Batten

(2004), Vol. 3348, pp. 84-91, Lecture notes in computer science, Berlin, Germany, C1

journal
2003

Etransactions in the Australian supply chain setting

Prof Lynn Batten, Mr Ron Savage

(2003), pp. -, ICEB 2003 : Proceeding of the Third International Conference on Electronic Business, Singapore, E1

conference

Permutations with a distinct difference property

Prof Lynn Batten, Sharad Sane

(2003), Vol. 261, pp. 59-67, Discrete mathematics, Amsterdam, Netherlands, C1

journal

A new method for locating the global optimum : application of the cutting angle method to molecular structure prediction

A/Prof Kieran Lim, Prof Gleb Beliakov, Prof Lynn Batten

(2003), pp. 1040-1049, Computational science - ICCS 2003 : international conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003 : proceedings, Berlin, Germany, E1

conference

The major drawbacks to the use of wireless communication products in education

Prof Lynn Batten, Dr Morshed Chowdhury, James Drew

(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, W.A., E1

conference

E-business security strategies for SMEs

Prof Lynn Batten, Surosh Wasif

(2003), pp. -, Conference Proceedings - M-Business, E-Commerce and the Impact of Broadband on Regional Development and Business Prospects : Perth : June 22-24, 2003, Perth, W.A., E1

conference

Predicting molecular structures: an application of the cutting angle method

A/Prof Kieran Lim, Prof Gleb Beliakov, Prof Lynn Batten

(2003), Vol. 5, pp. 3884-3890, Physical chemistry chemical physics : PCCP, Cambridge, England, C1

journal
2002

Decompositions of finite projective planes

Prof Lynn Batten

(2002), Vol. 1, pp. 149-159, International mathematical journal, Japan, C1

journal

Security management: an information systems setting

Prof Matthew Warren, Prof Lynn Batten

(2002), pp. 257-270, Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, Berlin/Heidelberg, Germany, E1

conference

Fast algorithm for the cutting angle method of global optimization

Prof Lynn Batten, Prof Gleb Beliakov

(2002), Vol. 24, pp. 149-161, Journal of global optimization, Dordrecht, The Netherlands, C1

journal

Information warfare incident monitoring - government or public responsibility?

Prof Lynn Batten, Prof Matthew Warren

(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Churchlands, W.A., E1

conference
2001

Broadcast anti-jamming systems

Yvo Desmedt, Reihaneh Safavi-Naini, Dr Huaxiong Wang, Prof Lynn Batten, Dr Christopher Charnes, Josef Pieprzyk

(2001), Vol. 35, pp. 223-236, Computer networks, Amsterdam, The Netherlands, C1

journal

Blocking semiovals of Type (1,M+1,N+1)

Prof Lynn Batten, Jeremy Dover

(2001), Vol. 14, pp. 446-457, SIAM journal of discrete mathematics, Philadelphia, Pa., C1

journal

Inferring eye movements on the basis of head and visual target position

Prof Lynn Batten, Bill Whiten

(2001), pp. 41-59, Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, Adelaide, S. Aust., E1

conference