Research Services Division

Deakin Research

Research Output for Lynn Batten

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

2013 School of Information Technology

Batten, Lynn Margaret (2013) Public key cryptography : applications and attacks, John Wiley & Sons, Hoboken, N.J. [A2]
DRO entry for this publication

Moonsamy, Veelasha, Rong, Jia, Liu, Shaowu, Li, Gang and Batten, Lynn (2013) Contrasting permission patterns between clean and malicious android applications, in Zia, Tanveer; Zomaya, Albert; Varadharajan, Vijay and Mao, Morley (eds), Security and privacy in communication networks, pp. 69-85, Springer International Publishing, Berlin, Germany [B1]
DRO entry for this publication

Singh, Kalpana and Batten, Lynn (2013) An attack-resistant hybrid data-privatization method with low information loss, in Fernandez-Gago, Carmen; Martinelli, Fabio; Pearson, Siani and Augdo, Issac (eds), Trust management VII, pp. 263-271, Springer, Berlin, Germany [B1]
DRO entry for this publication

Dewan, Jahangir, Chowdhury, Morshed and Batten, Lynn (2013) An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents, E-Learning and digital media, vol. 10, no. 3, pp. 236-241, Symposium Journals, Oxford, England [C1]
ERA journal ID: 20273 – Scopus EID: Not tagged
DRO entry for this publication

Islam, Rafiqul*, Tian, Ronghua, Batten, Lynn M. and Versteeg, Steve* (2013) Classification of malware based on integrated static and dynamic features, Journal of network and computer applications, vol. 36, no. 2, pp. 646-656, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
DRO entry for this publication

Dewan, Jahangir, Chowdhury, Morshed and Batten, Lynn (2013) eLearning content authentication using bipartite matching, in Unknown (ed.), SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 51-55, IEEE Computer Society Conference Publishing Services (CPS), Piscataway, N. J. [E1]
DRO entry for this publication

Moonsamy, Veelasha, Batten, Lynn and Shore, Malcolm* (2013) Can smartphone users turn off tracking service settings?, in Mayrhofer, Rene; Chen, Luke; Steinbauer, Matthias; Kotsis, Gabriele and Khalil, Ismail (eds), MoMM 2013 : Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, pp. 455-463, Association for Computing Machinery, Vienna, Austria [E1]
DRO entry for this publication

Tissera, Menik, Doss, Robin, Li, Gang and Batten, Lynn (2013) Information discovery in multidimensional wireless sensor networks, in Unknown (ed.), ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, pp. 54-59, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Tissera, Menik, Doss, Robin, Li, Gang and Batten, Lynn (2013) An adaptive approach to information discovery in multi-dimensional wireless sensor networks, in Unknown (ed.), ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, pp. 203-208, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

James, Simon, Batten, Lynn and Cyganowski, Michelle (2013) The presence of mathematics anxiety in future primary school teachers and factors affecting abatement, in King, Deborah; Loch, Birgit and Rylands, Leanne (eds), Lighthouse DELTA 2013 : Shining through the fog : Proceedings of the Delta Teaching and Learning of Undergraduate Mathematics and Statistics 2013 conference, p. 235, The University of Western Sydney, School of Computing, Engineering and Mathematics, Sydney, N. S. W [E3]
DRO entry for this publication

2012 School of Information Technology

Moonsamy, Veelasha, Tian, Ronghua and Batten, Lynn (2012) Feature reduction to speed up malware classification, Information security technology for applications, pp. 176-188, Springer, Berlin , Germany [B1]
DRO entry for this publication

Singh, Kalpana, Zhong, Jian*, Mirchandani, Vinod*, Batten, Lynn and Bertok, Peter* (2012) Securing data privacy on mobile devices in emergency health situations, in Schmidt, Andreas U.; Russello, Giovanni; Krontiris, Ioannis and Lian, Shiguo (eds), Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers, pp. 119-130, Springer, Berlin, Germany [B1]
DRO entry for this publication

Batten, Lynn, Pan, Lei and Khan, Nisar (2012) Hypothesis generation and testing in event profiling for digital forensic investigations, International journal of digital crime and forensics, vol. 4, no. 4, pp. 1-14, IGI Global, Hershey, Pa. [C1]
ERA journal ID: 40173 – Scopus EID: 2-s2.0-84880539102
DRO entry for this publication

Islam, Rafiqul*, Tian, Ronghua, Moonsamy, Veelasha and Batten, Lynn (2012) A comparison of the classification of disparate malware collected in different time periods, Journal of networks, vol. 7, no. 6, pp. 946-955, Academy Publisher, Oulu, Finland [C1]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Moonsamy, Veelasha, Alazab, Moutaz and Batten, Lynn (2012) Towards an understanding of the impact of advertising on data leaks, International journal of security and networks, vol. 7, no. 3, pp. 181-193, Inderscience Publishers, London, England [C1]
ERA journal ID: 32101 – Scopus EID: Not tagged
DRO entry for this publication

Alazab, Moutaz, Moonsamy, Veelasha, Batten, Lynn, Tian, Ronghua and Lantz, Patrik* (2012) Analysis of malicious and benign Android applications, in Unknown (ed.), ICDCSW 2012 : Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, pp. 608-616, IEEE, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 3
DRO entry for this publication

Moonsamy, Veelasha and Batten, Lynn (2012) Zero permission android applications - attacks and defenses, in Warren, Matthew (eds), ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, pp. 5-9, School of Information Systems, Deakin University, Melbourne, Vic. [E1]
DRO entry for this publication

Pan, L., Khan, N. and Batten, Lynn M. (2012) Using hypothesis generation in event profiling for digital forensic investigations, in Unknown (ed.), WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, pp. 76-86, University of Plymouth, Plymouth [E1]
DRO entry for this publication

Singh, Kalpana, Zhong, Jian*, Batten, Lynn M. and Bertok, Peter* (2012) An efficient solution for privacy-preserving, secure remote access to sensitive data, in Meghanathan, Natarajan and Nagamalai, Dhinaharan (eds), ACSIT 2012 : Proceedings of the 2012 International Conference of Advanced Computer Science and Information Technology, pp. 173-191, The Conference, Chennai, India [E1]
DRO entry for this publication

Tajadod, Golnoosh, Batten, Lynn and Govinda, K.* (2012) Microsoft and Amazon : a comparison of approaches to cloud security, in Unknown (ed.), CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, pp. 539-544, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Priyadarshani, W.P.E.*, Wikramanayake, G.N.* and Batten, Lynn M. (2012) Enhancement of user level controls in cloud databases, in Unknown (ed.), NITC 2012 : Proceedings of the 30th National Information Technology Conference, pp. 46-53, Computer Society of Sri Lanka, Colombo, Sri Lanka [E2]
DRO entry for this publication

2011 School of Information Technology

Li, Bai, Batten, Lynn Margaret and Doss, Robin (2011) Implementing recovery in low-resource stationary wireless sensor networks, in Al-Majeed, Salah S.; Hu, Chih-Lin and Nagamalai, Dhinaharan (eds), Advances in wireless, mobile networks and applications, pp. 11-20, Springer, Berlin, Germany [B1]
DRO entry for this publication

Batten, Lynn M. and Pan, Lei (2011) Using relationship-building in event profiling for digital forensic investigations, in Lai, Xuejia; Gu, Dawu; Jin, Bo; Wang, Yongsquan and Li, Hui (eds), Forensics in telecommunications, information, and multimedia : third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, revised selected papers, pp. 40-52, Springer-Verlag, Berlin, Germany [B2]
DRO entry for this publication

Antoniou, Giannakis* and Batten, Lynn (2011) E-commerce : protecting purchaser privacy to enforce trust, Electronic commerce research, vol. 11, no. 4, pp. 421-456, Springer New York LLC, New York, N. Y. [C1]
ERA journal ID: 19287 – Scopus EID: Not tagged
Citation counts: Thomson - 8
DRO entry for this publication

Alazab, Moutaz, Alazab, Ammar and Batten, Lynn (2011) Smartphone malware based on synchronisation vulnerabilities, in Unknown], (eds), ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications, pp. 1-6, ICITA, Sydney, N.S.W. [E1]
DRO entry for this publication

Batten, L. M., Abawajy, J. and Doss, R. (2011) Prevention of information harvesting in a cloud services environment, in Unknown (ed.), CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, pp. 66-72, INSTICC, Noordwijkerhout, The Netherlands [E1]
DRO entry for this publication

Colbert, B. and Batten, L.M. (2011) Dealing with rogue virtual machines in a cloud services environment, in Unknown (ed.), CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, pp. 43-48, INSTICC, Noordwijkerhout, The Netherlands [E1]
DRO entry for this publication

Colbert, Bernard, Dekker, Anthony H.* and Batten, Lynn Margaret (2011) Heraclitus : a LFSR-based stream cipher with key dependent structure, in Unknown (ed.), ICCSP 2011 - International Conference on Communications and Signal Processing, pp. 141-145, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Islam, Rafiqul, Tian, Ronghua, Moonsamy, Veelasha and Batten, Lynn (2011) A comparison of the classification of disparate malware collected in different time periods, in Warren, Matthew (eds), ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, pp. 22-27, Deakin University School of Information Systems, Melbourne, Vic [E1]
DRO entry for this publication

2010 School of Information Technology

Li, Bai, Batten, Lynn and Doss, Robin (2010) Network resilience in low-resource mobile wireless sensor networks, in Schmidt, Andreas U.; Russello, Giovanni; Lioy, Antonio; Prasad, Neeli R. and Lian, Shiguo (eds), Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, pp. 127-138, Springer, Berlin, Germany [B1]
DRO entry for this publication

Yi, Xun* and Batten, Lynn (2010) Wireless broadcast encryption based on smart cards, Wireless networks, vol. 16, no. 1, pp. 153-165, Springer, New York, N.Y. [C1]
ERA journal ID: 4515 – Scopus EID: 2-s2.0-45149094227
Citation counts: Thomson - 2
DRO entry for this publication

Batten, Lynn and Wolf, Christopher* (2010) The padding scheme for RSA signatures, in Warren, Matthew (eds), ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, pp. 1-7, School of Information Systems, Deakin University, Melbourne, Vic. [E1]
DRO entry for this publication

Batten, Lynn and Pan, Lei (2010) Using relationship-building in event profiling for digital forensic investigations, in Unknown (ed.), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Springer, Shangai, China [E1]
DRO entry for this publication

Islam, Rafiqul, Tian, Ronghua, Batten, Lynn and Versteeg, Steve* (2010) Classification of malware based on string and function feature selection, in Unknown (ed.), CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, pp. 9-17, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Tian, Ronghua, Islam, Rafiqul, Batten, Lynn and Versteeg, Steve* (2010) Differentiating malware from cleanware using behavioural analysis, in Unknown (ed.), MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, pp. 23-30, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

2009 School of Information Technology

Antoniou, Giannakis*, Batten, Lynn and Parampalli, Udaya* (2009) An anonymity revocation technology for anonymous communication, in Papadopoulos, George A.; Wojtkowski, Gregory; Wojtkowski, Wita; Wrycza, Stanislaw and Zupancic, Joze (eds), Information systems development : towards a service provision society, pp. 329-337, Springer, New York, N.Y. [B1]
DRO entry for this publication

Antoniou, Giannakis*, Batten, Lynn, Narayan, Shivaramakrishnan* and Parampalli, Udaya* (2009) A privacy preserving e-payment scheme, in Papadopoulos, G.A. and Badica, C. (eds), Intelligent Distributed Computing III, pp. 197-202, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Li, Bai and Batten, Lynn (2009) Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of network and computer applications, vol. 32, no. 2, pp. 377-387, Academic Press, London, England [C1]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-59249100315
Citation counts: Scopus - 7, Thomson - 1
DRO entry for this publication

Pan, Lei and Batten, Lynn (2009) Robust performance testing for digital forensic tools, Digital investigation, vol. 6, no. 1-2, pp. 71-81, Elsevier Advanced Technology, Kidlington, England [C1]
ERA journal ID: 39832 – Scopus EID: 2-s2.0-70249086259
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Li, Bai, Doss, R., Batten, L. M. and Schott, W.* (2009) Fast recovery from node compromise in wireless sensor networks, in Al-Agha, Khaldoun; Badra, Mohamad and Newby, Gregory B. (eds), NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, pp. 1-6, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Li, Bai, Batten, Lynn and Doss, Robin (2009) Lightweight authentication for recovery in wireless sensor networks, in Unknown (ed.), MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, pp. 465-471, IEEE Computer Society, Piscataway, N. J. [E1]
DRO entry for this publication

Pan, Lei and Batten, Lynn (2009) Robust correctness testing for digital forensic tools, in Sorell, Matthew (eds), Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, pp. 54-64, Springer, Berlin, Germany [E1]
DRO entry for this publication

Tian, Ronghua, Batten, Lynn, Islam, Rafiqul and Versteeg, Steve* (2009) An automated classification system based on the strings of trojan and virus families, in Unknown (ed.), MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, pp. 23-30, IEEE, New York, N.Y. [E1]
Citation counts: Scopus - 13, Thomson - 6
DRO entry for this publication

2008 School of Engineering and Information Technology

Al-Hinai, Sultan*, Batten, Lynn Margaret and Colbert, Bernard* (2008) Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks, Lecture notes in computer science, vol. 4990, pp. 201-215, Springer, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-54249104187
Citation counts: Scopus - 1
DRO entry for this publication

Antoniou, Giannakis*, Batten, Lynn and Parampalli, Udaya* (2008) A trusted approach to e-commerce, Lecture notes in computer science, vol. 5159, pp. 119-132, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-54249132131
Citation counts: Scopus - 1
DRO entry for this publication

Antoniou, Giannakis*, Batten, Lynn and Parampalli, Udaya* (2008) Designing information systems which manage or avoid privacy incidents, Lecture notes in computer science, vol. 5376, pp. 131-142, Spring-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-58849148582
DRO entry for this publication

Batten, Lynn and Pan, Lei (2008) Teaching digital forensics to undergraduate students, IEEE security & privacy, vol. 6, no. 3, pp. 54-56, IEEE Computer Society, New York, N.Y. [C1]
ERA journal ID: 36609 – Scopus EID: 2-s2.0-44649097552
Citation counts: Scopus - 4, Thomson - 1
DRO entry for this publication

Batten, Lynn and Yi, Xun* (2008) Efficient broadcast key distribution with dynamic revocation, Security and communication networks, vol. 1, no. 4, pp. 351-362, John Wiley & Sons, Malden, Mass. [C1]
ERA journal ID: 39741 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Tian, R., Batten, L. M. and Versteeg, S. C.* (2008) Function length as a tool for malware classification, in Unknown (ed.), Proceedings of the 3rd International Conference on Malicious and Unwanted Software : MALWARE 2008, pp. 69-76, IEEE, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 15
DRO entry for this publication

2007 School of Engineering and Information Technology

Batten, Lynn (2007) Linear spaces: geometric aspects, in Colbourn, Charles and Dinitz, Jeffrey (eds), Handbook of combinatorial designs, pp. 506-512, CRC Press, Boca Raton, FL [B1]
DRO entry for this publication

Batten, Lynn, Coulter, Robert S.* and Henderson, Marie* (2007) Extending abelian groups to rings, Journal of the Australian mathematical society, vol. 82, no. 3, pp. 297-313, Cambridge University Press, Melbourne, Vic. [C1]
ERA journal ID: 68 – Scopus EID: 2-s2.0-34548014296
Citation counts: Scopus - 1
DRO entry for this publication

Batten, Lynn and LeGrand, G.* (2007) A French-Australian comparison of responsibilities for the monitoring of security and privacy issues resulting from the introduction of new technologies, Journal of Contemporary Issues in Business and Government, vol. 13, no. 1, pp. 15-30, Curtin University of Technology, Bentley, W.A. [C1]
ERA journal ID: 18571 – Scopus EID: Not tagged
DRO entry for this publication

Antoniou, Giannakis*, Parampalli, Udaya* and Batten, Lynn (2007) Monitoring employees emails without violating their privacy right, in Munro, David S.; Shen, Hong; Sheng, Quan Z.; Detmold, Henry; Falkner, Katrina E.; Izu, Cruz; Coddington, Paul D.; Bradley Alexander and Zheng, Si-Qing (eds), PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, pp. 46-50, Institute of Electrical and Electronics Engineers (IEEE), Los Alamitos, Calif. [E1]
DRO entry for this publication

Jancic, A. and Batten, Lynn (2007) Compressed nested certificates provide more efficient PKI, in Li, Dongguang (eds), IWAP 2007 : Proceedings of the Sixth International Workshop for Applied PKC, pp. 40-50, Edith Cowan University, School of Computer and Information Science, Perth, W.A. [E1]
DRO entry for this publication

Li, Bai and Batten, Lynn (2007) Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks, in Zhou, Huaibei; Burgmeyer, A. H. and Romeo, D (eds), WICOM 2007 Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2507-2510, Institute of Electrical and Electronics Engineers (IEEE), Piscataway, N.J. [E1]
Citation counts: Scopus - 2, Thomson - 1
DRO entry for this publication

Li, Bai and Batten, Lynn (2007) Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networks, in Li, Keqiu; Xiang, Yang; Jin, Hai; Qu, Wenyu and Cao, Zhiying (eds), 2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China, pp. 156-163, IEEE Computer Society Press, Piscataway, N.J. [E1]
DRO entry for this publication

Pan, Lei and Batten, Lynn (2007) A lower bound on effective performance testing for digital forensic tools, in Huang, Ming-Yuh and Frincke, Deborah (eds), SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, pp. 117-130, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Pan, Lei and Batten, Lynn (2007) An effective and efficient testing methodology for correctness testing for file recovery tools, in Liao, Bin-Yih; Pan, Jeng-Shyang; Jain, Lakmi C.; Liao, Mark; Hideki Noda, Anthony and Ho, T.S. (eds), IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, pp. 103-107, IEEE Xplore, Piscataway, N.J. [E1]
DRO entry for this publication

2006 School of Engineering and Information Technology

Batten, Lynn and Savage, Ron (2006) Information sharing in supply chain systems, in Lan, Yi-chen and Unhelkar, Bhuvan (eds), Global integrated supply chain systems, pp. 67-82, Idea Group Publishing, Hershey, Pa. [B1]
DRO entry for this publication

Batten, Lynn and LeGrand, G.* (2006) A French-Australian comparison of attitudes towards security and privacy in modern information technologies, in Morgan, K.; Brebbia, C. A. and Spector, J. M. (eds), Internet society II advances in education, commerce & governance, pp. 415-424, Wit Press, Southampton, England [B1]
DRO entry for this publication

Al-Hinai, Sultan*, Batten, Lynn, Colbert, Bernard and Wong, Kenneth* (2006) Algebraic attacks on clock-controlled stream ciphers, Lecture notes in computer science, vol. 4058, pp. 1-16, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-33746335696
Citation counts: Scopus - 8
DRO entry for this publication

Davidson, Michelle* and Batten, Lynn (2006) Skew arcs and Wagner's [23, 14, 5] code, Journal of combinatorial mathematics and combinatorial computing, vol. 56, pp. 191-201, Charles Babbage Research Centre, Winnipeg, Canada [C1]
ERA journal ID: 221 – Scopus EID: Not tagged
DRO entry for this publication

Wong, Kenneth Koon-Ho*, Colbert, Bernard, Batten, Lynn and Al-Hinai, Sultan* (2006) Algebraic attacks on clock-controlled cascade ciphers, Lecture Notes in Computer Science, vol. 4329, pp. 32-47, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: Not tagged
DRO entry for this publication

LeGrand, G.* and Batten, Lynn (2006) Government responsibilities for the monitoring of security and privacy issues around new information technologies - a French-Australian comparison, in Mendis, Priyan; Lai, Jospeh and Dawson, Ed (eds), Recent advances in security technology : proceedings of the 2006 RNSA Security Technology Conference, Canberra, 2006, pp. 208-219, Australian Homeland Security Research Centre, Curtin, A.C.T. [E1]
DRO entry for this publication

Batten, Lynn and Safavi-Naini, Reihaneh* (2006) Information security and privacy, in Batten, Lynn and Safavi-Naini, Reihaneh (eds), Springer Berlin, Berlin, Germany [E4]
DRO entry for this publication

Batten, Lynn Margaret and Safavi-Naini, Reihaneh* (2006) ACISP 2006 : Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings, in Batten, Lynn Margaret and Safavi-Naini, Reihaneh (eds), Springer, Berlin, Germany [E4.1]
DRO entry for this publication

2005 School of Information Technology

Batten, Lynn and Castleman, Tanya (2005) Securing small business - the role of information technology policy, in Campbell, Bruce; Underwood, Jim and Bunker, Deborah (eds), Proceedings of the 16th Australasian Conference on Information Systems, Australasian Chapter of the Association for Information Systems, Sydney, N.S.W. [E1]
DRO entry for this publication

Pan, Lei and Batten, Lynn (2005) Reproducibility of digital evidence in forensic investigations, in Adelstein F. (ed.), DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, pp. 1-8, Digital Forensics Research Workshop, New Orleans, La. [E1]
DRO entry for this publication

2004 School of Information Technology

Batten, Lynn (2004) Algebraic attacks over GF(q), Lecture notes in computer science, vol. 3348, pp. 84-91, Springer-Verlag, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-35048832923
Citation counts: Scopus - 18
DRO entry for this publication

Batten, Lynn, Castleman, Tanya, Chan, Caroline, Coulthard, Darryl, Savage, R. and Wilkins, L. (2004) Engaging suppliers in electronic trading across industry sectors, in Elliot, Steve; Viborg Anderson, Kim; Trauth, Eileen and Reich, Siegfried (eds), Multi-disciplinary solutions to industry & government's e-business challenges : proceedings of the IFIP WG8.4 Working Conference on E-business, Salzburg, Austria, June 18-19 2004, pp. 182-199, International Federation for Information Processing (IFIP), Laxerburg, Austria [E1]
DRO entry for this publication

Coulthard, Darryl, Castleman, Tanya and Batten, Lynn (2004) Ecommerce strategy in a multi-sector trading environment - quandaries for SMEs, in Tan, Yao-Hua; Vogel, R.; Gricar, J. and Lenart, G. (eds), 17th Bled eCommerce Conference : eGlobal, Bled, Slovenia, June 21-24, 2004, conference proceedings, pp. 1-13, Bled Electronic Commerce Conference, Bled, Slovenia [E1]
DRO entry for this publication

2003 School of Information Technology

Batten, Lynn and Sane, Sharad* (2003) Permutations with a distinct difference property, Discrete mathematics, vol. 261, no. 1-3, pp. 59-67, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 129 – Scopus EID: 2-s2.0-0037469436
Citation counts: Scopus - 1
DRO entry for this publication

Lim, Kieran, Beliakov, Gleb and Batten, Lynn M. (2003) Predicting molecular structures: an application of the cutting angle method, Physical chemistry chemical physics : PCCP, vol. 5, pp. 3884-3890, Royal Society of Chemistry, Cambridge, England [C1]
ERA journal ID: 1219 – Scopus EID: 2-s2.0-0141457370
Citation counts: Scopus - 5, Thomson - 5
DRO entry for this publication

Batten, Lynn, Chowdhury, Morshed and Drew, J. (2003) The major drawbacks to the use of wireless communication products in education, in Croft, Laima and Knight, Shirlee-ann (eds), AISMC 2003 : 1st Australian Information Security Management Conference, pp. 1-6, School of Information and Computer Management (SCISSEC research group), Edith Cowan University, Perth, W.A. [E1]
DRO entry for this publication

Batten, Lynn and Wasif, S. (2003) E-business security strategies for SMEs, in Cooper, Russel (eds), Conference Proceedings - M-Business, E-Commerce and the Impact of Broadband on Regional Development and Business Prospects : Perth : June 22-24, 2003, Communication Economics and Electronic Markets Research Centre, Perth, W.A. [E1]
DRO entry for this publication

Batten, Lynn and Savage, R. (2003) Etransactions in the Australian supply chain setting, in Ang Soo Keng, James (eds), ICEB 2003 : Proceeding of the Third International Conference on Electronic Business, National University of Singapore, Business School, Singapore [E1]
DRO entry for this publication

Lim, Kieran F., Beliakov, Gleb and Batten, Lynn (2003) A new method for locating the global optimum : application of the cutting angle method to molecular structure prediction, in Sloot, Peter; Abramson, David; Bogdanov, Alexander; Gorbachev, Yuriy; Dongarra, Jack and Zomaya, Albert (eds), ICCS 2003 : Proceedings of the 2003 International Conference on Computational Science, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003 : proceedings, pp. 1040-1049, Springer, Berlin, Germany [E1]
Citation counts: Scopus - 1, Thomson - 7
DRO entry for this publication

2002 School of Information Technology

Batten, Lynn (2002) Decompositions of finite projective planes, International mathematical journal, vol. 1, no. 2, pp. 149-159, International Scientific Publications, Japan [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Batten, Lynn M. and Beliakov, Gleb (2002) Fast algorithm for the cutting angle method of global optimization, Journal of global optimization, vol. 24, no. 2, pp. 149-161, Springer, Dordrecht, The Netherlands [C1]
ERA journal ID: 246 – Scopus EID: Not tagged
Citation counts: Thomson - 17
DRO entry for this publication

Batten, Lynn and Warren, Matthew (2002) Information warfare incident monitoring - government or public responsibility?, in William Hutchinson (ed.), Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, pp. 261-274, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Batten, Lynn and Whiten, B.* (2002) Inferring eye movements on the basis of head and visual target position, in Hewitt, John (eds), Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, pp. 41-59, Australian Mathematical Society, Adelaide, S. Aust. [E1]
DRO entry for this publication

Warren, Matthew and Batten, Lynn (2002) Security management: an information systems setting, in Batten, Lynn (eds), Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, pp. 257-270, Springer Verlag, Berlin/Heidelberg, Germany [E1]
DRO entry for this publication

Batten, Lynn (2002) ACISP 2002 : Information security and privacy : 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings, in Batten, Lynn (eds), Springer, Berlin, Germany [E4]
DRO entry for this publication

2001 School of Information Technology

Batten, Lynn and Dover, Jeremy* (2001) Blocking semiovals of Type (1,M+1,N+1), SIAM journal of discrete mathematics, vol. 14, no. 4, pp. 446-457, Society for Industrial & Applied Mathematics, Philadelphia, Pa. [C1]
ERA journal ID: 395 – Scopus EID: Not tagged
Citation counts: Scopus - 3
DRO entry for this publication

Desmedt, Yvo*, Safavi-Naini, Rei*, Wang, Huaxiong*, Batten, Lynn, Charnes, Chris* and Pieprzyk, Josef* (2001) Broadcast anti-jamming systems, Computer networks, vol. 35, no. 2-3, pp. 223-236, Elsevier Science B.V., Amsterdam, The Netherlands [C1]
ERA journal ID: 22147 – Scopus EID: 2-s2.0-0346404159
Citation counts: Scopus - 11, Thomson - 11
DRO entry for this publication

2000 School of Information Technology

Batten, L. (2000) Decompositions of finite projective planes, International Mathematical Journal, vol. 0, no. 0, pp. 1-11, Scientific Press, Japan [CN]
ERA journal ID: Not matching ERA journal list
no DRO entry yet for this publication

Batten, L., Davidson, M. and Storme, L.* (2000) An analysis of Chen's construction of Minimum-Distance Five Codes, Transactions on Information Theory, vol. 0, no. 0, pp. 505-511, IEEE, USA [CN]
ERA journal ID: 4454 – Scopus EID: Not tagged
no DRO entry yet for this publication

Batten, L. (2000) Security for future computer environments, in Deakin University (ed.), 1st Australian Information Security Management Workshop, pp. 1-7, Deakin University, Melbourne [L1]
no DRO entry yet for this publication

Grants and Consultancies

All years

Research Income - National Competitive Grants

Bertok, P*, Tari, Z* and Batten, L. Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments, ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry [T]

  • 2011: $26,843
  • 2010: $52,280

Horadam, K*, Batten, L, Boztas, S*, Ebringer, T*, Kaminski, J*, Tian, R* and Tian, R. Analysis and classification of malicious code, ARC Collaborative - Linkage - Projects (Round 2), ARC Collaborative - Linkage - Projects (Round 2), ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry [T]

  • 2010: $75,790
  • 2008: $34,145

Dawson, E*, Batten, L and Simpson, L*. Efficient and Secure Word-Based Stream Ciphers for Wireless Communications, Australian Research Council Discovery Project [T]

  • 2006: $16,666
  • 2005: $16,666
  • 2004: $16,666

Research Income - Other Public Sector Funding

Bertok, P*, Tari, Z* and Batten, L. Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments [U]

  • 2010: $7,860

Batten, L, Doss, R and Palm, B*. Recovery Mechanisms for Wireless Sensor Devices [U]

  • 2009: $18,855
  • 2008: $67,348

Castleman, T and Batten, L. Protection of National Information Infrastructure (NII) e-security environment [U]

  • 2004: $5,000

Research Income - Industry and Other Funding

Batten, L and Moonsamy, V. AMSI Internship for Veelasha Moonsamy with NBN Co - User privacy in mobile applications [V]

  • 2013: $18,919

Batten, L and Moonsamy, V. AMSI Internship No. 2 for Veelasha Moonsamy with NBN Co [V]

  • 2013: $23,000

Batten, L and Castleman, T. Supplier wide eBusiness engagement Project [V]

  • 2003: $25,000
  • 2002: $25,000

Research Income - Industry and Other Funding - Australian

Tian, R and Batten, L. Scholarship, Computer malware analysis [V.1]

  • 2010: $76,227
  • 2008: $86,140
  • 2007: $30,000

Research Income - Industry and Other Funding - International B (Other Income)

Batten, L and Moonsamy, V. AMSI Internship for Veelasha Moonsamy with NBN Co - User privacy in mobile applications [V.3]

  • 2013: $5,663

Higher Degree by Research Completions supervised by Lynn Batten

2012

Bai Li
Doctor of Philosophy, Thesis entitled: Recovery Mechanisms on Sensor Networks. School of Information Technology

Luke Mason
Doctor of Philosophy, Thesis entitled: On the Minimum Cardinality Problem in Intensity Modulated Radiotherapy. School of Information Technology

Ronghua Tian
Doctor of Philosophy, Thesis entitled: An Integrated Malware Detection and Classification System. School of Information Technology

2009

Ana Palavestra (nee Jancic)
Master of Science, Thesis entitled: Authentication in Public Key Encryption Schemes.
School of Information Technology Requires an Internet connection

2008

Lei Pan
Doctor of Philosophy, Thesis entitled: A Performance Testing Framework for Digital Forensic Tools. School of Engineering and Information Technology

2004

Azmeri Khan
Doctor of Philosophy, Thesis entitled: Many-Sample Location and Scale Test with Quantile-Function Error Distributions.
School of Information Technology Requires an Internet connection

Michelle Cyganowski
Master of Science, Thesis entitled: A Quantile Distribution Approach to the One-Sample Location Problem.
School of Information Technology Requires an Internet connection

2003

Daniel Stonier
Doctor of Philosophy, Thesis entitled: Stability Theory and Numerical Analysis of Non-Autonomous Dynamical Systems.
School of Information Technology Requires an Internet connection

2002

Thanh-Binh Duong
Doctor of Philosophy, Thesis entitled: Application of Real and Functional Analysis to Solve Boundary Value Problems.
School of Information Technology Requires an Internet connection

Nicholas Yannios
Doctor of Philosophy, Thesis entitled: Computational Aspects of the Numerical Solution of SDEs.
School of Information Technology Requires an Internet connection

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Tuesday 30th September 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

23rd July 2011