Publications
A new Rabin-type cryptosystem with modulus 𝑝2𝑞
Digby Mooney, Lynn Batten, Leo Zhang
(2020), pp. 61-77, ATIS 2020 : Proceedings of the 11th International Conference on Applications and Techniques in Information Security, Online from Brisbane, Qld., E1
Off-line digital cash schemes providing untraceability, anonymity and change
L Batten, X Yi
(2019), Vol. 19, pp. 81-110, Electronic commerce research, New York, N.Y., C1
A novel approach for information discovery in wireless sensor grids
M Tissera, R Doss, G Li, V Mak-Hau, L Batten
(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1
Efficiencies in binary elliptic curves
S Hirschfeld, L Batten, M Amain
(2018), Vol. 10964, pp. 246-260, ICCSA 2018 : Proceedings of the 18th International Conference on Computational Science and Applications, Melbourne, Vic., E1
Aggregating privatized medical data for secure querying applications
K Singh, L Batten
(2017), Vol. 72, pp. 250-263, Future generation computer systems, Amsterdam, The Netherlands, C1
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, H Chen, H Luan, H Bootwala, L Batten
(2017), Vol. 36, pp. 90-100, Journal of information security and applications, Amsterdam, The Netherlands, C1
A testbed for security analysis of modern vehicle systems
X Zheng, L Pan, H Chen, R Di Pietro, L Batten
(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1
L Batten, G Li
(2016), A7
New directions in IoT privacy using attribute-based authentication
G Alpár, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, I Natgunanathan
(2016), pp. 461-466, 2016 ACM International Conference on Computing Frontiers Proceedings, Como, Italy, E1
A new sign-change attack on the Montgomery ladders
L Batten, M Amain
(2016), Vol. 651, pp. 3-14, ATIS 2016 : Proceedings of the 6th International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1
Mobile money in the Australasian region - a technical security perspective
S Parasa, L Batten
(2016), Vol. 651, pp. 154-162, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1
Novel approach for information discovery in autonomous wireless sensor networks
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1
Smartphone applications, malware and data theft
L Batten, V Moonsamy, M Alazab
(2015), Vol. 412, pp. 15-24, ICC3 : Proceedings of the 2nd International Conference on Computational Intelligence, Cyber Security & Computational Models, Coimbatore, Tamil Nadu, India, B1-1
Cryptographic public key length prediction
M Amain, L Batten
(2015), Vol. 557, pp. 27-35, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1
Survey in smartphone malware analysis techniques
M Alazab, L Batten
(2015), pp. 105-130, New Threats and Countermeasures in Digital Crime and Cyber Terrorism, B1
Cloud omnibus system for evaluating cloud market services
W Priyardarshani, L Batten, G Wikramanayake, A Kelarev
(2015), Vol. 4, pp. 335-352, International journal of cloud computing, Olney, Eng., C1
W Niu, G Li, J Liu, J Tan, L Guo, Z Han, L Batten
(2015), Berlin, Germany, A7
Segregation-of-duties conflicts in the insider threat landscape: an overview and case study
S Ballesteros, L Pan, L Batten, G Li
(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs
M Tissera, R Doss, G Li, L Batten
(2015), pp. 88-93, 25th International Telecommunication Networks and Applications Conference, ITNAC 2015, E1
An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones
Y Rahulamathavan, V Moonsamy, L Batten, S Shunliang, M Rajarajan
(2014), Vol. 8544, pp. 430-437, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1
The 0-1 Knapsack polytope - a starting point for cryptanalysis of Knapsack ciphers?
V Mak-Hau, L Batten
(2014), Vol. 490, pp. 171-182, Communications in Computer and Information Science, Berlin, Germany, B1
vPELS : An e-learning social environment for VLSI design with content security using DRM
J Dewan, M Chowdhury, L Batten
(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1
PELS: A noble architecture and framework for a personal E-learning system (PELS)
J Dewan, M Chowdhury, L Batten
(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1
Applications and techniques in information security
L Batten, G Li, W Niu, M Warren
(2014), Vol. 490, pp. III-IV, Communications in Computer and Information Science, A7
Android applications: data leaks via advertising libraries
V Moonsamy, L Batten
(2014), pp. 314-317, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1
A solution for privacy-preserving, remote access to sensitive data
K Singh, J Zhong, L Batten, P Bertok
(2014), pp. 309-313, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1
Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL Pinning and DNSSec
V Moonsamy, L Batten
(2014), pp. 5-13, Proceedings of the 12th Australian Information Security Management Conference, Perth, WA, E1
Sharing sensitive medical data sets for research purposes - a case study
K Singh, J Rong, L Batten
(2014), pp. 555-562, DSAA 2014 : Proceedings of the International Data Science and Advanced Analytics Conference, Shanghai, China, E1
Energy efficient information discovery approach for range queries in multi-dimensional WSNs
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1
An attack-resistant hybrid data-privatization method with low information loss
K Singh, L Batten
(2013), pp. 263-271, Trust management VII, Berlin, Germany, B1
Contrasting permission patterns between clean and malicious android applications
V Moonsamy, J Rong, S Liu, G Li, L Batten
(2013), Vol. 127 LNICST, pp. 69-85, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, B1
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, L Batten, S Versteeg
(2013), Vol. 36, pp. 646-656, Journal of network and computer applications, Amsterdam, The Netherlands, C1
An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents
J Dewan, M Chowdhury, L Batten
(2013), Vol. 10, pp. 236-241, E-Learning and Digital Media, C1
E-learning content authentication using bipartite matching
J Dewan, M Chowdhury, L Batten
(2013), pp. 51-55, SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, E1
Information discovery in multidimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1
Can smartphone users turn off tracking service settings?
V Moonsamy, L Batten, M Shore
(2013), pp. 455-463, ACM International Conference Proceeding Series, E1
An adaptive approach to information discovery in multi-dimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 203-208, Proceedings of the International Conference on Sensing Technology, ICST, E1
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
(2012), Vol. 7161 LNCS, pp. 176-188, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), B1
Securing data privacy on mobile devices in emergency health situations
K Singh, J Zhong, V Mirchandani, L Batten, P Bertok
(2012), Vol. 107 LNICST, pp. 119-130, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, B1
A comparison of the classification of disparate malware collected in different time periods
R Islam, R Tian, V Moonsamy, L Batten
(2012), Vol. 7, pp. 946-955, Journal of networks, Oulu, Finland, C1
Hypothesis generation and testing in event profiling for digital forensic investigations
L Batten, L Pan, N Khan
(2012), Vol. 4, pp. 1-14, International Journal of Digital Crime and Forensics, C1
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
(2012), Vol. 7, pp. 181-193, International Journal of Security and Networks, C1
Using hypothesis generation in event profiling for digital forensic investigations
L Pan, N Khan, L Batten
(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1
Analysis of malicious and benign android applications
M Alazab, V Monsamy, L Batten, R Tian, P Lantz
(2012), pp. 608-616, Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012, E1
Zero permission android applications - attacks and defenses
V Moonsamy, L Batten
(2012), pp. 5-9, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1
Microsoft and Amazon: A comparison of approaches to cloud security
G Tajadod, L Batten, K Govinda
(2012), pp. 539-544, CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, E1
An Efficient Solution for Privacypreserving, Secure Remote Access to Sensitive Data
Kalpana Singh
(2012), Computer Science & Information Technology (CS & IT), E1
Implementing recovery in low-resource stationary wireless sensor networks
B Li, L Batten, R Doss
(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1
E-commerce: Protecting purchaser privacy to enforce trust
G Antoniou, L Batten
(2011), Vol. 11, pp. 421-456, Electronic Commerce Research, C1
Using relationship-building in event profiling for digital forensic investigations
L Batten, L Pan
(2011), Vol. 56, pp. 40-52, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1
Heraclitus: A LFSR-based stream cipher with key dependent structure
B Colbert, A Dekker, L Batten
(2011), pp. 141-145, ICCSP 2011 - 2011 International Conference on Communications and Signal Processing, E1
Prevention of information harvesting in a cloud services environment
L Batten, J Abawajy, R Doss
(2011), pp. 66-72, CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, E1
Dealing with rogue virtual machines in a cloud services environment
B Colbert, L Batten
(2011), pp. 43-48, CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, E1
Smartphone Malware based on synchronization Vulnerabilities
M Alazab, A Alazab, L Batten
(2011), pp. 8-13, 7th International Conference on Information Technology and Application, ICITA 2011, E1
A comparison of the classification of disparate malware collected in different time periods
R Islam, R Tian, V Moonsamy, L Batten
(2011), pp. 22-27, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1
Network resilience in low-resource mobile wireless sensor networks
B Li, L Batten, R Doss
(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1
Wireless broadcast encryption based on smart cards
X Yi, L Batten
(2010), Vol. 16, pp. 153-165, Wireless Networks, C1
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
(2010), pp. 9-17, CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, Ballarat, Victoria, E1
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
(2010), pp. 23-30, MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, Nancy, France, E1
The padding scheme for RSA signatures
L Batten, C Wolf
(2010), pp. 1-7, ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, Melbourne, Victoria, E1
A privacy preserving e-payment scheme
G Antoniou, G Antoniou, L Batten, L Batten, S Narayan, S Narayan, U Parampalli, U Parampalli
(2009), Vol. 237, pp. 197-202, Studies in Computational Intelligence, Berlin, Germany, B1
An anonymity revocation technology for anonymous communication
G Antoniou, L Batten, U Parampalli
(2009), pp. 329-337, Information systems development : towards a service provision society, New York, N.Y., B1
B Li, L Batten
(2009), Vol. 32, pp. 377-387, Journal of Network and Computer Applications, C1
Robust performance testing for digital forensic tools
L Pan, L Batten
(2009), Vol. 6, pp. 71-81, Digital Investigation, C1
Robust correctness testing for digital forensic tools
L Pan, L Batten
(2009), Vol. 8 LNICST, pp. 54-64, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1
Fast recovery from node compromise in wireless sensor networks
B Li, R Doss, L Batten, W Schott
(2009), 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009, E1
Lightweight authentication for recovery in wireless sensor networks
B Li, L Batten, R Doss
(2009), pp. 465-471, MSN 2009 - 5th International Conference on Mobile Ad-hoc and Sensor Networks, E1
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
(2009), pp. 23-30, MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, Montréal, Quebec, Canada, E1
Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks
S Al Hinai, L Batten, B Colbert
(2008), Vol. 4990 LNCS, pp. 201-215, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
Designing information systems which manage or avoid privacy incidents
G Antoniou, L Batten, U Parampalli
(2008), Vol. 5376 LNCS, pp. 131-142, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
A trusted approach to e-commerce
G Antoniou, L Batten, U Parampalli
(2008), Vol. 5159 LNCS, pp. 119-132, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
Efficient broadcast key distribution with dynamic revocation
Lynn Batten, Xun Yi
(2008), Vol. 1, pp. 351-362, SECURITY AND COMMUNICATION NETWORKS, C1
Teaching digital forensics to undergraduate students
L Batten, L Pan
(2008), Vol. 6, pp. 54-56, IEEE Security and Privacy, C1
Function length as a tool for malware classification
R Tian, L Batten, S Versteeg
(2008), pp. 69-76, 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, E1
Measure of integrity leakage in live forensic context
L Pan, A Savoldi, P Gubian, L Batten
(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1
Extending abelian groups to rings
L Batten, R Coulter, M Henderson
(2007), Vol. 82, pp. 297-313, Journal of the Australian Mathematical Society, C1
L Batten, G LeGrand
(2007), Vol. 13, pp. 15-30, Journal of Contemporary Issues in Business and Government, Bentley, W.A., C1
Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks
B Li, L Batten
(2007), pp. 2507-2510, 2007 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2007, E1
Bai Li, Lynn Batten
(2007), pp. 156-163, 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, Dalian, PEOPLES R CHINA, E1
A lower bound on effective performance testing for digital forensic tools
L Pan, L Batten
(2007), pp. 117-130, Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering, E1
An effective and efficient testing methodology for correctness testing for file recovery tools
L Pan, L Batten
(2007), Vol. 2, pp. 103-107, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007., E1
Monitoring Employees' Emails without Violating Their Privacy Right
Giannakis Antoniou, Udaya Parampalli, Lynn Batten
(2007), Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), E1
Compressed nested certificates provide more efficient PKI
A Jancic, L Batten
(2007), pp. 40-50, IWAP 2007 : Proceedings of the Sixth International Workshop for Applied PKC, Perth, Western Australia, E1
L Batten, G LeGrand
(2006), Vol. 36, pp. 415-424, WIT Transactions on Information and Communication Technologies, B1
Linear spaces: Geometric aspects
L Batten
(2006), pp. 506-512, Handbook of Combinatorial Designs, Second Edition, B1
Algebraic attacks on clock-controlled stream ciphers
S Al-Hinai, L Batten, B Colbert, K Wong
(2006), Vol. 4058 LNCS, pp. 1-16, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
Skew arcs and Wagner's [23, 14, 5] code
M Davidson, L Batten
(2006), Vol. 56, pp. 191-201, Journal of combinatorial mathematics and combinatorial computing, Winnipeg, Canada, C1
Algebraic attacks on clock-controlled cascade ciphers
K Wong, B Colbert, L Batten, S Al-Hinai
(2006), Vol. 4329 LNCS, pp. 32-47, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
G LeGrand, L Batten
(2006), pp. 208-219, Recent advances in security technology : proceedings of the 2006 RNSA Security Technology Conference, Canberra, 2006, Canberra, A.C.T., E1
Information sharing in supply chain systems
L Batten, R Savage
(2005), pp. 67-82, Global Integrated Supply Chain Systems, B1
Securing small business - The role of information technology policy
L Batten, T Castleman
(2005), ACIS 2005 Proceedings - 16th Australasian Conference on Information Systems, E1
Reproducibility of digital evidence in forensic investigations
L Pan, L Batten
(2005), Digital Forensic Research Workshop 2005, E1
L Batten
(2004), Vol. 3348, pp. 84-91, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
Engaging suppliers in electronic trading across industry sectors
L Batten, T Castleman, C Chan, D Coulthard, R Savage, L Wilkins
(2004), pp. 182-199, Multi-disciplinary solutions to industry & government's e-business challenges : proceedings of the IFIP WG8.4 Working Conference on E-business, Salzburg, Austria, June 18-19 2004, Salzburg, Austria, E1
Ecommerce strategy in a multi-sector trading environment - quandaries for SMEs
D Coulthard, T Castleman, L Batten
(2004), pp. 1-13, 17th Bled eCommerce Conference : eGlobal, Bled, Slovenia, June 21-24, 2004, conference proceedings, Bled, Slovenia, E1
Predicting molecular structures: An application of the cutting angle method
K Lim, G Beliakov, L Batten
(2003), Vol. 5, pp. 3884-3890, Physical Chemistry Chemical Physics, C1
Permutations with a distinct difference property
L Batten, S Sane
(2003), Vol. 261, pp. 59-67, Discrete Mathematics, C1
K Lim, G Beliakov, L Batten
(2003), Vol. 2660, pp. 1040-1049, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1
The major drawbacks to the use of wireless communication products in education
L Batten, M Chowdhury, J Drew
(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1
Etransactions in the Australian supply chain setting
L Batten, R Savage
(2003), ICEB 2003 : Proceeding of the Third International Conference on Electronic Business, Singapore, E1
E-business security strategies for SMEs
L Batten, S Wasif
(2003), Conference Proceedings - M-Business, E-Commerce and the Impact of Broadband on Regional Development and Business Prospects : Perth : June 22-24, 2003, Perth, Western Australia, E1
Fast algorithm for the cutting angle method of global optimization
L Batten, G Beliakov
(2002), Vol. 24, pp. 149-161, JOURNAL OF GLOBAL OPTIMIZATION, C1
Decompositions of finite projective planes
L Batten
(2002), Vol. 1, pp. 149-159, International mathematical journal, Japan, C1
Information warfare incident monitoring - government or public responsibility?
L Batten, M Warren
(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, WA, E1
Security management: An information systems setting
M Warren, L Batten
(2002), Vol. 2384, pp. 257-270, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1
Blocking semiovals of type (1, M + 1, N + 1)
L Batten, J Dover
(2001), Vol. 14, pp. 446-457, SIAM Journal on Discrete Mathematics, C1
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
(2001), Vol. 35, pp. 223-236, Computer Networks, C1
Inferring eye movements on the basis of head and visual target position
L Batten, B Whiten
(2001), pp. 41-59, Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, Adelaide, South Australia, E1
Funded Projects at Deakin
Australian Competitive Grants
Efficient and Secure Word-Based Stream Ciphers for Wireless Communications
Prof Edward Dawson, Prof Lynn Batten, Dr Leonie Simpson
ARC - Discovery Projects
- 2006: $16,666
Analysis and classification of malicious code
Prof Kathryn Horadam, Prof Lynn Batten, A/Prof Serdar Boztas, Dr Timothy Ebringer, Mr Jakub Kaminski, Ms Ronghua Tian
ARC Linkage - Projects Rnd 2, ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry
- 2010: $75,790
- 2008: $34,145
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments
Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten
ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry, ARC Linkage - Projects Rnd 1
- 2014: $14,358
- 2011: $26,843
Other Public Sector Funding
Recovery Mechanisms for Wireless Sensor Devices
Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm
- 2009: $18,855
- 2008: $67,348
Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments
Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten
- 2010: $7,860
Industry and Other Funding
Scholarship, Computer malware analysis
Prof Lynn Batten, Ms Ronghua Tian
- 2010: $76,227
- 2008: $86,140
- 2007: $30,000
AMSI Internship for Veelasha Moonsamy with NBN Co - User privacy in mobile applications
Prof Lynn Batten, Miss Veelasha Moonsamy
- 2013: $24,581
AMSI Internship No. 2 for Veelasha Moonsamy with NBN Co
Prof Lynn Batten, Miss Veelasha Moonsamy
- 2013: $23,000
Supervisions
Mohammed Khalil Ibrahim Amain
Thesis entitled: Fault attacks on RSA and Elliptic Curve cryptosystems
Doctor of Philosophy (Information Technology), School of Information Technology
Veelasha Moonsamy
Thesis entitled: Security and Privacy of Users' Personal Information on Smartphones
Doctor of Philosophy (Information Technology), School of Information Technology
Kalpana Singh
Thesis entitled: Aggregating Privatized Medical Data for Secure Querying Applications
Doctor of Philosophy (Information Technology), School of Information Technology
Moutaz Alazab
Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware
Doctor of Philosophy (Information Technology), School of Information Technology
Luke Mason
Thesis entitled: On the Minimum Cardinality Problem in Intensity Modulated Radiotherapy
Doctor of Philosophy (Information Technology), School of Information Technology
Bai Li
Thesis entitled: Recovery Mechanisms on Sensor Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Ronghua Tian
Thesis entitled: An Integrated Malware Detection and Classification System
Doctor of Philosophy (Information Technology), School of Information Technology
Ana Palavestra
Thesis entitled: Authentication in Public Key Encryption Schemes
Master of Science (Information Technology), School of Information Technology
Lei Pan
Thesis entitled: A Performance Testing Framework for Digital Forensic Tools
Doctor of Philosophy (Information Technology), School of Information Technology
Azmeri Khan
Thesis entitled: Many-Sample Location and Scale Test with Quantile-Function Error Distributions
Doctor of Philosophy (Information Technology), School of Information Technology
Michelle Cyganowski
Thesis entitled: A Quantile Distribution Approach to the One-Sample Location Problem
Master of Science (Information Technology), School of Information Technology
Daniel Stonier
Thesis entitled: Stability Theory and Numerical Analysis of Non-autonomous Dynamical Systems
Doctor of Philosophy (Information Technology), School of Information Technology
Thanh Binh Duong
Thesis entitled: Application of Real and Functional Analysis to Solve Boundary Value Problems
Doctor of Philosophy (Information Technology), School of Information Technology
Nicholas Yannios
Thesis entitled: Computational Aspects of the Numerical Solution of SDEs
Doctor of Philosophy (Information Technology), School of Information Technology
Azmeri Khan
Thesis entitled: Adjusted adaptive cluster sampling
Master of Science, School of Information Technology
Jahangir Dewan
Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning
Doctor of Philosophy (Information Technology), School of Information Technology
Warnakulasuriya Menik Randi Tissera
Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks
Doctor of Philosophy (Information Technology), School of Information Technology