EmPr Lynn Batten

STAFF PROFILE

Position

Emeritus Professor

Faculty

Faculty of Sci Eng & Built Env

Department

Faculty Office

Campus

Off-Campus (Home)

Publications

Filter by

2019

Off-line digital cash schemes providing untraceability, anonymity and change

L Batten, X Yi

(2019), Vol. 19, pp. 81-110, Electronic commerce research, New York, N.Y., C1

journal article
2018

A novel approach for information discovery in wireless sensor grids

M Tissera, R Doss, G Li, V Mak-Hau, L Batten

(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1

journal article

Efficiencies in binary elliptic curves

S Hirschfeld, L Batten, M Amain

(2018), Vol. 10964, pp. 246-260, ICCSA 2018 : Proceedings of the 18th International Conference on Computational Science and Applications, Melbourne, Vic., E1

conference
2017

Aggregating privatized medical data for secure querying applications

K Singh, L Batten

(2017), Vol. 72, pp. 250-263, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Cyber security attacks to modern vehicular systems

L Pan, X Zheng, H Chen, H Luan, H Bootwala, L Batten

(2017), Vol. 36, pp. 90-100, Journal of information security and applications, Amsterdam, The Netherlands, C1

journal article

A testbed for security analysis of modern vehicle systems

X Zheng, L Pan, H Chen, R Di Pietro, L Batten

(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1

conference
2016

Applications and techniques in information security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, proceedings

L Batten, G Li

(2016), A7

edited book

New directions in IoT privacy using attribute-based authentication

G Alpr, L Batina, L Batten, V Moonsamy, A Krasnova, A Guellier, I Natgunanathan

(2016), pp. 461-466, 2016 ACM International Conference on Computing Frontiers Proceedings, Como, Italy, E1

conference

A new sign-change attack on the Montgomery ladders

L Batten, M Amain

(2016), Vol. 651, pp. 3-14, ATIS 2016 : Proceedings of the 6th International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Mobile money in the Australasian region - a technical security perspective

S Parasa, L Batten

(2016), Vol. 651, pp. 154-162, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference
2015

Novel approach for information discovery in autonomous wireless sensor networks

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

book chapter

Smartphone applications, malware and data theft

L Batten, V Moonsamy, M Alazab

(2015), Vol. 412, pp. 15-24, ICC3 : Proceedings of the 2nd International Conference on Computational Intelligence, Cyber Security & Computational Models, Coimbatore, Tamil Nadu, India, B1-1

book chapter

Cryptographic public key length prediction

M Amain, L Batten

(2015), Vol. 557, pp. 27-35, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1

book chapter

Survey in smartphone malware analysis techniques

M Alazab, L Batten

(2015), pp. 105-130, New Threats and Countermeasures in Digital Crime and Cyber Terrorism, B1

book chapter

Cloud omnibus system for evaluating cloud market services

W Priyardarshani, L Batten, G Wikramanayake, A Kelarev

(2015), Vol. 4, pp. 335-352, International journal of cloud computing, Olney, Eng., C1

journal article

Applications and techniques in information security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

W Niu, G Li, J Liu, J Tan, L Guo, Z Han, L Batten

(2015), Berlin, Germany, A7

edited book

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

S Ballesteros, L Pan, L Batten, G Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1

conference

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs

M Tissera, R Doss, G Li, L Batten

(2015), pp. 88-93, 25th International Telecommunication Networks and Applications Conference, ITNAC 2015, E1

conference
2014

An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones

Y Rahulamathavan, V Moonsamy, L Batten, S Shunliang, M Rajarajan

(2014), Vol. 8544, pp. 430-437, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

book chapter

The 0-1 Knapsack polytope - a starting point for cryptanalysis of Knapsack ciphers?

V Mak-Hau, L Batten

(2014), Vol. 490, pp. 171-182, Communications in Computer and Information Science, Berlin, Germany, B1

book chapter

vPELS : An e-learning social environment for VLSI design with content security using DRM

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1

journal article

PELS: A noble architecture and framework for a personal E-learning system (PELS)

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1

journal article

Applications and techniques in information security

L Batten, G Li, W Niu, M Warren

(2014), Vol. 490, pp. III-IV, Communications in Computer and Information Science, A7

edited book

Android applications: data leaks via advertising libraries

V Moonsamy, L Batten

(2014), pp. 314-317, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1

conference

A solution for privacy-preserving, remote access to sensitive data

K Singh, J Zhong, L Batten, P Bertok

(2014), pp. 309-313, ISITA 2014 : Proceedings of International Symposium on Information Theory and Its Applications, Melbourne, Victoria, E1

conference

Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL Pinning and DNSSec

V Moonsamy, L Batten

(2014), pp. 5-13, Proceedings of the 12th Australian Information Security Management Conference, Perth, WA, E1

conference

Sharing sensitive medical data sets for research purposes - a case study

K Singh, J Rong, L Batten

(2014), pp. 555-562, DSAA 2014 : Proceedings of the International Data Science and Advanced Analytics Conference, Shanghai, China, E1

conference

Energy efficient information discovery approach for range queries in multi-dimensional WSNs

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1

conference
2013

An attack-resistant hybrid data-privatization method with low information loss

K Singh, L Batten

(2013), pp. 263-271, Trust management VII, Berlin, Germany, B1

book chapter

Contrasting permission patterns between clean and malicious android applications

V Moonsamy, J Rong, S Liu, G Li, L Batten

(2013), Vol. 127 LNICST, pp. 69-85, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, B1

book chapter

Classification of malware based on integrated static and dynamic features

R Islam, R Tian, L Batten, S Versteeg

(2013), Vol. 36, pp. 646-656, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal article

An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents

J Dewan, M Chowdhury, L Batten

(2013), Vol. 10, pp. 236-241, E-Learning and Digital Media, C1

journal article

E-learning content authentication using bipartite matching

J Dewan, M Chowdhury, L Batten

(2013), pp. 51-55, SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, E1

conference

Information discovery in multidimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1

conference

Can smartphone users turn off tracking service settings?

V Moonsamy, L Batten, M Shore

(2013), pp. 455-463, ACM International Conference Proceeding Series, E1

conference

An adaptive approach to information discovery in multi-dimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 203-208, Proceedings of the International Conference on Sensing Technology, ICST, E1

conference
2012

Feature reduction to speed up malware classification

V Moonsamy, R Tian, L Batten

(2012), Vol. 7161 LNCS, pp. 176-188, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), B1

book chapter

Securing data privacy on mobile devices in emergency health situations

K Singh, J Zhong, V Mirchandani, L Batten, P Bertok

(2012), Vol. 107 LNICST, pp. 119-130, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, B1

book chapter

A comparison of the classification of disparate malware collected in different time periods

R Islam, R Tian, V Moonsamy, L Batten

(2012), Vol. 7, pp. 946-955, Journal of networks, Oulu, Finland, C1

journal article

Hypothesis generation and testing in event profiling for digital forensic investigations

L Batten, L Pan, N Khan

(2012), Vol. 4, pp. 1-14, International Journal of Digital Crime and Forensics, C1

journal article

Towards an understanding of the impact of advertising on data leaks

V Moonsamy, M Alazab, L Batten

(2012), Vol. 7, pp. 181-193, International Journal of Security and Networks, C1

journal article

Using hypothesis generation in event profiling for digital forensic investigations

L Pan, N Khan, L Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1

conference

Analysis of malicious and benign android applications

M Alazab, V Monsamy, L Batten, R Tian, P Lantz

(2012), pp. 608-616, Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012, E1

conference

Zero permission android applications - attacks and defenses

V Moonsamy, L Batten

(2012), pp. 5-9, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Microsoft and Amazon: A comparison of approaches to cloud security

G Tajadod, L Batten, K Govinda

(2012), pp. 539-544, CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, E1

conference

An Efficient Solution for Privacypreserving, Secure Remote Access to Sensitive Data

Kalpana Singh

(2012), Computer Science & Information Technology (CS & IT), E1

conference
2011

Implementing recovery in low-resource stationary wireless sensor networks

B Li, L Batten, R Doss

(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1

book chapter

E-commerce: Protecting purchaser privacy to enforce trust

G Antoniou, L Batten

(2011), Vol. 11, pp. 421-456, Electronic Commerce Research, C1

journal article

Heraclitus: A LFSR-based stream cipher with key dependent structure

B Colbert, A Dekker, L Batten

(2011), pp. 141-145, ICCSP 2011 - 2011 International Conference on Communications and Signal Processing, E1

conference

Prevention of information harvesting in a cloud services environment

L Batten, J Abawajy, R Doss

(2011), pp. 66-72, CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, E1

conference

Dealing with rogue virtual machines in a cloud services environment

B Colbert, L Batten

(2011), pp. 43-48, CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, E1

conference

Smartphone Malware based on synchronization Vulnerabilities

M Alazab, A Alazab, L Batten

(2011), pp. 8-13, 7th International Conference on Information Technology and Application, ICITA 2011, E1

conference

A comparison of the classification of disparate malware collected in different time periods

R Islam, R Tian, V Moonsamy, L Batten

(2011), pp. 22-27, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference
2010

Network resilience in low-resource mobile wireless sensor networks

B Li, L Batten, R Doss

(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1

book chapter

Wireless broadcast encryption based on smart cards

X Yi, L Batten

(2010), Vol. 16, pp. 153-165, Wireless Networks, C1

journal article

Classification of malware based on string and function feature selection

R Islam, R Tian, L Batten, S Versteeg

(2010), pp. 9-17, CTC 2010 : Proceedings of the Second Cybercrime and Trustworthy Computing Workshop 2010, Ballarat, Victoria, E1

conference

Differentiating malware from cleanware using behavioural analysis

R Tian, R Islam, L Batten, S Versteeg

(2010), pp. 23-30, MALWARE 2010 : Proceedings of the 5th International Conference on Malicious and Unwanted Software 2010, Nancy, France, E1

conference

The padding scheme for RSA signatures

L Batten, C Wolf

(2010), pp. 1-7, ATIS 2010 : Proceedings of the 1st Applications and Techniques in Information Security Workshop, Melbourne, Victoria, E1

conference

Using relationship-building in event profiling for digital forensic investigations

L Batten, L Pan

(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1

conference
2009

A privacy preserving e-payment scheme

G Antoniou, G Antoniou, L Batten, L Batten, S Narayan, S Narayan, U Parampalli, U Parampalli

(2009), Vol. 237, pp. 197-202, Studies in Computational Intelligence, Berlin, Germany, B1

book chapter

An anonymity revocation technology for anonymous communication

G Antoniou, L Batten, U Parampalli

(2009), pp. 329-337, Information systems development : towards a service provision society, New York, N.Y., B1

book chapter

Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks

B Li, L Batten

(2009), Vol. 32, pp. 377-387, Journal of Network and Computer Applications, C1

journal article

Robust performance testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 6, pp. 71-81, Digital Investigation, C1

journal article

Robust correctness testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 8 LNICST, pp. 54-64, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1

conference

Fast recovery from node compromise in wireless sensor networks

B Li, R Doss, L Batten, W Schott

(2009), 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009, E1

conference

Lightweight authentication for recovery in wireless sensor networks

B Li, L Batten, R Doss

(2009), pp. 465-471, MSN 2009 - 5th International Conference on Mobile Ad-hoc and Sensor Networks, E1

conference

An automated classification system based on the strings of trojan and virus families

R Tian, L Batten, R Islam, S Versteeg

(2009), pp. 23-30, MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, Montral, Quebec, Canada, E1

conference
2008

Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks

S Al Hinai, L Batten, B Colbert

(2008), Vol. 4990 LNCS, pp. 201-215, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1

journal article

Designing information systems which manage or avoid privacy incidents

G Antoniou, L Batten, U Parampalli

(2008), Vol. 5376 LNCS, pp. 131-142, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1

journal article

A trusted approach to e-commerce

G Antoniou, L Batten, U Parampalli

(2008), Vol. 5159 LNCS, pp. 119-132, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1

journal article

Efficient broadcast key distribution with dynamic revocation

Lynn Batten, Xun Yi

(2008), Vol. 1, pp. 351-362, SECURITY AND COMMUNICATION NETWORKS, C1

journal article

Teaching digital forensics to undergraduate students

L Batten, L Pan

(2008), Vol. 6, pp. 54-56, IEEE Security and Privacy, C1

journal article

Function length as a tool for malware classification

R Tian, L Batten, S Versteeg

(2008), pp. 69-76, 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, E1

conference

Measure of integrity leakage in live forensic context

L Pan, A Savoldi, P Gubian, L Batten

(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1

conference
2007

Linear spaces: geometric aspects

L Batten

(2007), pp. 506-512, Handbook of combinatorial designs, Boca Raton, FL, B1

book chapter

Extending abelian groups to rings

L Batten, R Coulter, M Henderson

(2007), Vol. 82, pp. 297-313, Journal of the Australian mathematical society, Melbourne, Vic., C1

journal article

A French-Australian comparison of responsibilities for the monitoring of security and privacy issues resulting from the introduction of new technologies

L Batten, G LeGrand

(2007), Vol. 13, pp. 15-30, Journal of Contemporary Issues in Business and Government, Bentley, W.A., C1

journal article

Using mobile agents to detect node compromise in path-based DoS attacks on wireless sensor networks

B Li, L Batten

(2007), pp. 2507-2510, 2007 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2007, E1

conference

Using mobile agents to detect and recover from node compromise in path-based DoS attacks in wireless sensor networksle

Bai Li, Lynn Batten

(2007), pp. 156-163, 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, Dalian, PEOPLES R CHINA, E1

conference

A lower bound on effective performance testing for digital forensic tools

L Pan, L Batten

(2007), pp. 117-130, Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering, E1

conference

An effective and efficient testing methodology for correctness testing for file recovery tools

L Pan, L Batten

(2007), Vol. 2, pp. 103-107, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007., E1

conference

Monitoring employees emails without violating their privacy right

G Antoniou, U Parampalli, L Batten

(2007), pp. 46-50, PDCAT 2007 : Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies : 3-6 December, 2007, Adelaide, Australia, Adelaide, Australia, E1

conference

Compressed nested certificates provide more efficient PKI

A Jancic, L Batten

(2007), pp. 40-50, IWAP 2007 : Proceedings of the Sixth International Workshop for Applied PKC, Perth, Western Australia, E1

conference
2006

Information sharing in supply chain systems

L Batten, R Savage

(2006), pp. 67-82, Global integrated supply chain systems, Hershey, Pa., B1

book chapter

A French-Australian comparison of attitudes towards security and privacy in modern information technologies

L Batten, G LeGrand

(2006), Vol. 36, pp. 415-424, WIT Transactions on Information and Communication Technologies, B1

book chapter

Algebraic attacks on clock-controlled stream ciphers

S Al-Hinai, L Batten, B Colbert, K Wong

(2006), Vol. 4058 LNCS, pp. 1-16, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1

journal article

Skew arcs and Wagner's [23, 14, 5] code

M Davidson, L Batten

(2006), Vol. 56, pp. 191-201, Journal of combinatorial mathematics and combinatorial computing, Winnipeg, Canada, C1

journal article

Algebraic attacks on clock-controlled cascade ciphers

K Wong, B Colbert, L Batten, S Al-Hinai

(2006), Vol. 4329 LNCS, pp. 32-47, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1

journal article

Government responsibilities for the monitoring of security and privacy issues around new information technologies - a French-Australian comparison

G LeGrand, L Batten

(2006), pp. 208-219, Recent advances in security technology : proceedings of the 2006 RNSA Security Technology Conference, Canberra, 2006, Canberra, A.C.T., E1

conference
2005

Securing small business - The role of information technology policy

L Batten, T Castleman

(2005), ACIS 2005 Proceedings - 16th Australasian Conference on Information Systems, E1

conference

Reproducibility of digital evidence in forensic investigations

L Pan, L Batten

(2005), Digital Forensic Research Workshop 2005, E1

conference
2004

Algebraic attacks over GF(q)

L Batten

(2004), Vol. 3348, pp. 84-91, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1

journal article

Engaging suppliers in electronic trading across industry sectors

L Batten, T Castleman, C Chan, D Coulthard, R Savage, L Wilkins

(2004), pp. 182-199, Multi-disciplinary solutions to industry & government's e-business challenges : proceedings of the IFIP WG8.4 Working Conference on E-business, Salzburg, Austria, June 18-19 2004, Salzburg, Austria, E1

conference

Ecommerce strategy in a multi-sector trading environment - quandaries for SMEs

D Coulthard, T Castleman, L Batten

(2004), pp. 1-13, 17th Bled eCommerce Conference : eGlobal, Bled, Slovenia, June 21-24, 2004, conference proceedings, Bled, Slovenia, E1

conference
2003

Predicting molecular structures: An application of the cutting angle method

K Lim, G Beliakov, L Batten

(2003), Vol. 5, pp. 3884-3890, Physical Chemistry Chemical Physics, C1

journal article

Permutations with a distinct difference property

L Batten, S Sane

(2003), Vol. 261, pp. 59-67, Discrete Mathematics, C1

journal article

A new method for locating the global optimum: Application of the cutting angle method to molecular structure prediction

K Lim, G Beliakov, L Batten

(2003), Vol. 2660, pp. 1040-1049, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1

conference

The major drawbacks to the use of wireless communication products in education

L Batten, M Chowdhury, J Drew

(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Etransactions in the Australian supply chain setting

L Batten, R Savage

(2003), ICEB 2003 : Proceeding of the Third International Conference on Electronic Business, Singapore, E1

conference

E-business security strategies for SMEs

L Batten, S Wasif

(2003), Conference Proceedings - M-Business, E-Commerce and the Impact of Broadband on Regional Development and Business Prospects : Perth : June 22-24, 2003, Perth, Western Australia, E1

conference
2002

Fast algorithm for the cutting angle method of global optimization

L Batten, G Beliakov

(2002), Vol. 24, pp. 149-161, JOURNAL OF GLOBAL OPTIMIZATION, C1

journal article

Decompositions of finite projective planes

L Batten

(2002), Vol. 1, pp. 149-159, International mathematical journal, Japan, C1

journal article

Information warfare incident monitoring - government or public responsibility?

L Batten, M Warren

(2002), pp. 261-274, Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, WA, E1

conference

Security management: An information systems setting

M Warren, L Batten

(2002), Vol. 2384, pp. 257-270, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1

conference
2001

Blocking semiovals of type (1, M + 1, N + 1)

L Batten, J Dover

(2001), Vol. 14, pp. 446-457, SIAM Journal on Discrete Mathematics, C1

journal article

Broadcast anti-jamming systems

Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk

(2001), Vol. 35, pp. 223-236, Computer Networks, C1

journal article

Inferring eye movements on the basis of head and visual target position

L Batten, B Whiten

(2001), pp. 41-59, Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, Adelaide, South Australia, E1

conference

Funded Projects at Deakin

Australian Competitive Grants

Efficient and Secure Word-Based Stream Ciphers for Wireless Communications

Prof Edward Dawson, Prof Lynn Batten, Dr Leonie Simpson

ARC - Discovery Projects

  • 2006: $16,666

Analysis and classification of malicious code

Prof Kathryn Horadam, Prof Lynn Batten, A/Prof Serdar Boztas, Dr Timothy Ebringer, Mr Jakub Kaminski, Ms Ronghua Tian

ARC Linkage - Projects Rnd 2, ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry

  • 2010: $75,790
  • 2008: $34,145

Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments

Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten

ARC_DUAPAI ARC_Deakin University Australian Postgraduate Award Industry, ARC Linkage - Projects Rnd 1

  • 2014: $14,358
  • 2011: $26,843

Other Public Sector Funding

Recovery Mechanisms for Wireless Sensor Devices

Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm

  • 2009: $18,855
  • 2008: $67,348

Privacy-Preserving Remote Access to Health Information Infrastructure in Ubiquitous Computing Environments

Dr Peter Bertok, A/Prof Zahir Tari, Prof Lynn Batten

  • 2010: $7,860

Industry and Other Funding

Scholarship, Computer malware analysis

Prof Lynn Batten, Ms Ronghua Tian

  • 2010: $76,227
  • 2008: $86,140
  • 2007: $30,000

AMSI Internship for Veelasha Moonsamy with NBN Co - User privacy in mobile applications

Prof Lynn Batten, Miss Veelasha Moonsamy

  • 2013: $24,581

AMSI Internship No. 2 for Veelasha Moonsamy with NBN Co

Prof Lynn Batten, Miss Veelasha Moonsamy

  • 2013: $23,000

Supervisions

Principal Supervisor
2019

Mohammed Khalil Ibrahim Amain

Thesis entitled: Fault attacks on RSA and Elliptic Curve cryptosystems

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Kalpana Singh

Thesis entitled: Aggregating Privatized Medical Data for Secure Querying Applications

Doctor of Philosophy (Information Technology), School of Information Technology

Veelasha Moonsamy

Thesis entitled: Security and Privacy of Users' Personal Information on Smartphones

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Luke Mason

Thesis entitled: On the Minimum Cardinality Problem in Intensity Modulated Radiotherapy

Doctor of Philosophy (Information Technology), School of Information Technology

Bai Li

Thesis entitled: Recovery Mechanisms on Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Ronghua Tian

Thesis entitled: An Integrated Malware Detection and Classification System

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ana Palavestra

Thesis entitled: Authentication in Public Key Encryption Schemes

Master of Science (Information Technology), School of Information Technology

2008

Lei Pan

Thesis entitled: A Performance Testing Framework for Digital Forensic Tools

Doctor of Philosophy (Information Technology), School of Information Technology

2004

Azmeri Khan

Thesis entitled: Many-Sample Location and Scale Test with Quantile-Function Error Distributions

Doctor of Philosophy (Information Technology), School of Information Technology

Michelle Cyganowski

Thesis entitled: A Quantile Distribution Approach to the One-Sample Location Problem

Master of Science (Information Technology), School of Information Technology

2003

Daniel Stonier

Thesis entitled: Stability Theory and Numerical Analysis of Non-autonomous Dynamical Systems

Doctor of Philosophy (Information Technology), School of Information Technology

2002

Thanh Binh Duong

Thesis entitled: Application of Real and Functional Analysis to Solve Boundary Value Problems

Doctor of Philosophy (Information Technology), School of Information Technology

Nicholas Yannios

Thesis entitled: Computational Aspects of the Numerical Solution of SDEs

Doctor of Philosophy (Information Technology), School of Information Technology

1998

Azmeri Khan

Thesis entitled: Adjusted adaptive cluster sampling

Master of Science, School of Information Technology

Associate Supervisor
2017

Jahangir Dewan

Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Warnakulasuriya Menik Randi Tissera

Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology