Lynn Batten
Lynn Batten
Verified email at
Cited by
Cited by
Classification of malware based on integrated static and dynamic features
R Islam, R Tian, LM Batten, S Versteeg
Journal of Network and Computer Applications 36 (2), 646-656, 2013
Combinatorics of finite geometries
LM Batten, LM Batten
Cambridge University Press, 1997
Differentiating malware from cleanware using behavioural analysis
R Tian, R Islam, L Batten, S Versteeg
2010 5th international conference on malicious and unwanted software, 23-30, 2010
Function length as a tool for malware classification
R Tian, LM Batten, SC Versteeg
2008 3rd international conference on malicious and unwanted software …, 2008
An automated classification system based on the strings of trojan and virus families
R Tian, L Batten, R Islam, S Versteeg
2009 4th International conference on malicious and unwanted software …, 2009
The theory of finite linear spaces: combinatorics of points and lines
LM Batten, A Beutelspacher
Cambridge University Press, 2009
Broadcast anti-jamming systems
Y Desmedt, R Safavi-Naini, H Wang, L Batten, C Charnes, J Pieprzyk
Computer Networks 35 (2-3), 223-236, 2001
Classification of malware based on string and function feature selection
R Islam, R Tian, L Batten, S Versteeg
2010 Second Cybercrime and Trustworthy Computing Workshop, 9-17, 2010
E-commerce: protecting purchaser privacy to enforce trust
G Antoniou, L Batten
Electronic commerce research 11 (4), 421-456, 2011
Analysis of malicious and benign android applications
M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
2012 32nd International Conference on Distributed Computing Systems …, 2012
Algebraic Attacks over GF(q)
LM Batten
International Conference on Cryptology in India, 84-91, 2004
Fast algorithm for the cutting angle method of global optimization
LM Batten, G Beliakov
Journal of Global Optimization 24 (2), 149-161, 2002
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of information security and applications 36, 90-100, 2017
Public key cryptography: applications and attacks
LM Batten
John Wiley & Sons, 2013
Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
L Batten, R Safavi-Naini
Springer, 2006
Games, graphs and circular arguments
DN Walton, LM Batten
Logique et Analyse 27 (106), 133-164, 1984
Towards an understanding of the impact of advertising on data leaks
V Moonsamy, M Alazab, L Batten
International journal of security and networks 7 (3), 181-193, 2012
Determining sets
LM Batten
Australasian Journal of Combinatorics 22, 167-176, 2000
Detecting deception in online social networks
JS Alowibdi, UA Buy, SY Philip, L Stenneth
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
Feature reduction to speed up malware classification
V Moonsamy, R Tian, L Batten
Nordic Conference on Secure IT Systems, 176-188, 2011
The system can't perform the operation now. Try again later.
Articles 1–20