What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ian Welch
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction.
Abdullah Al Mamun
Harith Al-Sahaf
Ian Welch
Seyit Camtepe
2023
journals/compsec
Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution.
Taran Cyriac John
Muhammad Shabbir Abbasi
Harith Al-Sahaf
Ian Welch
Julian Jang-Jaccard
2022
journals/compsec
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification.
Jinting Zhu
Julian Jang-Jaccard
Amardeep Singh
Ian Welch
Harith Al-Sahaf
Seyit Camtepe
2022
journals/compsec
Probabilistic modelling of deception-based security framework using markov decision process.
Junaid Haseeb
Saif Ur Rehman Malik
Masood Mansoori
Ian Welch
2022
journals/compsec
Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers & Security 115 (2022)/102599].
Junaid Haseeb
Saif Ur Rehman Malik
Masood Mansoori
Ian Welch
2020
journals/compsec
How do they find us? A study of geolocation tracking techniques of malicious web sites.
Masood Mansoori
Ian Welch
2019
conf/ccs
IoT Application-Centric Access Control (ACAC).
Mohammed Al-Shaboti
Ian Welch
Aaron Chen
2019
conf/iwsec
(Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks Detection.
Abigail M. Y. Koay
Ian Welch
Winston K. G. Seah
2015
conf/acisp
VisRAID: Visualizing Remote Access for Intrusion Detection.
Leliel Trethowen
Craig Anslow
Stuart Marshall
Ian Welch
2011
conf/fc
A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper).
Ben Palmer
Kris Bubendorfer
Ian Welch
2009
conf/acisp
Measurement Study on Malicious Web Servers in the .nz Domain.
Christian Seifert
Vipul Delwadia
Peter Komisarczuk
David Stirling
Ian Welch
2000
conf/esorics
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.
Ian Welch
Robert J. Stroud
Coauthors
Aaron Chen
(1)
Abdullah Al Mamun
(1)
Abigail M. Y. Koay
(1)
Amardeep Singh
(1)
Ben Palmer
(1)
Christian Seifert
(1)
Craig Anslow
(1)
David Stirling
(1)
Harith Al-Sahaf
(3)
Ian Welch
(12)
Jinting Zhu
(1)
Julian Jang-Jaccard
(2)
Junaid Haseeb
(2)
Kris Bubendorfer
(1)
Leliel Trethowen
(1)
Masood Mansoori
(3)
Mohammed Al-Shaboti
(1)
Muhammad Shabbir Abbasi
(1)
Peter Komisarczuk
(1)
Robert J. Stroud
(1)
Saif Ur Rehman Malik
(2)
Seyit Camtepe
(2)
Stuart Marshall
(1)
Taran Cyriac John
(1)
Vipul Delwadia
(1)
Winston K. G. Seah
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to