Folgen
Barry Irwin
Barry Irwin
Noroff University College, Rhodes University
Bestätigte E-Mail-Adresse bei ru.ac.za - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A framework for DNS based detection and mitigation of malware infections on a network
E Stalmans, B Irwin
2011 Information Security for South Africa, 1-8, 2011
962011
Towards a taxonomy of network scanning techniques
RJ Barnett, B Irwin
Proceedings of the 2008 annual research conference of the South African …, 2008
482008
Inetvis, a visual tool for network telescope traffic analysis
JP van Riel, B Irwin
Proceedings of the 4th international conference on Computer graphics …, 2006
482006
Cyber security: Challenges and the way forward.
AN Ayofe, B Irwin
Computer Science & Telecommunications 29 (6), 2010
442010
High level internet scale traffic visualization using hilbert curve mapping
B Irwin, N Pilkington
VizSEC 2007, 147-158, 2008
362008
Classification of security operation centers
P Jacobs, A Arnab, B Irwin
2013 Information Security for South Africa, 1-7, 2013
352013
Classifying network attack scenarios using an ontology
RP Van Heerden, B Irwin, I Burke
Proceedings of the 7th International Conference on Information-Warfare …, 2012
342012
GPU packet classification using OpenCL: a consideration of viable classification methods
A Nottingham, B Irwin
Proceedings of the 2009 annual research conference of the South African …, 2009
342009
A framework for the application of network telescope sensors in a global IP network
BVW Irwin
Rhodes University, 2011
312011
Characterization and analysis of NTP amplification based DDoS attacks
L Rudman, B Irwin
2015 Information Security for South Africa (ISSA), 1-5, 2015
302015
A computer network attack taxonomy and ontology
RP Van Heerden, B Irwin, ID Burke, L Leenen
International Journal of Cyber Warfare and Terrorism (IJCWT) 2 (3), 12-25, 2012
272012
Parallel packet classification using GPU co-processors
A Nottingham, B Irwin
Proceedings of the 2010 Annual Research Conference of the South African …, 2010
242010
Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis
PM Wrench, BVW Irwin
2015 Information Security for South Africa (ISSA), 1-8, 2015
222015
A baseline study of potentially malicious activity across five network telescopes
B Irwin
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013
222013
A network telescope perspective of the Conficker outbreak
B Irwin
2012 Information Security for South Africa, 1-8, 2012
212012
Dridex: Analysis of the traffic and automatic generation of iocs
L Rudman, B Irwin
2016 Information Security for South Africa (ISSA), 77-84, 2016
202016
Transmitting rdf graph deltas for a cheaper semantic web
R Cloran, B Irwin
Southern African Telecommunications and Applications Conference (SATNAC), 2005
202005
Using inetvis to evaluate snort and bro scan detection on a network telescope
B Irwin, JP Riel
VizSEC 2007, 255-273, 2008
172008
Automated classification of computer network attacks
R van Heerden, L Leenen, B Irwin
2013 International Conference on Adaptive Science and Technology, 1-7, 2013
152013
An evaluation of lightweight classification methods for identifying malicious URLs
S Egan, B Irwin
2011 Information Security for South Africa, 1-6, 2011
122011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20