


default search action
BibTeX records: Alan Tickle
@article{DBLP:journals/compsec/BhatiaSMT14,
author = {Sajal Bhatia and
Desmond Allan Schmidt and
George M. Mohay and
Alan Tickle},
title = {A framework for generating realistic traffic for Distributed Denial-of-Service
attacks and Flash Events},
journal = {Comput. Secur.},
volume = {40},
pages = {95--107},
year = {2014},
url = {https://doi.org/10.1016/j.cose.2013.11.005},
doi = {10.1016/J.COSE.2013.11.005},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/compsec/BhatiaSMT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/BhatiaMST12,
author = {Sajal Bhatia and
George M. Mohay and
Desmond Allan Schmidt and
Alan Tickle},
title = {Modelling Web-server Flash Events},
booktitle = {11th {IEEE} International Symposium on Network Computing and Applications,
{NCA} 2012, Cambridge, MA, USA, August 23-25, 2012},
pages = {79--86},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/NCA.2012.24},
doi = {10.1109/NCA.2012.24},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/nca/BhatiaMST12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BhatiaMTA11,
author = {Sajal Bhatia and
George M. Mohay and
Alan Tickle and
Ejaz Ahmed},
title = {Parametric Differences between a Real-world Distributed Denial-of-Service
Attack and a Flash Event},
booktitle = {Sixth International Conference on Availability, Reliability and Security,
{ARES} 2011, Vienna, Austria, August 22-26, 2011},
pages = {210--217},
publisher = {{IEEE} Computer Society},
year = {2011},
url = {https://doi.org/10.1109/ARES.2011.39},
doi = {10.1109/ARES.2011.39},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEares/BhatiaMTA11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/SchmidtSTCMAM10,
author = {Desmond Allan Schmidt and
Suriadi Suriadi and
Alan Tickle and
Andrew J. Clark and
George M. Mohay and
Ejaz Ahmed and
James Mackie},
editor = {Jacques Berleur and
Magda David Hercheui and
Lorenz M. Hilty},
title = {A Distributed Denial of Service Testbed},
booktitle = {What Kind of Information Society? Governance, Virtuality, Surveillance,
Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference,
{HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP}
2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23,
2010. Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {328},
pages = {338--349},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-15479-9\_32},
doi = {10.1007/978-3-642-15479-9\_32},
timestamp = {Thu, 23 Jun 2022 19:58:46 +0200},
biburl = {https://dblp.org/rec/conf/hcc/SchmidtSTCMAM10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/SuriadiTASM10,
author = {Suriadi Suriadi and
Alan Tickle and
Ejaz Ahmed and
Jason Smith and
Hasmukh Morarji},
editor = {Jacques Berleur and
Magda David Hercheui and
Lorenz M. Hilty},
title = {Risk Modelling the Transition of {SCADA} System to IPv6},
booktitle = {What Kind of Information Society? Governance, Virtuality, Surveillance,
Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference,
{HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP}
2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23,
2010. Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {328},
pages = {384--395},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-15479-9\_36},
doi = {10.1007/978-3-642-15479-9\_36},
timestamp = {Wed, 22 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/hcc/SuriadiTASM10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WhiteTC10,
author = {Andrew White and
Alan Tickle and
Andrew J. Clark},
editor = {Yang Xiang and
Pierangela Samarati and
Jiankun Hu and
Wanlei Zhou and
Ahmad{-}Reza Sadeghi},
title = {Overcoming Reputation and Proof-of-Work Systems in Botnets},
booktitle = {Fourth International Conference on Network and System Security, {NSS}
2010, Melbourne, Victoria, Australia, September 1-3, 2010},
pages = {120--127},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/NSS.2010.65},
doi = {10.1109/NSS.2010.65},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/nss/WhiteTC10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AhmedMTB10,
author = {Ejaz Ahmed and
George M. Mohay and
Alan Tickle and
Sajal Bhatia},
editor = {Kai Rannenberg and
Vijay Varadharajan and
Christian Weber},
title = {Use of {IP} Addresses for High Rate Flooding Attack Detection},
booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
International Information Security Conference, {SEC} 2010, Held as
Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
volume = {330},
pages = {124--135},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-15257-3\_12},
doi = {10.1007/978-3-642-15257-3\_12},
timestamp = {Mon, 03 Mar 2025 21:21:13 +0100},
biburl = {https://dblp.org/rec/conf/sec/AhmedMTB10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ace/DowlingTSRG05,
author = {Greg Dowling and
Alan Tickle and
Karen Stark and
Jillian Rowe and
Meredith Godat},
editor = {Alison Young and
Denise Tolhurst},
title = {Greg Dowling, Alan Tickle, Karen Stark, Jillian Rowe, and Meredith
Godat},
booktitle = {Seventh Australasian Computing Education Conference {(ACE} 2005),
Newcastle, NSW, Australia, January/February 2005},
series = {{CRPIT}},
volume = {42},
pages = {151--154},
publisher = {Australian Computer Society},
year = {2005},
url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV42Dowling.html},
timestamp = {Thu, 25 Jul 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ace/DowlingTSRG05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ace/GoldsteinLST05,
author = {Cecil Goldstein and
Susanna Leisten and
Karen Stark and
Alan Tickle},
editor = {Alison Young and
Denise Tolhurst},
title = {Using a Network Simulation Tool to engage students in Active Learning
enhances their understanding of complex data communications concepts},
booktitle = {Seventh Australasian Computing Education Conference {(ACE} 2005),
Newcastle, NSW, Australia, January/February 2005},
series = {{CRPIT}},
volume = {42},
pages = {223--228},
publisher = {Australian Computer Society},
year = {2005},
url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV42Goldstein.html},
timestamp = {Thu, 25 Jul 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ace/GoldsteinLST05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













