BibTeX records: Alan Tickle

download as .bib file

@article{DBLP:journals/compsec/BhatiaSMT14,
  author       = {Sajal Bhatia and
                  Desmond Allan Schmidt and
                  George M. Mohay and
                  Alan Tickle},
  title        = {A framework for generating realistic traffic for Distributed Denial-of-Service
                  attacks and Flash Events},
  journal      = {Comput. Secur.},
  volume       = {40},
  pages        = {95--107},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.11.005},
  doi          = {10.1016/J.COSE.2013.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BhatiaSMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/BhatiaMST12,
  author       = {Sajal Bhatia and
                  George M. Mohay and
                  Desmond Allan Schmidt and
                  Alan Tickle},
  title        = {Modelling Web-server Flash Events},
  booktitle    = {11th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2012, Cambridge, MA, USA, August 23-25, 2012},
  pages        = {79--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/NCA.2012.24},
  doi          = {10.1109/NCA.2012.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/BhatiaMST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BhatiaMTA11,
  author       = {Sajal Bhatia and
                  George M. Mohay and
                  Alan Tickle and
                  Ejaz Ahmed},
  title        = {Parametric Differences between a Real-world Distributed Denial-of-Service
                  Attack and a Flash Event},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {210--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.39},
  doi          = {10.1109/ARES.2011.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BhatiaMTA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/SchmidtSTCMAM10,
  author       = {Desmond Allan Schmidt and
                  Suriadi Suriadi and
                  Alan Tickle and
                  Andrew J. Clark and
                  George M. Mohay and
                  Ejaz Ahmed and
                  James Mackie},
  editor       = {Jacques Berleur and
                  Magda David Hercheui and
                  Lorenz M. Hilty},
  title        = {A Distributed Denial of Service Testbed},
  booktitle    = {What Kind of Information Society? Governance, Virtuality, Surveillance,
                  Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference,
                  {HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP}
                  2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23,
                  2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {328},
  pages        = {338--349},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15479-9\_32},
  doi          = {10.1007/978-3-642-15479-9\_32},
  timestamp    = {Thu, 23 Jun 2022 19:58:46 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/SchmidtSTCMAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/SuriadiTASM10,
  author       = {Suriadi Suriadi and
                  Alan Tickle and
                  Ejaz Ahmed and
                  Jason Smith and
                  Hasmukh Morarji},
  editor       = {Jacques Berleur and
                  Magda David Hercheui and
                  Lorenz M. Hilty},
  title        = {Risk Modelling the Transition of {SCADA} System to IPv6},
  booktitle    = {What Kind of Information Society? Governance, Virtuality, Surveillance,
                  Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference,
                  {HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP}
                  2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23,
                  2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {328},
  pages        = {384--395},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15479-9\_36},
  doi          = {10.1007/978-3-642-15479-9\_36},
  timestamp    = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/SuriadiTASM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WhiteTC10,
  author       = {Andrew White and
                  Alan Tickle and
                  Andrew J. Clark},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Overcoming Reputation and Proof-of-Work Systems in Botnets},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {120--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.65},
  doi          = {10.1109/NSS.2010.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/WhiteTC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AhmedMTB10,
  author       = {Ejaz Ahmed and
                  George M. Mohay and
                  Alan Tickle and
                  Sajal Bhatia},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Use of {IP} Addresses for High Rate Flooding Attack Detection},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {124--135},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_12},
  doi          = {10.1007/978-3-642-15257-3\_12},
  timestamp    = {Mon, 03 Mar 2025 21:21:13 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/AhmedMTB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ace/DowlingTSRG05,
  author       = {Greg Dowling and
                  Alan Tickle and
                  Karen Stark and
                  Jillian Rowe and
                  Meredith Godat},
  editor       = {Alison Young and
                  Denise Tolhurst},
  title        = {Greg Dowling, Alan Tickle, Karen Stark, Jillian Rowe, and Meredith
                  Godat},
  booktitle    = {Seventh Australasian Computing Education Conference {(ACE} 2005),
                  Newcastle, NSW, Australia, January/February 2005},
  series       = {{CRPIT}},
  volume       = {42},
  pages        = {151--154},
  publisher    = {Australian Computer Society},
  year         = {2005},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV42Dowling.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ace/DowlingTSRG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ace/GoldsteinLST05,
  author       = {Cecil Goldstein and
                  Susanna Leisten and
                  Karen Stark and
                  Alan Tickle},
  editor       = {Alison Young and
                  Denise Tolhurst},
  title        = {Using a Network Simulation Tool to engage students in Active Learning
                  enhances their understanding of complex data communications concepts},
  booktitle    = {Seventh Australasian Computing Education Conference {(ACE} 2005),
                  Newcastle, NSW, Australia, January/February 2005},
  series       = {{CRPIT}},
  volume       = {42},
  pages        = {223--228},
  publisher    = {Australian Computer Society},
  year         = {2005},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV42Goldstein.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ace/GoldsteinLST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}