Ian Welch
Ian Welch
Associate Professor, Victoria University at Wellington, New Zealand
Verified email at ecs.vuw.ac.nz - Homepage
Title
Cited by
Cited by
Year
Reliability in wireless sensor networks: A survey and challenges ahead
MA Mahmood, WKG Seah, I Welch
Computer Networks 79, 166-187, 2015
2942015
Identification of malicious web pages with static heuristics
C Seifert, I Welch, P Komisarczuk
2008 Australasian Telecommunication Networks and Applications Conference, 91-96, 2008
1562008
Intrusion-tolerant middleware: The road to automatic security
PE Verissimo, NF Neves, C Cachin, J Poritz, D Powell, Y Deswarte, ...
IEEE Security & Privacy 4 (4), 54-62, 2006
1112006
Honeyc-the low-interaction client honeypot
C Seifert, I Welch, P Komisarczuk
Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand 6, 2007
1102007
Security threats and solutions in MANETs: A case study using AODV and SAODV
J Von Mulert, I Welch, WKG Seah
Journal of network and computer applications 35 (4), 1249-1259, 2012
1072012
From Dalang to Kava - the Evolution of a Reflective Java Extension
I Welch, R Stroud
International Conference on Metalevel Architectures and Reflection, 2-21, 1999
881999
Kava-a reflective java based on bytecode rewriting
I Welch, RJ Stroud
Workshop on Reflection and Software Engineering, 155-167, 1999
821999
Kava: Using byte code rewriting to add behavioural reflection in Java
I Welch, RJ Stroud
Coots 1, 119-130, 2001
712001
Capture–A behavioral analysis tool for applications and documents
C Seifert, R Steenson, I Welch, P Komisarczuk, B Endicott-Popovsky
digital investigation 4, 23-30, 2007
652007
Using coordinated atomic actions to design safety‐critical systems: a production cell case study
AF Zorzo, A Romanovsky, J Xu, B Randell, RJ Stroud, IS Welch
Software: Practice and Experience 29 (8), 677-697, 1999
581999
Taxonomy of honeypots
C Seifert, I Welch, P Komisarczuk
502006
Anatomy of drive-by download attack
VL Le, I Welch, X Gao, P Komisarczuk
Proceedings of the Eleventh Australasian Information Security Conference …, 2013
452013
Identification of malicious web pages through analysis of underlying dns and web server relationships
C Seifert, I Welch, P Komisarczuk, CU Aval, B Endicott-Popovsky
2008 33rd IEEE Conference on Local Computer Networks (LCN), 935-941, 2008
442008
A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture
R Stroud, I Welch, J Warne, P Ryan
International Conference on Dependable Systems and Networks, 2004, 453-461, 2004
432004
A machine learning based web spam filtering approach
S Kumar, X Gao, I Welch, M Mansoori
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
382016
AspectJ for multilevel security
R Ramachandran, DJ Pearce, I Welch
Proceedings of the Fifth AOSD Workshop on Aspects, Components, and Patterns …, 2006
372006
Dalang-a reflective Java extension
I Welch, R Stroud
Proc. of Workshop on Reflective Programming in C++ and Java, 98-4, 1998
351998
Dalang-A reflective extension for java
I Welch, R Stroud
TECHNICAL REPORT SERIES-UNIVERSITY OF NEWCASTLE UPON TYNE COMPUTING SCIENCE, 1999
281999
YALIH, yet another low interaction honeyclient
M Mansoori, I Welch, Q Fu
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
252014
Using reflection as a mechanism for enforcing security policies on compiled code
I Welch, RJ Stroud
Journal of Computer Security 10 (4), 399-432, 2002
252002
The system can't perform the operation now. Try again later.
Articles 1–20