Moyo, Thamsanqa, Irwin, Barry V W, Wright, Madeleine. Towards Central Vulnerability Management By Mobile Phone Operators. 2006.
Hits: 292
Visitors: 320
Downloads: 30
Motara, Yusuf M, Irwin, Barry V W. Towards a Classification of Intrusion Strength. 2005.
Hits: 228
Visitors: 239
Downloads: 15
White, Dominic, Irwin, Barry V W. A unified patch management architecture. 2004.
Hits: 242
Visitors: 258
Downloads: 19
Mnjama, Javan, Foster, Gregory G, Irwin, Barry V W. A privacy and security threat assessment framework for consumer health wearables. 2017.
Hits: 657
Visitors: 669
Downloads: 27
Kerr, Simon, Foster, Gregory G, Irwin, Barry V W. Rich Representation and Visualisation of Time-Series Data. 2009.
Hits: 354
Visitors: 367
Downloads: 16
Wrench, Peter M, Irwin, Barry V W. A sandbox-based approach to the deobfuscation and dissection of php-based malware. 2015.
Hits: 309
Visitors: 323
Downloads: 23
Frieslaar, Ibraheem, Irwin, Barry V W. A multi-threading approach to secure VERIFYPIN. 2016.
Hits: 367
Visitors: 392
Downloads: 31
Pennefather, Sean, Irwin, Barry V W. Design and application of link: A DSL for network frame manipulation. 2017.
Hits: 406
Visitors: 426
Downloads: 24
Motara, Yusuf, M, Irwin, Barry V W. In-kernel cryptographic executable verification. 2005.
Hits: 146
Visitors: 157
Downloads: 15
Herbert, Alan, Irwin, Barry V W. Adaptable exploit detection through scalable netflow analysis. 2016.
Hits: 347
Visitors: 363
Downloads: 22
Rudman, Lauren, Irwin, Barry V W. Characterization and analysis of NTP amplification based DDoS attacks. 2015.
Hits: 278
Visitors: 291
Downloads: 20
Barnett, Richard J, Irwin, Barry V W. Performance Effects of Concurrent Virtual Machine Execution in VMware Workstation 6. 2009.
Hits: 252
Visitors: 267
Downloads: 20
Van Heerden, Renier, Pieterse, Heloise, Irwin, Barry V W. Mapping the most significant computer hacking events to a temporal computer attack model. 2012.
Hits: 430
Visitors: 442
Downloads: 18
Pilkington, Nick, Irwin, Barry V W. An Investigation into the Performance of General Sorting on Graphics Processing Units. 2008.
Hits: 771
Visitors: 794
Downloads: 30
Motara, Yusuf, M, Irwin, Barry V W. In-kernel cryptographic executable verification. 2005.
Hits: 221
Visitors: 233
Downloads: 14
Van Heerden, Renier, Malan, Mercia M, Mouton, Francois, Irwin, Barry V W. Human perception of the measurement of a network attack taxonomy in near real-time. 2014.
Hits: 634
Visitors: 649
Downloads: 24
Irwin, Barry V W, Pilkington, Nick. High level internet scale traffic visualization using hilbert curve mapping. 2008.
Hits: 262
Visitors: 271
Downloads: 20
Richter, John, Irwin, Barry V W. Guidelines for Constructing Robust Discrete-Time Computer Network Simulations. 2008.
Hits: 243
Visitors: 256
Downloads: 19
Rudman, Lauren, Irwin, Barry V W. Dridex: Analysis of the traffic and automatic generation of IOCs. 2016.
Hits: 1330
Visitors: 1356
Downloads: 33
Rudman, Lauren, Irwin, Barry V W. Characterization and Analysis of NTP Amplifier Traffic. 2016.
Hits: 232
Visitors: 247
Downloads: 19
Jacobs, Pierre, Arnab, Alapan, Irwin, Barry V W. Classification of security operation centers. 2013.
Hits: 335
Visitors: 348
Downloads: 19
Pennefather, Sean, Bradshaw, Karen L, Irwin, Barry V W. Exploration and design of a synchronous message passing framework for a CPU-NPU heterogeneous architecture. 2018.
Hits: 378
Visitors: 398
Downloads: 29
Herbert, Alan, Irwin, Barry V W. A kernel-driven framework for high performance internet routing simulation. 2013.
Hits: 892
Visitors: 787
Downloads: 27
Pennefather, Sean, Irwin, Barry V W. An exploration of geolocation and traffic visualisation using network flows. 2014.
Hits: 409
Visitors: 415
Downloads: 14
Wrench, Peter M, Irwin, Barry V W. Towards a PHP webshell taxonomy using deobfuscation-assisted similarity analysis. 2015.
Hits: 301
Visitors: 310
Downloads: 18
Frieslaar, Ibraheem, Irwin, Barry V W. Investigating the electromagnetic side channel leakage from a raspberry pi. 2017.
Hits: 322
Visitors: 338
Downloads: 23
van Heerden, Renier, Leenen, Louise, Irwin, Barry V W. Automated classification of computer network attacks. 2013.
Hits: 423
Visitors: 436
Downloads: 23
Nottingham, Alastair, Irwin, Barry V W. A high-level architecture for efficient packet trace analysis on gpu co-processors. 2013.
Hits: 1111
Visitors: 1011
Downloads: 27
Irwin, Barry V W. A source analysis of the conficker outbreak from a network telescope.. 2013.
Hits: 255
Visitors: 272
Downloads: 23
Wrench, Peter M, Irwin, Barry V W. Towards a Sandbox for the Deobfuscation and Dissection of PHP Malware. 2014.
Hits: 297
Visitors: 307
Downloads: 16
Swart, Ignus, Irwin, Barry V W, Grobler, Marthie. Towards a platform to visualize the state of South Africa's information security. 2014.
Hits: 237
Visitors: 251
Downloads: 21
Van Heerden, Renier, Pieterse, Heloise, Burke, Ivan, Irwin, Barry V W. Developing a virtualised testbed environment in preparation for testing of network based attacks. 2013.
Hits: 604
Visitors: 617
Downloads: 21
Hunter, Samuel O, Irwin, Barry V W, Stalmans, Etienne. Real-time distributed malicious traffic monitoring for honeypots and network telescopes. 2013.
Hits: 395
Visitors: 407
Downloads: 19
Irwin, Barry V W. A baseline study of potentially malicious activity across five network telescopes. 2013.
Hits: 663
Visitors: 561
Downloads: 31
Haffejee, Jameel, Irwin, Barry V W. Testing antivirus engines to determine their effectiveness as a security layer. 2014.
Hits: 228
Visitors: 254
Downloads: 32
Irwin, Barry V W. A network telescope perspective of the Conficker outbreak. 2012.
Hits: 349
Visitors: 365
Downloads: 22
Janse van Rensburg, Johanna, Irwin, Barry V W. Wireless Security Tools. 2006.
Hits: 275
Visitors: 286
Downloads: 14
Janse van Rensburg, Johanna, Irwin, Barry V W. A Discussion Of Wireless Security Technologies. 2006.
Hits: 417
Visitors: 439
Downloads: 24
Egan, Shaun P, Irwin, Barry V W. An evaluation of lightweight classification methods for identifying malicious URLs. 2011.
Hits: 265
Visitors: 280
Downloads: 21
Stalmans, Etienne, Irwin, Barry V W. A framework for DNS based detection and mitigation of malware infections on a network. 2011.
Hits: 402
Visitors: 427
Downloads: 33
Stalmans, Etienne, Hunter, Samuel O, Irwin, Barry V W. Geo-spatial autocorrelation as a metric for the detection of fast-flux botnet domains. 2012.
Hits: 365
Visitors: 381
Downloads: 22
Jacobs, Pierre, Arnab, Alapan, Irwin, Barry V W. Classification of security operation centers. 2013.
Hits: 253
Visitors: 266
Downloads: 19
Egan, Shaun P, Irwin, Barry V W. An Analysis and Implementation of Methods for High Speed Lexical Classification of Malicious URLs. 2012.
Hits: 777
Visitors: 789
Downloads: 19
Zeisberger, Sascha, Irwin, Barry V W. Building a Graphical Fuzzing Framework. 2012.
Hits: 800
Visitors: 817
Downloads: 26
Hunter, Samuel O, Stalmans, Etienne, Irwin, Barry V W, Richter, John. Remote fingerprinting and multisensor data fusion. 2012.
Hits: 438
Visitors: 455
Downloads: 24
Frieslaar, Ibraheem, Irwin, Barry V W. Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable. 2017.
Hits: 376
Visitors: 386
Downloads: 16
Cowie, Bradley, Irwin, Barry V W. Data classification for artificial intelligence construct training to aid in network incident identification using network telescope data. 2010.
Hits: 269
Visitors: 281
Downloads: 19
Otten, Fred, Irwin, Barry V W, Thinyane, Hannah. Evaluating text preprocessing to improve compression on maillogs. 2009.
Hits: 423
Visitors: 433
Downloads: 16
Nottingham, Alastair, Irwin, Barry V W. Extending the NFComms: framework for bulk data transfers. 2009.
Hits: 243
Visitors: 261
Downloads: 24
van Riel, Jean-Pierre, Irwin, Barry V W. Inetvis, a visual tool for network telescope traffic analysis. 2006.
Hits: 258
Visitors: 269
Downloads: 18
Nottingham, Alastair, Richter, John, Irwin, Barry V W. Capturefoundry: a gpu accelerated packet capture analysis tool. 2012.
Hits: 486
Visitors: 505
Downloads: 26
Frieslaar, Ibraheem, Irwin, Barry V W. Investigating multi-thread utilization as a software defence mechanism against side channel attacks. 2016.
Hits: 250
Visitors: 274
Downloads: 30
Vorster, Johannes, Irwin, Barry V W, van Heerden, Renier P. Violations of good security practices in graphical passwords schemes: Enterprise constraints on scheme-design. 2018.
Hits: 423
Visitors: 440
Downloads: 20
Linklater, Gregory, Smith, Christian, Herbert, Alan, Irwin, Barry V W. Toward distributed key management for offline authentication. 2018.
Hits: 420
Visitors: 428
Downloads: 17
Frieslaar, Ibraheem, Irwin, Barry V W. Investigating the utilization of the secure hash algorithm to generate electromagnetic noise. 2017.
Hits: 288
Visitors: 306
Downloads: 24
Nottingham, Alistair, Irwin, Barry V W. Parallel packet classification using GPU co-processors. 2010.
Hits: 227
Visitors: 237
Downloads: 18
Nottingham, Alastair, Irwin, Barry V W. Towards a GPU accelerated virtual machine for massively parallel packet classification and filtering. 2013.
Hits: 240
Visitors: 253
Downloads: 18
Swart, Ignus, Irwin, Barry V W, Grobler, Marthie. On the viability of pro-active automated PII breach detection: A South African case study. 2014.
Hits: 268
Visitors: 283
Downloads: 21
Herbert, Alan, Irwin, Barry V W, Otten, D F, Balmahoon, M R. FPGA Based Implementation of a High Performance Scalable NetFlow Filter. 2015.
Hits: 504
Visitors: 531
Downloads: 32
Stalmans, Etienne, Irwin, Barry V W. A Framework for DNS Based Detection of Botnets at the ISP Level. 2011.
Hits: 371
Visitors: 393
Downloads: 24
Pennefather, Sean, Irwin, Barry V W. Design of a Network Packet Processing platform. 2014.
Hits: 232
Visitors: 256
Downloads: 25
Irwin, Barry V W. Network telescope metrics. 2012.
Hits: 245
Visitors: 259
Downloads: 17
Andersen, Michael, Irwin, Barry V W. Cost-effective realisation of the Internet of Things. 2012.
Hits: 449
Visitors: 470
Downloads: 25
Cowie, Bradley, Irwin, Barry V W. A Baseline Numeric Analysis of Network Telescope Data for Network Incident Discovery. 2011.
Hits: 433
Visitors: 466
Downloads: 36
Zeisberger, Sascha, Irwin, Barry V W. A Framework for the Static Analysis of Malware focusing on Signal Processing Techniques. 2012.
Hits: 477
Visitors: 500
Downloads: 36
Egan, Shaun P, Irwin, Barry V W. Normandy: A Framework for Implementing High Speed Lexical Classification of Malicious URLs. 2012.
Hits: 225
Visitors: 237
Downloads: 14
Frieslaar, Ibraheem, Irwin, Barry V W. Recovering AES-128 encryption keys from a Raspberry Pi. 2017.
Hits: 252
Visitors: 266
Downloads: 17
Herbert, Alan, Irwin, Barry V W. Towards Enhanced Threat Intelligence Through NetFlow Distillation. 2018.
Hits: 320
Visitors: 336
Downloads: 18
Shaw, Brent, Irwin, Barry V W. Hybrid Sensor Simulation within an ICS Testbed. 2018.
Hits: 301
Visitors: 324
Downloads: 25
Chindipha, Stones D, Irwin, Barry V W. Feasibility Study: Computing Confidence Interval (CI) for IBR Data Using Bootstrapping Technique. 2021.
Hits: 498
Visitors: 530
Downloads: 39
Linklater, Gregory, Marais, Craig, Herbert, Alan, Irwin, Barry V W. Offline-First Design for Fault Tolerant Applications.. 2018.
Hits: 428
Visitors: 449
Downloads: 27
Chindipha, Stones D, Irwin, Barry V W, Herbert, Alan. Effectiveness of Sampling a Small Sized Network Telescope in Internet Background Radiation Data Collection. 2018.
Hits: 540
Visitors: 565
Downloads: 29
Chindipha, Stones D, Irwin, Barry V W, Herbert, Alan. An Evaluation of Text Mining Techniques in Sampling of Network Ports from IBR Traffic. 2019.
Hits: 387
Visitors: 404
Downloads: 19
Pennefather, Sean, Irwin, Barry V W. Design and Fabrication of a Low Cost Traffic Manipulation Hardware Platform. 2015.
Hits: 288
Visitors: 307
Downloads: 25
Van Zyl, Ignus, Rudman, Lauren, Irwin, Barry V W. A review of current DNS TTL practices. 2015.
Hits: 495
Visitors: 513
Downloads: 21
Koorn, Craig, Irwin, Barry V W, Herbert, Alan. Improving Fidelity in Internet Simulation through Packet Injection. 2016.
Hits: 370
Visitors: 387
Downloads: 20
Frieslaar, Ibraheem, Irwin, Barry V W. Developing a Multi Platform Countermeasure to Ensure a Secure Home. 2016.
Hits: 215
Visitors: 232
Downloads: 19
Herbert, Alan, Irwin, Barry V W. Towards malicious network activity mitigation through subnet reputation analysis. 2016.
Hits: 198
Visitors: 223
Downloads: 27
Swart, Ignus, Grobler, Marthie, Irwin, Barry V W. Data Centre vulnerabilities physical, logical and trusted entity security. 2015.
Hits: 203
Visitors: 213
Downloads: 14
Rudman, Lauren, Irwin, Barry V W. A sharing platform for Indicators of Compromise. 2016.
Hits: 335
Visitors: 357
Downloads: 25
Frieslaar, Ibraheem, Irwin, Barry V W. An investigation into the signals leakage from a smartcard based on different runtime code. 2015.
Hits: 285
Visitors: 301
Downloads: 18
Pennefather, Sean, Irwin, Barry V W. Design of a Configurable Embedded Network Tap Flow Generation using NetFlow v9 and IPFIX Formats. 2016.
Hits: 378
Visitors: 401
Downloads: 26
Hunter, Samuel O, Irwin, Barry V W. Near Real-time Aggregation and Visualisation of Hostile Network Traffic. 2011.
Hits: 169
Visitors: 180
Downloads: 13
Irwin, Barry V W, Siebörger, Ingrid, Wells, Daniel. Bandwidth management and monitoring for community networks. 2010.
Hits: 327
Visitors: 359
Downloads: 37
Stalmans, Etienne, Irwin, Barry V W. An Exploratory Framework for Extrusion Detection. 2012.
Hits: 344
Visitors: 361
Downloads: 24
Wells, David D, Siebörger, Ingrid G, Irwin, Barry V W. Mapping the location of 2.4 GHz transmitters to achieve optimal usage of an IEEE 802.11 network. 2008.
Hits: 547
Visitors: 692
Downloads: 160
Wells, David D, Siebörger, Ingrid G, Irwin, Barry V W. Location and mapping of 2.4 GHz RF transmitters. 2008.
Hits: 442
Visitors: 583
Downloads: 152
Peach, Schalk, Irwin, Barry V W, van Heerden, Renier. An overview of linux container based network emulation. 2016.
Hits: 426
Visitors: 437
Downloads: 18
Pilkington, Nick, Irwin, Barry V W. A Canonical Implementation Of The Advanced Encryption Standard On The Graphics Processing Unit. 2008.
Hits: 483
Visitors: 504
Downloads: 24
Van Heerden, Renier P, Irwin, Barry V W, Burke, Ivan D, Leenen, Louise. A computer network attack taxonomy and ontology. 2012.
Hits: 959
Visitors: 965
Downloads: 27
Forrester, Jock, Irwin, Barry V W. A Digital Forensic investigative model for business organisations. 2007.
Hits: 460
Visitors: 476
Downloads: 17
Irwin, Barry V W, van Riel, J P. Using inetvis to evaluate snort and bro scan detection on a network telescope. 2008.
Hits: 318
Visitors: 333
Downloads: 24
Barnett, Richard J, Irwin, Barry V W. A Comparison Of The Resource Requirements Of Snort And Bro In Production Networks. 2009.
Hits: 438
Visitors: 451
Downloads: 20
Irwin, Barry V W, Barnett, Richard J. An analysis of logical network distance on observed packet counts for network telescope data. 2009.
Hits: 286
Visitors: 309
Downloads: 28
Nkhumeleni, Thiswilondi M, Irwin, Barry V W. Observed correlations of unsolicited network traffic over five distinct IPv4 netblocks. 2015.
Hits: 288
Visitors: 297
Downloads: 16
Barnett, Richard J, Irwin, Barry V W. Towards a taxonomy of network scanning techniques. 2008.
Hits: 283
Visitors: 304
Downloads: 27
Irwin, Barry V W, van Riel, Jean-Pierre. Inetvis: a graphical aid for the detection and visualisation of network scans. 2007.
Hits: 233
Visitors: 253
Downloads: 22
Irwin, Barry V W, Herbert, Alan. Deep Routing Simulation. 2013.
Hits: 768
Visitors: 792
Downloads: 29
Bradshaw, Karen L, Irwin, Barry V W, Pennefather, Sean. Design and evaluation of bulk data transfer extensions for the NFComms framework. 2019.
Hits: 514
Visitors: 535
Downloads: 26
Swart, Ignus, Irwin, Barry V W, Grobler, Marthie. Multi sensor national cyber security data fusion. 2015.