Follow
Ian Welch
Ian Welch
Associate Professor, Victoria University at Wellington, New Zealand
Verified email at ecs.vuw.ac.nz - Homepage
Title
Cited by
Cited by
Year
Reliability in wireless sensor networks: A survey and challenges ahead
MA Mahmood, WKG Seah, I Welch
Computer networks 79, 166-187, 2015
4282015
Identification of malicious web pages with static heuristics
C Seifert, I Welch, P Komisarczuk
2008 Australasian Telecommunication Networks and Applications Conference, 91-96, 2008
1842008
Security threats and solutions in MANETs: A case study using AODV and SAODV
J Von Mulert, I Welch, WKG Seah
Journal of network and computer applications 35 (4), 1249-1259, 2012
1342012
Honeyc-the low-interaction client honeypot
C Seifert, I Welch, P Komisarczuk
Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand 6, 48, 2007
1302007
Intrusion-tolerant middleware: The road to automatic security
PE Veríssimo, NF Neves, C Cachin, J Poritz, D Powell, Y Deswarte, ...
IEEE Security & Privacy 4 (4), 54-62, 2006
1232006
From Dalang to Kava - the Evolution of a Reflective Java Extension
I Welch, R Stroud
International Conference on Metalevel Architectures and Reflection, 2-21, 1999
1201999
A survey on the architecture, application, and security of software defined networking: Challenges and open issues
K Nisar, ER Jimson, MHA Hijazi, I Welch, R Hassan, AHM Aman, ...
Internet of Things 12, 100289, 2020
902020
Kava-a reflective java based on bytecode rewriting
I Welch, RJ Stroud
Workshop on Reflection and Software Engineering, 155-167, 1999
861999
{Kava--Using}{Byte-Code} Rewriting to Add Behavioral Reflection to Java
I Welch, R Stroud
6th USENIX Conference on Object-Oriented Technologies and Systems (COOTS 01), 2001
802001
Capture–A behavioral analysis tool for applications and documents
C Seifert, R Steenson, I Welch, P Komisarczuk, B Endicott-Popovsky
digital investigation 4, 23-30, 2007
662007
Fog-assisted SDN controlled framework for enduring anomaly detection in an IoT network
Q Shafi, A Basit, S Qaisar, A Koay, I Welch
IEEE Access 6, 73713-73723, 2018
652018
A machine learning based web spam filtering approach
S Kumar, X Gao, I Welch, M Mansoori
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
652016
Using coordinated atomic actions to design safety‐critical systems: a production cell case study
AF Zorzo, A Romanovsky, J Xu, B Randell, RJ Stroud, IS Welch
Software: Practice and Experience 29 (8), 677-697, 1999
651999
A new multi classifier system using entropy-based features in DDoS attack detection
A Koay, A Chen, I Welch, WKG Seah
2018 International conference on information networking (ICOIN), 162-167, 2018
622018
Anatomy of drive-by download attack
VL Le, I Welch, X Gao, P Komisarczuk
Proceedings of the Eleventh Australasian Information Security Conference …, 2013
622013
Taxonomy of honeypots
C Seifert, I Welch, P Komisarczuk
Victoria University of Wellington, Wellington, 2006
602006
Review and analyzing RFID technology tags and applications
AAA Ibrahim, K Nisar, YK Hzou, I Welch
2019 IEEE 13th international conference on application of information and …, 2019
502019
Identification of malicious web pages through analysis of underlying dns and web server relationships
C Seifert, I Welch, P Komisarczuk, CU Aval, B Endicott-Popovsky
2008 33rd IEEE Conference on Local Computer Networks (LCN), 935-941, 2008
492008
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification
J Zhu, J Jang-Jaccard, A Singh, I Welch, ALS Harith, S Camtepe
Computers & Security 117, 102691, 2022
482022
A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture
R Stroud, I Welch, J Warne, P Ryan
International Conference on Dependable Systems and Networks, 2004, 453-461, 2004
472004
The system can't perform the operation now. Try again later.
Articles 1–20