Herbert, Alan, Irwin, Barry V W, Otten, D F, Balmahoon, M R. FPGA Based Implementation of a High Performance Scalable NetFlow Filter. 2015.
Hits: 414
Visitors: 426
Downloads: 17
Stalmans, Etienne, Irwin, Barry V W. A Framework for DNS Based Detection of Botnets at the ISP Level. 2011.
Hits: 284
Visitors: 297
Downloads: 15
Pennefather, Sean, Irwin, Barry V W. Design of a Network Packet Processing platform. 2014.
Hits: 167
Visitors: 180
Downloads: 14
Irwin, Barry V W. Network telescope metrics. 2012.
Hits: 161
Visitors: 170
Downloads: 12
Andersen, Michael, Irwin, Barry V W. Cost-effective realisation of the Internet of Things. 2012.
Hits: 315
Visitors: 324
Downloads: 12
Cowie, Bradley, Irwin, Barry V W. A Baseline Numeric Analysis of Network Telescope Data for Network Incident Discovery. 2011.
Hits: 332
Visitors: 346
Downloads: 16
Zeisberger, Sascha, Irwin, Barry V W. A Framework for the Static Analysis of Malware focusing on Signal Processing Techniques. 2012.
Hits: 340
Visitors: 349
Downloads: 22
Egan, Shaun P, Irwin, Barry V W. Normandy: A Framework for Implementing High Speed Lexical Classification of Malicious URLs. 2012.
Hits: 135
Visitors: 142
Downloads: 9
Frieslaar, Ibraheem, Irwin, Barry V W. Recovering AES-128 encryption keys from a Raspberry Pi. 2017.
Hits: 192
Visitors: 198
Downloads: 9
Herbert, Alan, Irwin, Barry V W. Towards Enhanced Threat Intelligence Through NetFlow Distillation. 2018.
Hits: 220
Visitors: 225
Downloads: 7
Shaw, Brent, Irwin, Barry V W. Hybrid Sensor Simulation within an ICS Testbed. 2018.
Hits: 214
Visitors: 223
Downloads: 11
Chindipha, Stones D, Irwin, Barry V W. Feasibility Study: Computing Confidence Interval (CI) for IBR Data Using Bootstrapping Technique. 2021.
Hits: 368
Visitors: 384
Downloads: 20
Linklater, Gregory, Marais, Craig, Herbert, Alan, Irwin, Barry V W. Offline-First Design for Fault Tolerant Applications.. 2018.
Hits: 279
Visitors: 288
Downloads: 13
Chindipha, Stones D, Irwin, Barry V W, Herbert, Alan. Effectiveness of Sampling a Small Sized Network Telescope in Internet Background Radiation Data Collection. 2018.
Hits: 387
Visitors: 397
Downloads: 14
Chindipha, Stones D, Irwin, Barry V W, Herbert, Alan. An Evaluation of Text Mining Techniques in Sampling of Network Ports from IBR Traffic. 2019.
Hits: 239
Visitors: 244
Downloads: 7
Pennefather, Sean, Irwin, Barry V W. Design and Fabrication of a Low Cost Traffic Manipulation Hardware Platform. 2015.
Hits: 207
Visitors: 218
Downloads: 15
Van Zyl, Ignus, Rudman, Lauren, Irwin, Barry V W. A review of current DNS TTL practices. 2015.
Hits: 385
Visitors: 391
Downloads: 9
Koorn, Craig, Irwin, Barry V W, Herbert, Alan. Improving Fidelity in Internet Simulation through Packet Injection. 2016.
Hits: 278
Visitors: 287
Downloads: 12
Frieslaar, Ibraheem, Irwin, Barry V W. Developing a Multi Platform Countermeasure to Ensure a Secure Home. 2016.
Hits: 158
Visitors: 167
Downloads: 11
Herbert, Alan, Irwin, Barry V W. Towards malicious network activity mitigation through subnet reputation analysis. 2016.
Hits: 151
Visitors: 173
Downloads: 24
Swart, Ignus, Grobler, Marthie, Irwin, Barry V W. Data Centre vulnerabilities physical, logical and trusted entity security. 2015.
Hits: 147
Visitors: 150
Downloads: 6
Rudman, Lauren, Irwin, Barry V W. A sharing platform for Indicators of Compromise. 2016.
Hits: 260
Visitors: 274
Downloads: 17
Frieslaar, Ibraheem, Irwin, Barry V W. An investigation into the signals leakage from a smartcard based on different runtime code. 2015.
Hits: 211
Visitors: 220
Downloads: 11
Pennefather, Sean, Irwin, Barry V W. Design of a Configurable Embedded Network Tap Flow Generation using NetFlow v9 and IPFIX Formats. 2016.
Hits: 283
Visitors: 297
Downloads: 17
Hunter, Samuel O, Irwin, Barry V W. Near Real-time Aggregation and Visualisation of Hostile Network Traffic. 2011.
Hits: 123
Visitors: 129
Downloads: 8
Irwin, Barry V W, Siebörger, Ingrid, Wells, Daniel. Bandwidth management and monitoring for community networks. 2010.
Hits: 241
Visitors: 261
Downloads: 24
Stalmans, Etienne, Irwin, Barry V W. An Exploratory Framework for Extrusion Detection. 2012.
Hits: 249
Visitors: 260
Downloads: 18
Wells, David D, Siebörger, Ingrid G, Irwin, Barry V W. Mapping the location of 2.4 GHz transmitters to achieve optimal usage of an IEEE 802.11 network. 2008.
Hits: 504
Visitors: 642
Downloads: 153
Wells, David D, Siebörger, Ingrid G, Irwin, Barry V W. Location and mapping of 2.4 GHz RF transmitters. 2008.
Hits: 416
Visitors: 551
Downloads: 146
Peach, Schalk, Irwin, Barry V W, van Heerden, Renier. An overview of linux container based network emulation. 2016.
Hits: 349
Visitors: 355
Downloads: 11
Pilkington, Nick, Irwin, Barry V W. A Canonical Implementation Of The Advanced Encryption Standard On The Graphics Processing Unit. 2008.
Hits: 368
Visitors: 373
Downloads: 7
Van Heerden, Renier P, Irwin, Barry V W, Burke, Ivan D, Leenen, Louise. A computer network attack taxonomy and ontology. 2012.
Hits: 742
Visitors: 741
Downloads: 16
Forrester, Jock, Irwin, Barry V W. A Digital Forensic investigative model for business organisations. 2007.
Hits: 332
Visitors: 344
Downloads: 13
Irwin, Barry V W, van Riel, J P. Using inetvis to evaluate snort and bro scan detection on a network telescope. 2008.
Hits: 232
Visitors: 238
Downloads: 13
Barnett, Richard J, Irwin, Barry V W. A Comparison Of The Resource Requirements Of Snort And Bro In Production Networks. 2009.
Hits: 315
Visitors: 321
Downloads: 11
Irwin, Barry V W, Barnett, Richard J. An analysis of logical network distance on observed packet counts for network telescope data. 2009.
Hits: 210
Visitors: 221
Downloads: 16
Nkhumeleni, Thiswilondi M, Irwin, Barry V W. Observed correlations of unsolicited network traffic over five distinct IPv4 netblocks. 2015.
Hits: 207
Visitors: 214
Downloads: 11
Barnett, Richard J, Irwin, Barry V W. Towards a taxonomy of network scanning techniques. 2008.
Hits: 182
Visitors: 193
Downloads: 14
Irwin, Barry V W, van Riel, Jean-Pierre. Inetvis: a graphical aid for the detection and visualisation of network scans. 2007.
Hits: 162
Visitors: 173
Downloads: 13
Irwin, Barry V W, Herbert, Alan. Deep Routing Simulation. 2013.
Hits: 536
Visitors: 550
Downloads: 17
Bradshaw, Karen L, Irwin, Barry V W, Pennefather, Sean. Design and evaluation of bulk data transfer extensions for the NFComms framework. 2019.
Hits: 384
Visitors: 394
Downloads: 13
Swart, Ignus, Irwin, Barry V W, Grobler, Marthie. Multi sensor national cyber security data fusion. 2015.
Hits: 206
Visitors: 213
Downloads: 10
Herbert, Alan, Irwin, Barry V W, van Heerden, Renier P. DDoS Attack Mitigation Through Control of Inherent Charge Decay of Memory Implementations. 2015.
Hits: 234
Visitors: 248
Downloads: 17
Barnett, Richard J, Irwin, Barry V W. An Analysis of Network Scanning Traffic as it relates to Scan-Detection in Network Intrusion Detection Systems. 2008.
Hits: 274
Visitors: 284
Downloads: 12
Nottingham, Alastair, Irwin, Barry V W. gpf: A GPU accelerated packet classification tool. 2009.
Hits: 189
Visitors: 199
Downloads: 14
Irwin, Barry V W, Pilkington, Nik, Barnett, Richard J, Friedman, Blake. A geopolitical analysis of long term internet network telescope traffic. 2007.
Hits: 468
Visitors: 478
Downloads: 21
Cowie, Bradley, Irwin, Barry V W. An Evaluation of Trading Bands as Indicators for Network Telescope Datasets. 2011.
Hits: 187
Visitors: 194
Downloads: 9
Egan, Shaun P, Irwin, Barry V W. High Speed Lexical Classification of Malicious URLs. 2011.
Hits: 112
Visitors: 121
Downloads: 11
Pranschke, Georg-Christian, Irwin, Barry V W, Barnett, Richard J. Passive Traffic Inspection for Automated Firewall Rule Set Generation. 2009.
Hits: 118
Visitors: 125
Downloads: 9
Zeisberger, Sascha, Irwin, Barry V W. A fuzz testing framework for evaluating and securing network applications. 2011.
Hits: 222
Visitors: 229
Downloads: 9
Linklater, Gregory, Smith, Christian, Connan, James, Herbert, Alan, Irwin, Barry V W. JSON schema for attribute-based access control for network resource security. 2017.
Hits: 345
Visitors: 353
Downloads: 11
Sweeney, Michael, Irwin, Barry V W. A netFlow scoring framework for incident detection. 2017.
Hits: 359
Visitors: 421
Downloads: 67
Frieslaar, Ibrahim, Irwin, Barry V W. Evaluating the multi-threading countermeasure. 2016.
Hits: 183
Visitors: 194
Downloads: 13
Irwin, Barry V W. Decryption of Wire-level Network Protocols for Forensic Inspection. 2004.
Hits: 147
Visitors: 162
Downloads: 17
Forrester, Jock, Irwin, Barry V W. Towards an Infrastructural Framework for Secure Electronic Publication. 2005.
Hits: 85
Visitors: 90
Downloads: 8
Cloran, Russell, Irwin, Barry V W. Transmitting rdf graph deltas for a cheaper semantic web. 2005.
Hits: 115
Visitors: 122
Downloads: 9
Irwin, Barry V W, Nkhumeleni, T. Observed correlations of unsolicited ip traffic across five distinct network telescopes. 2015.
Hits: 238
Visitors: 247
Downloads: 12
Hunter, Samuel O, Irwin, Barry V W. Tartarus: A honeypot based malware tracking and mitigation framework. 2011.
Hits: 134
Visitors: 148
Downloads: 17
Swart, Ignus, Grobler, Marthie, Irwin, Barry V W. Visualization of a data leak. 2013.
Hits: 194
Visitors: 204
Downloads: 13
Ayofe, Azeez N, Irwin, Barry V W. Cyber security: Challenges and the way forward. 2010.
Hits: 161
Visitors: 198
Downloads: 42
Schoeman, A H B, Irwin, Barry V W. Social recruiting: a next generation social engineering attack. 2012.
Hits: 155
Visitors: 165
Downloads: 14
Nottingham, Alastair, Irwin, Barry V W. Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet Classifiers. 2009.
Hits: 145
Visitors: 151
Downloads: 10
Cowie, Bradley, Irwin, Barry V W, Barnett, Richard J. Management, Processing and Analysis of Cryptographic Network Protocols. 2009.
Hits: 185
Visitors: 196
Downloads: 16
Barnett, Richard J, Irwin, Barry V W. A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems. 2009.
Hits: 239
Visitors: 254
Downloads: 19
Pranschke, Georg-Christian, Irwin, Barry V W, Barnett, Richard J. Automated Firewall Rule Set Generation Through Passive Traffic Inspection. 2009.
Hits: 143
Visitors: 154
Downloads: 15
Irwin, Barry V W, Friedman, Blake. Spam Construction Trends. 2008.
Hits: 91
Visitors: 100
Downloads: 11
Clayton, Bradley, Irwin, Barry V W, Terzoli, Alfredo. Integrating Secure RTP into the Open Source VoIP PBX Asterisk. 2006.
Hits: 200
Visitors: 208
Downloads: 10
van Riel, Jean-Pierre, Irwin, Barry V W. Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot. 2006.
Hits: 107
Visitors: 118
Downloads: 13
Barnett, Richard J, Irwin, Barry V W. An Evaluation Of Scan-Detection Algorithms In Network Intrusion Detection Systems. 2008.
Hits: 253
Visitors: 264
Downloads: 13
White, Dominic, Irwin, Barry V W. Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks?. 2006.
Hits: 119
Visitors: 124
Downloads: 9
Moyo, Thamsanqa, Thinyane, Mamello, Wright, Madeleine, Irwin, Barry V W, Clayton, Peter G, Terzoli, Alfredo. Bridging the gap for Next Generation Services: Presence Services on Legacy Devices. 2007.
Hits: 374
Visitors: 382
Downloads: 9
Moyo, Thamsanqa, Thinyane, Mamello, Wright, Madeleine, Irwin, Barry V W, Clayton, Peter G, Terzoli, Alfredo. Bridging the gap for Next Generation Services: Presence Services on Legacy Devices. 2007.
Hits: 292
Visitors: 307
Downloads: 17
Clayton, Bradley, Terzoli, Alfredo, Irwin, Barry V W. DRAPA-a flexible framework for evaluating the quality of VoIP components. 2006.
Hits: 232
Visitors: 238
Downloads: 9
Janse van Rensburg, Johanna, Irwin, Barry V W, Zhao, X G. Design considerations for a reliable and secure wireless network. 2006.
Hits: 223
Visitors: 230
Downloads: 11
van Riel, J.P, Irwin, Barry V W. Toward visualised network intrusion detection. 2006.
Hits: 182
Visitors: 194
Downloads: 15
Otten, Fred, Irwin, Barry V W, Slay, Hannah. Evaluating compression as an enabler for centralised monitoring in a Next Generation Network. 2007.
Hits: 217
Visitors: 222
Downloads: 8
Janse van Rensburg, Johanna, Irwin, Barry V W. Wireless Ethernet Propagation Modeling Software. 2006.
Hits: 141
Visitors: 142
Downloads: 6
Motara, Yusuf, M, Irwin, Barry V W. SHA-1, SAT-solving, and CNF. 2017.
Hits: 187
Visitors: 203
Downloads: 18
Pearson, Deon, Irwin, Barry V W, Herbert, Alan. Weems: An extensible HTTP honeypot. 2017.
Hits: 282
Visitors: 299
Downloads: 20
Frieslaar, Ibrahim, Irwin, Barry V W. Recovering AES-128 encryption keys from a Raspberry Pi. 2017.
Hits: 175
Visitors: 180
Downloads: 10
Cloran, Russell, Irwin, Barry V W. XML digital signature and RDF. 2005.
Hits: 171
Visitors: 178
Downloads: 9
White, Dominic, Irwin, Barry V W. A Unified Architecture For Automatic Software Updates. 2004.
Hits: 161
Visitors: 170
Downloads: 11
Otten, Fred, Irwin, Barry V W, Slay, Hannah. The Need for Centralised, Cross Platform Information Aggregation. 2006.
Hits: 218
Visitors: 233
Downloads: 17
Irwin, Barry V W. Lessons Learned In The Global Deployment Of An Open Source Security Solution. 2004.
Hits: 131
Visitors: 140
Downloads: 11
Irwin, Barry V W. Unlocking the armour: enabling intrusion detection and analysis of encrypted traffic streams. 2005.
Hits: 107
Visitors: 116
Downloads: 11
Janse van Rensburg, Johanna, Irwin, Barry V W. Wireless Network Visualization Using Radio Propagation Modelling. 2005.
Hits: 132
Visitors: 141
Downloads: 11
Forrester, Jock, Irwin, Barry V W. An investigation into unintentional information leakage through electronic publication. 2005.
Hits: 136
Visitors: 139
Downloads: 5
Cloran, Russell, Irwin, Barry V W. Trust on the Web. 2005.
Hits: 137
Visitors: 145
Downloads: 10
Cloran, Russell, Irwin, Barry V W, Terzoli, Alfredo. Securing Real-time multimedia: A brief survey. 2005.
Hits: 223
Visitors: 235
Downloads: 13
Motara, Yusuf, M, Irwin, Barry V W. Sha-1 and the strict avalanche criterion. 2016.
Hits: 201
Visitors: 202
Downloads: 7
Vorster, Johannes, Van Heerden, Renier, Irwin, Barry V W. IEEE; 2016. The pattern-richness of graphical passwords.
Hits: 1341
Visitors: 1397
Downloads: 85
Van Heerden, Renier, Irwin, Barry V W, Burke, I D. Classifying network attack scenarios using an ontology. 2012.
Hits: 838
Visitors: 940
Downloads: 127
Wrench, Peter M, Irwin, Barry V W. A sandbox-based approach to the deobfuscation and dissection of php-based malware. 2015.
Hits: 241
Visitors: 248
Downloads: 13
Frieslaar, Ibraheem, Irwin, Barry V W. A multi-threading approach to secure VERIFYPIN. 2016.
Hits: 266
Visitors: 284
Downloads: 22
Pennefather, Sean, Irwin, Barry V W. Design and application of link: A DSL for network frame manipulation. 2017.
Hits: 297
Visitors: 307
Downloads: 14
Motara, Yusuf, M, Irwin, Barry V W. In-kernel cryptographic executable verification. 2005.
Hits: 97
Visitors: 99
Downloads: 6
Herbert, Alan, Irwin, Barry V W. Adaptable exploit detection through scalable netflow analysis. 2016.
Hits: 267
Visitors: 277
Downloads: 14
Rudman, Lauren, Irwin, Barry V W. Characterization and analysis of NTP amplification based DDoS attacks. 2015.
Hits: 206
Visitors: 210
Downloads: 9
Barnett, Richard J, Irwin, Barry V W. Performance Effects of Concurrent Virtual Machine Execution in VMware Workstation 6. 2009.
Hits: 171
Visitors: 174
Downloads: 6
Van Heerden, Renier, Pieterse, Heloise, Irwin, Barry V W. Mapping the most significant computer hacking events to a temporal computer attack model. 2012.