Lynn Batten
#66,522
Most Influential Person Now
Canadian mathematician
Lynn Batten's AcademicInfluence.com Rankings
Lynn Battenmathematics Degrees
Mathematics
#3620
World Rank
#5314
Historical Rank
Measure Theory
#3596
World Rank
#4240
Historical Rank
Download Badge
Mathematics
Why Is Lynn Batten Influential?
(Suggest an Edit or Addition)According to Wikipedia, Lynn Margaret Batten was a Canadian-Australian mathematician known for her books about finite geometry and cryptography, and for her research on the classification of malware. Education and career Batten earned her Ph.D. at the University of Waterloo in 1977. Her dissertation was D-Partition Geometries.
Lynn Batten's Published Works
Published Works
- Classification of malware based on integrated static and dynamic features (2013) (237)
- Differentiating malware from cleanware using behavioural analysis (2010) (168)
- Function length as a tool for malware classification (2008) (128)
- An automated classification system based on the strings of trojan and virus families (2009) (122)
- Broadcast anti-jamming systems (1999) (100)
- Classification of Malware Based on String and Function Feature Selection (2010) (84)
- E-commerce: protecting purchaser privacy to enforce trust (2011) (80)
- Combinatorics of Finite Geometries (1986) (75)
- Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings (2006) (69)
- The theory of finite linear spaces - combinatorics of points and lines (1993) (60)
- Cyber security attacks to modern vehicular systems (2017) (53)
- Analysis of malicious and benign android applications (2012) (53)
- Fast Algorithm for the Cutting Angle Method of Global Optimization (2002) (46)
- Algebraic Attacks Over GF(q) (2004) (41)
- New directions in IoT privacy using attribute-based authentication (2016) (37)
- Towards an understanding of the impact of advertising on data leaks (2012) (30)
- Games, graphs and circular arguments (1984) (27)
- Determining sets (2000) (26)
- The Theory of Finite Linear Spaces: Preface (1993) (26)
- Microsoft and Amazon: A comparison of approaches to cloud security (2012) (25)
- Algebraic Attacks on Clock-Controlled Stream Ciphers (2006) (23)
- Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks (2009) (21)
- Reproducibility of Digital Evidence in Forensic Investigations (2005) (21)
- Public Key Cryptography: Applications and Attacks (2013) (20)
- Some Sets of Type (m,n) in Cubic Order Planes (1999) (19)
- Feature Reduction to Speed Up Malware Classification (2011) (18)
- Contrasting Permission Patterns between Clean and Malicious Android Applications (2013) (16)
- Robust performance testing for digital forensic tools (2009) (15)
- Teaching Digital Forensics to Undergraduate Students (2008) (14)
- Using Mobile Agents to Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor Networks (2007) (14)
- Mitigating man-in-the-middle attacks on smartphones – a discussion of SSL pinning and DNSSec (2014) (14)
- A Testbed for Security Analysis of Modern Vehicle Systems (2017) (13)
- An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones (2014) (13)
- Blocking Semiovals of Type (1, m+1, n+1) (2001) (12)
- Off-line digital cash schemes providing untraceability, anonymity and change (2019) (11)
- Fast Recovery from Node Compromise in Wireless Sensor Networks (2009) (11)
- Smartphone Applications, Malware and Data Theft (2016) (11)
- Aggregating privatized medical data for secure querying applications (2017) (11)
- Zero permission android applications - attacks and defenses (2012) (11)
- Applications and Techniques in Information Security (2014) (11)
- Lightweight Authentication for Recovery in Wireless Sensor Networks (2009) (11)
- Computational Intelligence, Cyber Security and Computational Models (2014) (10)
- Applications and Techniques in Information Security (2015) (10)
- Sharing sensitive medical data sets for research purposes - A case study (2014) (9)
- Linear spaces with line range {n−1, n, n + 1} and at most n2 points (1980) (9)
- The Major Drawbacks To The Use Of Wireless Communication Products In Education (2003) (9)
- Algebraic Attacks on Clock-Controlled Cascade Ciphers (2006) (9)
- Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks (2007) (8)
- Smartphone Malware based on synchronization Vulnerabilities (2011) (8)
- Predicting molecular structures: an application of the cutting angle method (2003) (8)
- A Comparison of the Classification of Disparate Malware Collected in Different Time Periods (2012) (8)
- Locally generalized projective lattices satisfying a bundle theorem (1987) (7)
- Survey in Smartphone Malware Analysis Techniques (2015) (7)
- Rank functions of closure spaces of finite rank (1984) (7)
- Embedding d-partition geometries in generalized projective space (1978) (7)
- A Lower Bound on Effective Performance Testing for Digital Forensic Tools (2007) (7)
- Geodesic subgraphs (1983) (7)
- Android applications: Data leaks via advertising libraries (2014) (6)
- Information discovery in multidimensional wireless sensor networks (2013) (6)
- eCommerce Strategy In A Multi-Sector Trading Environment . Quandaries For SMEs (2004) (5)
- Securing Data Privacy on Mobile Devices in Emergency Health Situations (2012) (5)
- Using Mobile Agents to Detect and Recover from Node Compromise in Path-based DoS Attacks in Wireless Sensor Networks (2007) (5)
- Applications and Techniques in Information Security (2016) (5)
- d-Partition geometries (1978) (5)
- Blocking Sets in (υ,{2, 4}, 1)-Designs (1997) (5)
- Can Smartphone Users Turn Off Tracking Service Settings? (2013) (5)
- Measure of Integrity Leakage in Live Forensic Context (2008) (5)
- Permutations with a distinct difference property (2003) (5)
- Information Sharing in Supply Chain Systems (2006) (5)
- Blocking sets with flag transitive collineation groups (1991) (4)
- A characterization of the complement of the union of two disjoint Baer subplanes (1985) (4)
- Proceedings of the 7th Australian Conference on Information Security and Privacy (2002) (4)
- Security Management: An Information Systems Setting (2002) (4)
- Linear spaces with few lines (1993) (4)
- Using Relationship-Building in Event Profiling for Digital Forensic Investigations (2010) (4)
- Fast and energy efficient data storage for information discovery in multi-dimensional WSNs (2015) (4)
- Prevention of Information Harvesting in a Cloud Services Environment (2011) (4)
- Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations (2012) (4)
- AN EFFICIENT SOLUTION FOR PRIVACY - PRESERVING , SECURE REMOTE ACCESS TO SENSITIVE DATA (2012) (4)
- Combinatorics of finite geometries: Index of notation (1997) (4)
- Locally generalized projective spaces (1987) (4)
- Wireless broadcast encryption based on smart cards (2010) (4)
- A New Method for Locating the Global Optimum: Application of the Cutting Angle Method to Molecular Structure Prediction (2003) (4)
- Curbing collusive cyber-gossips for business brand management (2017) (4)
- Monitoring Employees' Emails without Violating Their Privacy Right (2007) (3)
- Mobile Money in the Australasian Region - A Technical Security Perspective (2016) (3)
- Extending abelian groups to rings (2007) (3)
- Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 (2016) (3)
- The RSA Scheme (2013) (3)
- Finite linear spaces with two consecutive line degrees (1983) (3)
- Securing Small Business - The Role of Information Technology Policy (2005) (2)
- An Efficient Algorithm for Partitioning and Authenticating Problem-Solutions of eLearning Contents (2013) (2)
- The Collineation Groups of Figueroa Planes (1993) (2)
- Applications and Techniques in Information Security (2017) (2)
- A Trusted Approach to E-Commerce (2008) (2)
- Heraclitus: A LFSR-based stream cipher with key dependent structure (2011) (2)
- An Effective and Efficient Testing Methodology for Correctness Testing for File Recovery Tools (2007) (2)
- Energy efficient information discovery approach for range queries in multi-dimensional WSNs (2014) (2)
- An analysis of Chen's construction of minimum-distance five codes (2000) (2)
- Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks (2015) (2)
- Segregation-of-duties conflicts in the insider threat landscape An overview and case study (2015) (2)
- An extension of Wagner's theorem (1991) (2)
- Robust Correctness Testing for Digital Forensic Tools (2009) (2)
- Engaging suppliers in electronic trading across industry sectors (2004) (2)
- Testing Digital Forensic Software Tools Used in Expert Testimony (2010) (2)
- Network Resilience in Low-Resource Mobile Wireless Sensor Networks (2010) (2)
- Correction to ‘d-partition geometries’ (1981) (2)
- Translation triple systems (1989) (2)
- New advances in securing cyberspace and curbing crowdturfing (2017) (2)
- A Privacy Preserving E-Payment Scheme (2009) (1)
- An Attack-Resistant Hybrid Data-Privatization Method with Low Information Loss (2013) (1)
- Advances in security research in the Asiacrypt region (2020) (1)
- E-business security strategies for SMEs (2003) (1)
- Designing Information Systems Which Manage or Avoid Privacy Incidents (2008) (1)
- The presence of mathematics anxiety in future primary school teachers and factors affecting abatement (2013) (1)
- Combinatorics of finite geometries: Bibliography (1997) (1)
- Information Security and Privacy (2002) (1)
- JORDAN-DEDEKIND SPACES (1984) (1)
- The 0-1 Knapsack Polytope - A Starting Point for Cryptanalysis of Knapsack Ciphers? (2014) (1)
- Unique Rabin-Williams Signature Scheme Decryption (2019) (1)
- vPELS: An E-Learning Social Environment for VLSI Design with Content Security Using DRM (2014) (1)
- A French-Australian comparison of attitudes towards security and privacy in modern information technologies (2006) (1)
- A New Rabin-Type Cryptosystem with Modulus p2q (2020) (1)
- The nonexistence of finite linear spaces with v=n2 points and b=n2+n+2 lines (1993) (1)
- A Novel Approach for Information Discovery in Wireless Sensor Grids (2018) (1)
- Combinatorics of finite geometries: Partial geometries (1997) (1)
- Embedding the complement of a minimal blocking set in a projective plane (1984) (1)
- Efficient broadcast key distribution with dynamic revocation (2008) (1)
- An adaptive approach to information discovery in multi-dimensional wireless sensor networks (2013) (1)
- Enhancement of user level controls in cloud databases (2012) (1)
- Using Hypothesis Generation in Event Profiling for Digital Forensic Investigations (2012) (1)
- The Theory of Finite Linear Spaces: Semiaffine linear spaces with large order (1993) (1)
- An Anonymity Revocation Technology for Anonymous Communication (2008) (1)
- Other Combinatorial Designs (2006) (1)
- Chapter 7 Classification of Chemical Compound Pharmacophore Structures (2000) (0)
- eTransactions in the Australian Supply Chain Setting eTransactions in the Australian Supply Chain Setting (2020) (0)
- Cloud omnibus system for evaluating cloud market services (2016) (0)
- Proceedings of the 11th Australasian conference on Information Security and Privacy (2006) (0)
- Combinatorics of finite geometries: Projective spaces (1997) (0)
- Dealing with Rogue Virtual Machines in a Cloud Services Environment (2011) (0)
- A dual approach to embedding the complement of two lines in a finite projective plane (1991) (0)
- Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings (2019) (0)
- IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks (2018) (0)
- Applications and Techniques in Information Security: International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings (2014) (0)
- In memory of PAUL de WITTE 1931–1980 (1993) (0)
- Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006Proceedings (Lecture Notes in Computer Science) (2006) (0)
- d-Dimensional linear spaces (1993) (0)
- eTransactions in the Australian Supply Chain Setting (2003) (0)
- Implementing Recovery in Low-Resource Stationary Wireless Sensor Networks (2011) (0)
- A solution for privacy-preserving, remote access to sensitive data (2014) (0)
- A Novel Approach for Information Discovery in Wireless Sensor Grids (2017) (0)
- Information warfare incident monitoring - government or public responsibility? (2002) (0)
- Special issue on behavior data security issues in network information propagation (2014) (0)
- A New Sign-Change Attack on the Montgomery Ladders (2016) (0)
- PELS: A Noble Architecture and Framework for a Personal E-Learning System (PELS) (2014) (0)
- Combinatorics of finite geometries: Affine spaces (1997) (0)
- The Risk of Advertizing Libraries on Android Mobile Devices (2013) (0)
- First Applications and Techniques in Information Security Workshop (2011) (0)
- Compressed nested certificates provide more efficient PKI (2007) (0)
- Equitable colourings in the Witt designs (1997) (0)
- 3 Extractions of Behavioural Features from API Calls (2010) (0)
- Cryptographic Public Key Length Prediction (2015) (0)
- A characterization of finite linear spaces on v points, n2<=v<(n+1)2, andb=n2+n+3 lines, n>=10 (1993) (0)
- Applications and techniques in information security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, proceedings (2016) (0)
- Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings (2018) (0)
- A French-Australian Comparison of Responsibilities for the Monitoring of Security and Privacy Issues Resulting from the Introduction of New Information Technologies (2007) (0)
- Securing cyberspace (2016) (0)
- Semiaffine linear spaces (1993) (0)
- IEEE Press Series on Information and Communication Networks Security (2013) (0)
- Government responsibilities for the monitoring of security and privacy issues around new information technologies - a French-Australian comparison (2006) (0)
- Minimally projectively embeddable Steiner systems (1989) (0)
- Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change (2017) (0)
- Skew arcs and Wagner's [23, 14, 5] code (2006) (0)
- The padding scheme for RSA signatures (2010) (0)
- Linear spaces: geometric aspects (2006) (0)
- ACISP 2002 : Information security and privacy : 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings (2002) (0)
- e-Learning Content Authentication Using Bipartite Matching (2013) (0)
- The Theory of Finite Linear Spaces: Complementation (1993) (0)
- Elliptic Curve Cryptography (2013) (0)
- Inferring eye movements on the basis of head and visual target position (2001) (0)
- Message from C 3 -2014 chairs (2014) (0)
- Group action on linear spaces (1993) (0)
- Introduction to the Special section on Aadvanced Computing in Networking and Intelligent Systems (2017) (0)
- Decompositions of finite projective planes (2002) (0)
- Combinatorics of finite geometries: Near-linear spaces (1997) (0)
- Off-line digital cash schemes providing untraceability, anonymity and change (2018) (0)
- Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017) (2019) (0)
- The Elgamal Scheme (2013) (0)
- Efficiencies in Binary Elliptic Curves (2018) (0)
- Combinatorics of finite geometries: Generalized quadrangles (1997) (0)
- Embedding pseudo-complements of quadrics in PG(n, q), n geq 3, q geq 2 (1988) (0)
- Appendix: Solutions to Problems (2013) (0)
This paper list is powered by the following services:
Other Resources About Lynn Batten
What Schools Are Affiliated With Lynn Batten?
Lynn Batten is affiliated with the following schools: