Esnaashari, Shadi, Welch, Ian and Komisarczuk, Peter (2013) Determining home users' vulnerability to Universal Plug and Play (UPnP) attacks. In: Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, pp. 725-729. ISBN 9781467362399
Lam, Van, Welch, Ian, Gao, P. and Komisarczuk, Peter (2013) Anatomy of drive-by download attack. In: Eleventh Australasian Information Security Conference, 29 Jan - 01 Feb 2013, Adelaide, Australia.
Le, Van Lam, Welch, Ian, Gao, Xiaoying Sharon and Komisarczuk, Peter (2012) A novel scoring model to detect potential malicious web pages. In: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 254-263. ISBN 9781467321723
Le, Van Lam, Welch, Ian, Gao, Xiaoying Sharon and Komisarczuk, Peter (2011) Two-stage classification model to detect malicious web pages. In: International Conference on Advanced Information Networking and Applications (AINA), 22-25 Mar 2011, Biopolis, Singapore.
Le, Van Lam, Welch, Ian, Gao, Xiaoying Sharon and Komisarczuk, Peter (2011) Identification of potential malicious web pages. In: Proceedings of the Ninth Australasian Information Security Conference (AISC 2011), 17-20 Jan 2011, Perth, Australia.
Komisarczuk, Peter and Welch, Ian (2010) Internet sensor grid: experiences with passive and active instruments. In: WCITD/NF 2010, 20-23 Sept 2010, Brisbane, Australia.
Stirling, D., Welch, Ian, Komisarczuk, Peter and Seifert, Christian (2009) Automating malware scanning using workflows. In: 9th IEEE ccGrid Conference, Workflow Systems in e-Science Workshop (WSES), 18-21 May 2009, Shanghai, China.
Seifert, Christian, Delwadia, V., Komisarczuk, Peter, Stirling, D. and Welch, Ian (2009) Measurement study on malicious web servers in the .nz domain. In: Information Security and Privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings. Lecture Notes in Computer Science, 5594. Springer, Heidelberg, Germany, pp. 8-25. ISBN 9783642026195
Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2009) True positive cost curve: a cost-based evaluation method for high-interaction client honeypots. In: Emerging Security Information, Systems and Technologies. SECURWARE'09. Third International Conference on IEEE, 18-23 Jun 2009, Athens, Greece.
Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Identification of malicious web pages with static heuristics. In: 2008 Australasian Telecommunication Networks and Applications Conference (ATNAC 2008), 07-10 Dec 2008, Adelaide, Australia.
Seifert, Christian, Welch, Ian, Komisarczuk, Peter, Aval, Chiraag Uday and Endicott-Popovsky, Barbara (2008) Identification of malicious web pages through analysis of underlying DNS and web server relationships. In: 33rd IEEE Conference on Local Computer Networks (LCN 2008), 14-17 Oct 2008, Montreal, Canada.
Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Designing workflows for grid enabled internet instruments. In: The 8th IEEE CCGrid 2008 Conference, 19-22 May 2008, Lyon, France.
Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 2 report. Technical Report. Victoria University of Wellington, Wellington.
Seifert, Christian, Komisarczuk, Peter and Welch, Ian (2008) Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. In: 2008 ACM Symposium on Applied Computing (SAC '08), 16-20 Mar 2008, Fortaleza, Brazil.
Seifert, Christian, Stirling, D., Welch, Ian and Komisarczuk, Peter (2008) Internet NZ study - stage 1 report. Technical Report. Victoria University of Wellington, Wellington, NZ.
Seifert, Christian, Endicott-Popovsky, Barbara, Frincke, Deborah A., Komisarczuk, Peter, Muschevici, Radu and Welch, Ian (2008) Justifying the need for forensically ready protocols: a case study of identifying malicious web servers using client honeypots. In: Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, 27–30 Jan 2008, Kyoto, Japan.
Navarez, J., Seifert, Christian, Endicott-Popovsky, Barbara, Welch, Ian and Komisarczuk, Peter (2008) Technical report, Victoria University of Wellington. Wellington.
Pemberton, D., Komisarczuk, Peter and Welch, Ian (2007) Internet background radiation arrival density and network telescope sampling strategies. In: Australasian Telecommunication Networks and Applications Conference 2007 (ATNAC 2007). IEEE, pp. 246-252. ISBN 9781424415571
Komisarczuk, Peter, Seifert, Christian, Pemberton, D. and Welch, Ian (2007) Grid enabled internet instruments. In: IEEE Global Telecommunications Conference, 2007 (GLOBECOM '07). IEEE, pp. 1906-1911. ISBN 9781424410422
Seifert, Christian, Steenson, Ramon, Welch, Ian and Komisarczuk, Peter (2007) Capture - a behavioral analysis tool for applications and documents. In: The Digital Forensic Research Conference, 13-15 Aug 2007, Pittsburgh, USA.
Komisarczuk, Peter and Welch, Ian (2007) Web based board game for teaching aspects of Internet engineering, ACTA/IASTED. International Journal of Advanced Technology for Learning on Games-based Learning, 4 (4).
Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Effectiveness of security by admonition: a case study of security warnings in a web browser setting. (In)secure Magazine, 9. pp. 9-16.
Komisarczuk, Peter and Welch, Ian (2006) Initial experience with an internet computing capstone course. Australasian Computer Education.
Komisarczuk, Peter and Welch, Ian (2006) A board game for teaching internet engineering. In: 8th Australasian Conference on Computing Education (ACE '06), 16-19 Jan 2006, Hobart, Australia.
Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) HoneyC - The low-interaction client honeypot. Technical Report. University of Wellington.
Seifert, Christian, Welch, Ian and Komisarczuk, Peter (2006) Taxonomy of honeypots. Technical Report. Victoria University of Wellington.