Aspects of Exceptions at the Meta-Level (Position Paper)

Ian S Welch , Robert J Stroud , Alexander Romanovsky
Department of Computing, University of Newcastle upon Tyne

4
2001
Re-engineering Security as a Crosscutting Concern

Ian S Welch , Robert J Stroud
The Computer Journal 46 ( 5) 578 -589

11
2003
Security and aspects: A metaobject protocol viewpoint

Ian S Welch , Robert J Stroud
Aspects, Components, and Patterns for Infrastructure Software 82 -82

6
2002
Kava-a powerful and portable reflective Java

Ian S Welch , Robert J Stroud
123 -124

2000
Identification of potential malicious web pages

Van Lam Le , Ian Welch , Xiaoying Sharon Gao , Peter Komisarczuk
information security conference 33 -40

3
2011
Anatomy of drive-by download attack

Van Lam Le , Ian Welch , Xiaoying Gao , Peter Komisarczuk
information security conference 49 -58

20
2013
Reflections on Programming with Grid Toolkits.

Ian Welch , Emiliano Tramontana
RAM-SE 3 -8

3
2004
Runtime Implementation of Aspects Using Kava

Ian Welch , Robert J. Stroud
workshop on object oriented technology 303 -304

1999
HoneyC - The low-interaction client honeypot

Peter Komisarczuk , Ian Welch , Christian Seifert
University of Wellington

125
2006
A board game for teaching internet engineering

Peter Komisarczuk , Ian Welch
australasian computing education conference 117 -123

7
2006
Evaluation of fingerprinting techniques and a windows-based dynamic honeypot

Ian Welch , Masood Mansoori , Hamid Mohammadzadeh
information security conference 59 -66

11
2013
Internet NZ study - stage 2 report

Peter Komisarczuk , D. Stirling , Christian Seifert , Ian Welch
Victoria University of Wellington

2008
Using remotely executing software via a mobile device

Vipul Delwadia , Ian Welch , Stuart Marshall
australasian user interface conference 3 -8

4
2009
The effect of user interface delay in thin client mobile games

Vipul Delwadia , Ian Welch , Stuart Marshall
australasian user interface conference 5 -13

1
2010
YALIH, yet another low interaction honeyclient

Ian Welch , Masood Mansoori , Qiang Fu
information security conference 7 -15

11
2014
Achieving IoT Devices Secure Sharing in Multi-User Smart Space

Ian Welch , Mohammed Al-Shaboti , Gang Chen
local computer networks 88 -99

2020
Internet of Things (IoT) Privacy and Security: A User-Focused Study of Aotearoa New Zealand Home Users.

Ian Welch , Bryan Ng , Sue Chard , Lisa Patterson
hawaii international conference on system sciences 1 -10

2021
IoT Attacks: Features Identification and Clustering

Harith Al-Sahaf , Ian Welch , Masood Mansoori , Junaid Haseeb
trust security and privacy in computing and communications 353 -360

3
2020
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain

Ian Welch , Masood Mansoori , Junaid Haseeb
trust security and privacy in computing and communications 557 -567

10
2020
From Dalang to Kava - The Evolution of a Reflective Java Extension

Ian Welch , Robert Stroud
Lecture Notes in Computer Science 2 -21

49
1999