- Search
Publications: Payne, Christian
Journal Article
Studiawan, H., Sohel, F. and Payne, C. (2020) Anomaly detection in operating system logs with deep Learning-based sentiment analysis. IEEE Transactions on Dependable and Secure Computing, 18 (5). pp. 2136-2148.
Studiawan, H., Sohel, F. and Payne, C. (2020) Sentiment analysis in a forensic timeline with deep learning. IEEE Access, 8 . pp. 60664-60675.
Finlay, L. and Payne, C. (2019) The attribution problem and cyber armed attacks. AJIL Unbound, 113 . pp. 202-206.
Studiawan, H., Sohel, F. and Payne, C. (2019) A survey on forensic investigation of operating system logs. Digital Investigation, 29 . pp. 1-20.
Studiawan, H., Payne, C. and Sohel, F. (2017) Graph clustering and anomaly detection of access control log for forensic purposes. Digital Investigation, 21 . pp. 76-87.
Schreuders, Z.C., Payne, C. and McGill, T. (2013) The functionality-based application confinement model. International Journal of Information Security, 12 (5). pp. 393-422.
Schreuders, Z.C., McGill, T. and Payne, C. (2013) The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls. Computers & Security, 32 . pp. 219-241.
Schreuders, Z.C., McGill, T.J. and Payne, C. (2012) Towards usable application-oriented access controls: Qualitative results from a usability study of SELinux, AppArmor and FBAC-LSM. International Journal of Information Security and Privacy, 6 (1). pp. 57-76.
Schreuders, Z.C., McGill, T. and Payne, C. (2011) Empowering end users to confine their own applications: The results of a usability study comparing SELinux, AppArmor and FBAC-LSM. ACM Transactions on Information and System Security, 14 (2). pp. 1-28.
Payne, C. (2002) On the security of open source software. Information Systems Journal, 12 (1). pp. 61-78.
Conference Paper
Studiawan, H., Sohel, F. and Payne, C. (2020) Automatic event log abstraction to support forensic investigation. In: ACSW '20: Australasian Computer Science Week 2020, 3 - 7 February 2020, Swinburne University of Technology, Melbourne
Studiawan, H., Sohel, F. and Payne, C. (2018) Automatic log parser to support forensic analysis. In: 16th Australian Digital Forensics Conference, 4 - 5 December 2018, Edith Cowan, Joondalup
Schreuders, Z.C., Payne, C. and McGill, T.J. (2011) Techniques for automating policy specification for application-oriented access controls. In: Sixth International Conference on Availability, Reliability and Security (AReS 2011), 22 - 26 August 2011, Vienna, Austria pp. 266-271.
Schreuders, Z.C., Payne, C. and McGill, T.J. (2011) A policy language for abstraction and automation in application-oriented access controls: The Functionality-based application confinement policy language. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011), 6 - 8 June 2011, Pisa, Italy pp. 113-116.
Schreuders, Z.C. and Payne, C. (2008) Functionality-based application confinement: parameterised hierarchical application restrictions. In: International Conference on Security and Cryptography (SECRYPT 2008), 26 - 29 July, Porto, Portugal
Deatrich, D., Liu, S., Payne, C., Tafirout, R., Walker, R., Wong, A. and Vetterli, M. (2008) Grid infrastructure and large scale production for ATLAS. In: 22nd International Symposium on High Performance Computing Systems and Applications, HPCS 2008, 9 - 11 June, Quebec, Canada pp. 172-176.
Payne, C., Deatrich, D., Liu, S., McDonald, S., Tafirout, R., Walker, R., Wong, A. and Vetterli, M. (2008) High performance networks for the ATLAS Tier-1 @ TRIUMF. In: 22nd International Symposium on High Performance Computing Systems and Applications, HPCS 2008, 9 - 11 June, Quebec, Canada pp. 161-166.
Deatrich, D., Liu, S., Payne, C., Tafirout, R., Walker, R., Wong, A. and Vetterli, M. (2008) Managing Petabyte-Scale Storage for the ATLAS Tier-1 Centre at TRIUMF. In: 22nd International Symposium on High Performance Computing Systems and Applications, HPCS 2008, 9 - 11 June, Quebec, Canada pp. 167-171.
Schreuders, Z.C. and Payne, C. (2008) Reusability of functionality-based application confinement policy abstractions. In: 10th International Conference on Information and Communications Security (ICICS 2008), 20 - 22 October, Birmingham pp. 206-221.
Payne, C. (2007) A cryptographic access control architecture secure against privileged attackers. In: CCS 2007 - 14th ACM Computer and Communications Security Conference, October 29 - November 2, 2007, Alexandria, VA, USA pp. 70-76.
Payne, C. (2007) An improved model for secure cryptographic integrity verification of local code. In: SECRYPT 2007 - International Conference on Security and Cryptography, 28-37 July 2007, Barcelona pp. 80-84.
Payne, C. (2004) Enhanced security models for operating systems: a cryptographic approach. In: Proceedings of the 28th Annual International Computer Software and Applications Conference, COMPSAC 2004, 28 - 30 September, Hong Kong pp. 230-235.
McGill, T.J., Payne, C., Bennett, D., Carter, K., Chong, A., Hornby, G. and Lim, L (2000) System quality, user satisfaction and end user development. In: 11th Australasian Conference on Information Systems, December, Brisbane
McGill, T.J., Payne, C., Bennett, D., Carter, K., Chong, A., Hornby, G. and Lim, L (1999) System quality, user satisfaction and end user development. In: 2nd Western Australian Workshop on Information Systems Research (WAWISR), 27th November 1999, Perth, W.A pp. 204-209.
Book Chapter
Studiawan, H., Payne, C. and Sohel, F. (2019) Automatic Graph-Based clustering for security logs. In: Barolli, L., Takizawa, M., Xhafa, F. and Enokido, T., (eds.) Primate Life Histories, Sex Roles, and Adaptability. Springer, pp. 914-926.
Thesis
Payne, Christian (2009) A cryptographically-based operating system security model that protects against privileged attackers. PhD thesis, Murdoch University.
Payne, Christian (1999) Security through design as a paradigm for systems development. Honours thesis, Murdoch University.