Dr Gideon Creech

Industry Professional
School of Engineering and Information Technology

LOCATION

Room 204 Building 15
UNSW Canberra
Northcott Drive, Canberra ACT 2600

  • PUBLICATIONS

Book Chapters

Moustafa NM; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, pp. 127 - 156, http://dx.doi.org/10.1007/978-3-319-59439-2_5

Journal articles

Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166

Creech G, 2017, 'New approach to return-oriented programming exploitation mitigation', Information Security Journal, vol. 26, pp. 105 - 120, http://dx.doi.org/10.1080/19393555.2017.1308583

Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks', Future Internet, vol. 8, pp. 29 - 29, http://dx.doi.org/10.3390/fi8030029

Creech G; Hu J, 2014, 'A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns', IEEE Transactions on Computers, vol. 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13

Conference Papers

Taylor J; Turnbull B; Creech G, 2018, 'Volatile memory forensics acquisition efficacy: A comparative study towards analysing firmware-based rootkits', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3230833.3232810

Marsden T; Moustafa N; Sitnikova E; Creech G, 2018, 'Probability Risk Identification Based Intrusion Detection System for SCADA Systems', in Mobile Networks and Management, Springer International Publishing, Melbourne, Australia, pp. 353 - 363, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_28

Hassan MM; Moustafa N; Sitnikova E; Creech G, 2017, 'Privacy Preservation Intrusion Detection Technique for SCADA Systems', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, Canberra, pp. 1 - 6, presented at MilCIS 2017 IEEE Stream, Canberra, 14 November 2017 - 16 November 2017, http://dx.doi.org/10.1109/MilCIS.2017.8190422

Moustafa N; Creech G; Sitnikova E; Hassan M, 2017, 'Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, Canberra, Australia, pp. 1 - 6, presented at Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 13 November 2017 - 14 November 2017, http://dx.doi.org/10.1109/MilCIS.2017.8190421

Moustafa NM; Creech GC; Slay JS, 2017, 'Flow Aggregator Module for Analysing Network Traffic', in International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, pp. 19 - 29, presented at International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017, http://dx.doi.org/10.1007/978-981-10-7871-2_3

Moustafa NM; Creech GC; SLAY JS, 2017, 'Anomaly Detection System using Beta Mixture Models and Outlier Detection', in Das HD (ed.), Advances in Intelligent Systems and Computing, School of Computer Engineering, KIIT University, pp. 125 - 135, presented at The International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017, http://dx.doi.org/10.1007/978-981-10-7871-2_13

Creech G; Hu J, 2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492, http://dx.doi.org/10.1109/WCNC.2013.6555301

Creech G; Jiang F, 2012, 'Semantics Based Multi-layered Networks for Spam Email Detection', in Simos TE; Psihoyios G; Tsitouras C; Anastassi Z (eds.), NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, AMER INST PHYSICS, Kos, GREECE, pp. 1518 - 1523, presented at International Conference of Numerical Analysis and Applied Mathematics (ICNAAM), Kos, GREECE, 19 September 2012 - 25 September 2012, http://dx.doi.org/10.1063/1.4756452

Creech G; Jiang F, 2012, 'The Application of Extreme Learning Machines to the Network Intrusion Detection Problem', in Simos TE; Psihoyios G; Tsitouras C; Anastassi Z (eds.), NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, AMER INST PHYSICS, Kos, GREECE, pp. 1506 - 1511, presented at International Conference of Numerical Analysis and Applied Mathematics (ICNAAM), Kos, GREECE, 19 September 2012 - 25 September 2012, http://dx.doi.org/10.1063/1.4756450