Dr Gideon Creech

Industry Professional
School of Engineering and Information Technology

LOCATION

Room 204 Building 15
UNSW Canberra
Northcott Drive, Canberra ACT 2600

  • PUBLICATIONS

Book Chapters

Moustafa N; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), DATA ANALYTICS AND DECISION SUPPORT FOR CYBERSECURITY: TRENDS, METHODOLOGIES AND APPLICATIONS, edn. Data Analytics-Series, SPRINGER INTERNATIONAL PUBLISHING AG, pp. 127 - 156, http://dx.doi.org/10.1007/978-3-319-59439-2_5

Journal articles

Creech G, 2017, 'New approach to return-oriented programming exploitation mitigation', Information Security Journal, vol. 26, pp. 105 - 120, http://dx.doi.org/10.1080/19393555.2017.1308583

Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166

Haider W; Creech G; Xie Y; Hu J, 2016, 'Windows based data sets for evaluation of robustness of Host based Intrusion Detection Systems (IDS) to zero-day and stealth attacks', Future Internet, vol. 8, http://dx.doi.org/10.3390/fi8030029

Creech G; Hu J, 2014, 'A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns', IEEE Transactions on Computers, vol. 63, pp. 807 - 819, http://dx.doi.org/10.1109/TC.2013.13

Conference Papers

Moustafa N; Creech G; Slay J, 2018, 'Anomaly detection system using beta mixture models and outlier detection', in Advances in Intelligent Systems and Computing, pp. 125 - 135, presented at , http://dx.doi.org/10.1007/978-981-10-7871-2_13

Moustafa N; Creech G; Slay J, 2018, 'Flow aggregator module for analysing network traffic', in Advances in Intelligent Systems and Computing, pp. 19 - 29, presented at , http://dx.doi.org/10.1007/978-981-10-7871-2_3

Marsden T; Moustafa N; Sitnikova E; Creech G, 2018, 'Probability risk identification based intrusion detection system for SCADA systems', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 353 - 363, presented at , http://dx.doi.org/10.1007/978-3-319-90775-8_28

Taylor J; Turnbull B; Creech G, 2018, 'Volatile memory forensics acquisition efficacy: A comparative study towards analysing firmware-based rootkits', in ACM International Conference Proceeding Series, presented at , http://dx.doi.org/10.1145/3230833.3232810

Moustafa N; Creech G; Sitnikova E; Keshk M, 2017, 'Collaborative anomaly detection framework for handling big data of cloud computing', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, pp. 1 - 6, presented at , http://dx.doi.org/10.1109/MilCIS.2017.8190421

Keshk M; Moustafa N; Sitnikova E; Creech G, 2017, 'Privacy preservation intrusion detection technique for SCADA systems', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, pp. 1 - 6, presented at , http://dx.doi.org/10.1109/MilCIS.2017.8190422

Creech G; Hu J, 2013, 'Generation of a new IDS test dataset: Time to retire the KDD collection', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487 - 4492, presented at , http://dx.doi.org/10.1109/WCNC.2013.6555301

Creech G; Jiang F, (eds.), 2012, 'The Application of Extreme Learning Machines to the Network Intrusion Detection Problem', in NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, AMER INST PHYSICS, Kos, GREECE, pp. 1506 - 1511, presented at International Conference of Numerical Analysis and Applied Mathematics (ICNAAM), Kos, GREECE, 19 - 25 September 2012, http://dx.doi.org/10.1063/1.4756450

Creech G; Jiang F, (eds.), 2012, 'Semantics Based Multi-layered Networks for Spam Email Detection', in NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, AMER INST PHYSICS, Kos, GREECE, pp. 1518 - 1523, presented at International Conference of Numerical Analysis and Applied Mathematics (ICNAAM), Kos, GREECE, 19 - 25 September 2012, http://dx.doi.org/10.1063/1.4756452