Name
Affiliation
Papers
MATTHEW ROUGHAN
Univ Adelaide, Sch Math Sci, Adelaide, SA 5005, Australia
105
Collaborators
Citations 
PageRank 
130
1638
148.27
Referers 
Referees 
References 
3471
1292
1102
Search Limit
1001000
Title
Citations
PageRank
Year
Information flow estimation: A study of news on Twitter00.342022
Likelihood-Based Inference for Modelling Packet Transit From Thinned Flow Summaries00.342022
Verifiable Policy-Defined Networking Using Metagraphs00.342022
Generating Name-Like Vectors for Testing Large-Scale Entity Resolution00.342021
Popularity And Centrality In Spotify Networks: Critical Transitions In Eigenvector Centrality00.342021
A Review Of Shannon And Differential Entropy Rate Estimation00.342021
Counting Candy Crush Configurations00.342021
Landmarks-Based Blocking Method For Large-Scale Entity Resolution00.342020
The one comparing narrative social network extraction techniques00.342020
BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping00.342020
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities00.342020
ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report).00.342019
Generating connected random graphs00.342019
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles40.402019
How The Avengers Assemble: Ecological Modelling Of Effective Cast Sizes For Movies00.342019
Network structure inhibits information cascades in heavy-tailed social networks.00.342018
Super-blockers and the Effect of Network Structure on Information Cascades.00.342018
Rasch Analysis of HTTPS Reachability.00.342018
Hierarchical Traffic Matrices - Axiomatic Foundations to Practical Traffic Matrix Synthesis.00.342018
Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles.100.672018
A BasisEvolution framework for network traffic anomaly detection.10.372018
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay20.372018
The one comparing narrative social network extraction techniques.10.352018
Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report).00.342018
Rigorous statistical analysis of HTTPS reachability.00.342017
Controlled Synthesis of Traffic Matrices.00.342017
Malachite: Firewall policy comparison80.732016
The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report).00.342016
Verifiable Policy-defined Networking for Security Management.20.482016
The Mathematical Foundations for Mapping Policies to Network Devices.10.362016
Case Studies of SCADA Firewall Configurations and the Implications for Best Practices.10.382016
Towards Standardising Firewall Reporting.20.402015
Fast Generation of Spatially Embedded Random Networks10.362015
Unravelling Graph-Exchange File Formats.20.392015
Spatiotemporal Traffic Matrix Synthesis90.542015
Lossy Compression of Dynamic, Weighted Graphs10.342015
All networks look the same to me: Testing for homogeneity in networks00.342015
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases.30.392015
Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy40.542015
COLD: PoP-level Network Topology Synthesis.10.352014
Network-design sensitivity analysis20.462014
Maximum entropy traffic matrix synthesis10.352014
Hidden Markov model identifiability via tensors10.382013
Rigorous statistical analysis of internet loss measurements80.532013
An automated system for emulated network experimentation40.532013
STRIP: Privacy-preserving vector-based routing50.442013
I can see for miles: Re-visualizing the internet.40.422012
Multi-Observer Privacy-Preserving Hidden Markov Models30.432012
Improving Hidden Markov Model Inferences With Private Data From Multiple Observers.20.472012
AutoNetkit: simplifying large scale, open-source network experimentation40.552012
  • 1
  • 2