Aleksander Essex
Aleksander Essex
Associate Professor of Software Engineering, Western University Canada
Verified email at - Homepage
Cited by
Cited by
Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection
F Salo, AB Nassif, A Essex
Computer networks 148, 164-175, 2019
Scantegrity: End-to-end voter-verifiable optical-scan voting
D Chaum, A Essex, R Carback, J Clark, S Popoveniuc, A Sherman, ...
IEEE Security & Privacy 6 (3), 40-46, 2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
EVT 8 (1), 13, 2008
Bayesian optimization with machine learning algorithms towards anomaly detection
MN Injadat, F Salo, AB Nassif, A Essex, A Shami
2018 IEEE global communications conference (GLOBECOM), 1-6, 2018
Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy
R Carback, D Chaum, J Clark, J Conway, A Essex, P Hernson, ...
USENIX Security Symposium, 2010
Data mining techniques in intrusion detection systems: A systematic literature review
F Salo, M Injadat, AB Nassif, A Shami, A Essex
IEEE Access 6, 56046-56058, 2018
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes
D Chaum, RT Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
IEEE transactions on information forensics and security 4 (4), 611-627, 2009
CommitCoin: Carbon Dating Commitments with Bitcoin: (Short Paper)
J Clark, A Essex
International conference on financial cryptography and data security, 390-398, 2012
Remotegrity: Design and use of an end-to-end verifiable remote voting system
F Zagórski, RT Carback, D Chaum, J Clark, A Essex, PL Vora
International Conference on Applied Cryptography and Network Security, 441-457, 2013
Secure linkage of databases
K El Emam, A Essex, B Eze, M Tucciarone
US Patent 9,503,432, 2016
Punchscan in practice: An E2E election case study
A Essex, J Clark, R Carback, S Popoveniuc
Proceedings of Workshop on Trustworthy Elections, 2007
Clustering enabled classification using ensemble feature selection for intrusion detection
F Salo, MN Injadat, A Moubayed, AB Nassif, A Essex
2019 International Conference on Computing, Networking and Communications …, 2019
Cobra: Toward Concurrent Ballot Authorization for Internet Voting
A Essex, J Clark, U Hengartner
EVT/WOTE, 2012
Verifiable European Elections: Risk-limiting Audits for {D’Hondt} and Its Relatives
PB Stark, V Teague, A Essex
USENIX Journal of Election Technology and Systems (JETS) 1, 18-39, 2014
Eperio: Mitigating technical complexity in cryptographic election verification
A Essex, C Adams
2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2010
A protocol for the secure linking of registries for HPV surveillance
K El Emam, S Samet, J Hu, L Peyton, C Earle, GC Jayaraman, T Wong, ...
PLoS One 7 (7), e39915, 2012
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios
N Chang-Fong, A Essex
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Protecting electoral integrity in the digital age: developing E-voting regulations in Canada
A Essex, N Goodman
Election Law Journal: Rules, Politics, and Policy 19 (2), 162-179, 2020
Scantegrity mock election at Takoma Park
AT Sherman, R Carback, D Chaum, J Clark, A Essex, PS Herrnson, ...
Gesellschaft für Informatik eV, 2010
Knights and knaves run elections: Internet voting and undetectable electoral fraud
C Culnane, A Essex, SJ Lewis, O Pereira, V Teague
IEEE Security & Privacy 17 (4), 62-70, 2019
The system can't perform the operation now. Try again later.
Articles 1–20