Nicholas Heard

Learn More
Anomalous connections in a computer network graph can be a signal of malicious behaviours. For instance, a compromised computer node tends to form a large number of new client edges in the network graph, connecting to server IP (Internet Protocol) addresses which have not previously been visited. This behaviour can be caused by malware (malicious software)(More)
The measurement properties of the Ways of Coping in Sport Scale (WOCS) were examined using performance slumps as a frame of reference. Confirmatory factor analysis failed to support the factor structure previously proposed by Madden et al. (1987, 1989, 1990), and additional analyses were undertaken to develop and validate an alternative model. Results(More)
Computer networks are complex and the analysis of their structure in search for anomalous behaviour is both a challenging and important task for cyber security. For instance, new edges, i.e. connections from a host or user to a computer that has not been connected to before, provide potentially strong statistical evidence for detecting anomalies. Unusual(More)
A computer program's dynamic instruction trace is the sequence of instructions it generates during run-time. This article presents a method for analysing dynamic instruction traces, with an application in malware detection. Instruction traces can be modelled as piecewise homogeneous Markov chains and an exact linear time method is used for detecting change(More)
Malaysian students ages 12 to 15 years (N = 330; 165 girls, 165 boys) took the Australian Institute of Sport Talent Identification Test (AIST) and the Balance and Movement Coordination Test (BMC), developed specifically to identify sport talent in Malaysian adolescents. To investigate evidence for general aptitude ("g") in motor ability, a higher-order(More)
  • 1