4604. Cybersecurity and privacy


Title4604. Cybersecurity and privacy
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
A Blockchain-based Multi-layer Decentralized Framework for Robust Federated Learning
Wu, Di, Wang, Nai, Zhang, Jiale, Zhang, Yuan, Xiang, Yong and Gao, Longxiang. 2022. "A Blockchain-based Multi-layer Decentralized Framework for Robust Federated Learning." 2022 International Joint Conference on Neural Networks (IJCNN). Padua, Italy 18 - 23 Jul 2022 IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/IJCNN55064.2022.9892039

Paper

Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks
Zhao, Ying, Chen, Junjun, Zhang, Jiale, Wu, Di, Blumenstein, Michael and Yu, Shui. 2022. "Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks." Concurrency and Computation: Practice and Experience. 34 (7). https://doi.org/10.1002/cpe.5906

Article

Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements
Bai, Feifei, Cui, Yi, Zhang, Ge, Dart, David, Yaghoobi, Jalil and Zillmann, Matthew. 2022. "Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949946

Paper

Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems
He, Qian, Bai, Feifei, Cui, Yi and Zillmann, Matthew. 2022. "Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949686

Paper

Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321

Edited book (chapter)

Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs." 25th Pacific Asia Conference on Information Systems (PACIS 2021). Dubai, United Arab Emirates 12 - 14 Jul 2021 United States.

Paper

Security concerns influencing the adoption of cloud computing of SMEs: a literature review
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security concerns influencing the adoption of cloud computing of SMEs: a literature review." 27th Americas Conference on Information Systems: Digital Innovation and Entrepreneurship (AMCIS 2021). Montreal, Canada 09 - 13 Aug 2021 United States.

Paper

Analysis of web based structural security patterns by employing ten security principles
Riaz, Rabia, Rizvi, Sanam Shehla, Riaz, Farina, Hameed, Nausheen and Shokat, Sana. 2017. "Analysis of web based structural security patterns by employing ten security principles." International Journal of Computer Science and Network Security. 17 (10), pp. 45-56.

Article

A Review of the State of the Art in Privacy and Security in the eHealth Cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2021. "A Review of the State of the Art in Privacy and Security in the eHealth Cloud." IEEE Access. 9, pp. 104127-104141. https://doi.org/10.1109/ACCESS.2021.3098708

Article

Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010

Article

An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.

Paper

Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9

Article

Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373

Article

BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management
Zhang, Guipeng, Xie, Haoran, Yang, Zhenguo, Tao, Xiaohui and Liu, Wenyin. 2022. "BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management." Neural Processing Letters. 54, pp. 2657-2674. https://doi.org/10.1007/s11063-021-10450-9

Article

A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Zhou, Xujuan, Li, Lin and Cai, Yi. 2021. "A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues." The Computer Journal. 64 (7), pp. 1104-1129. https://doi.org/10.1093/comjnl/bxab065

Article

Stakeholder security analysis - a new approach to security design with example application
Hadaad, Nabeel Mahdy Hadaad. 2020. Stakeholder security analysis - a new approach to security design with example application. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/05r4-0365

PhD Thesis

User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738

Edited book (chapter)

Locally differentially private distributed algorithms for set intersection and union [Letter]
Xue, Qiao, Zhu, Youwen, Wang, Jian, Li, Xingxin and Zhang, Ji. 2020. "Locally differentially private distributed algorithms for set intersection and union [Letter]." Science China Information Sciences. https://doi.org/10.1007/s11432-018-9899-8

Article

Incorporating security into electronic health records based healthcare systems with wireless sensor networks
Al-Zubaidie, Mishall Hammed Awaad. 2020. Incorporating security into electronic health records based healthcare systems with wireless sensor networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/e7re-as86

PhD Thesis

Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Farhan, Muhammad and Naseem, Nauman. 2021. "Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems." Journal of Computer Science. 17 (11), pp. 1046-1057. https://doi.org/10.3844/JCSSP.2021.1046.1058

Article

Security Assurance Process for Service Component-Oriented Application Logic for Social Interaction in E-Commerce Banking Applications
Nabi, Faisal. 2021. Security Assurance Process for Service Component-Oriented Application Logic for Social Interaction in E-Commerce Banking Applications. PhD by Publication Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/q7q82

PhD by Publication

An Efficient Scheme to Secure Data Provenance in Home Area Networks
Tang, Zhaohui and Keoh, Sye Loong. 2020. "An Efficient Scheme to Secure Data Provenance in Home Area Networks." IEEE 3rd 5G World Forum (5GWF 2020). Bangalore, India 10 - 12 Sep 2020 United States. https://doi.org/10.1109/5GWF49715.2020.9221402

Paper

Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Mahmood, Umar and Iqbal, Usman. 2020. "Concepts of Safety Critical Systems Unification Approach & Security Assurance Process." Journal of Information Security. 11 (4), pp. 292-303. https://doi.org/10.4236/jis.2020.114018

Article

Classification of logical vulnerability based on group attack method
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Classification of logical vulnerability based on group attack method." Journal of Ubiquitous Systems and Pervasive Networks. 14 (1), pp. 19-26. https://doi.org/10.5383/JUSPN.14.01.004

Article

Developing new techniques to improve licence plate detection systems for complicated and low quality vehicle images
Al-Shemarry, Meeras Salman Juwad. 2020. Developing new techniques to improve licence plate detection systems for complicated and low quality vehicle images. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/cbeg-yw22

PhD Thesis

A security review of event-based application function and service component architecture
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A security review of event-based application function and service component architecture." International Journal of Systems and Software Security and Protection. 11 (2), pp. 58-70. https://doi.org/10.4018/IJSSSP.2020070104

Article

Classification of Logical Vulnerability Based on Group Attacking Method
Nabi, Faisal, Yong, Jianming and Tao, Xaiohui. 2020. "Classification of Logical Vulnerability Based on Group Attacking Method." 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020). Warsaw Poland 06 - 09 Apr 2020 Netherlands. https://doi.org/10.1016/j.procs.2020.03.109

Paper

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2020. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences. 10 (6), pp. 1-36. https://doi.org/10.3390/app10062007

Article

Proposing a secure component-based-application logic and system’s integration testing approach
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2019. "Proposing a secure component-based-application logic and system’s integration testing approach." International Journal of Information and Electronics Engineering. 11 (1), pp. 25-39. https://doi.org/10.6636/IJEIE.20190911(1).04

Article

A novel approach for component based application logic event attack modeling
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A novel approach for component based application logic event attack modeling." International Journal of Network Security. 22 (3), pp. 437-443.

Article

Security in the software defined networking infrastructure
Edge, Peter. 2019. Security in the software defined networking infrastructure. Masters Thesis Master of Science (Research). University of Southern Queensland. https://doi.org/10.26192/3xxt-zv02

Masters Thesis

Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.

Article

RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications." Security and Communication Networks. 2019, pp. 1-26. https://doi.org/10.1155/2019/3263902

Article

Poisoning attack in federated learning using generative adversarial nets
Zhang, Jiale, Chen, Junjun, Wu, Di, Chen, Bing and Yu, Shui. 2019. "Poisoning attack in federated learning using generative adversarial nets." 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). Rotorua, New Zealand 05 - 08 Aug 2018 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/TrustCom/BigDataSE.2019.00057

Paper

Network anomaly detection by using a time-decay closed frequent pattern
Zhao, Ying, Chen, Junjun, Wu, Di, Teng, Jian, Sharma, Nabin, Sajjanhar, Atul and Blumenstein, Michael. 2019. "Network anomaly detection by using a time-decay closed frequent pattern." Information (Basel). 10 (8). https://doi.org/10.3390/info10080262

Article

Multi-task network anomaly detection using federated learning
Zhao, Ying, Chen, Junjun, Wu, Di, Teng, Jian and Yu, Shui. 2019. "Multi-task network anomaly detection using federated learning." 10th international symposium on information and communication technology (SoICT 2019). Hanoi, Viet Nam 04 - 06 Dec 2019 United States. Association for Computing Machinery (ACM). https://doi.org/10.1145/3368926.3369705

Paper

Securing clouds using cryptography and traffic classification
Khader Al-Nassar, Aqeel Sahi. 2018. Securing clouds using cryptography and traffic classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/5c0de0e2f69e0

PhD Thesis

Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60

Paper

Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan
Sahi, Aqeel, Lai, David and Li, Yan. 2016. "Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan." Computers in Biology and Medicine. 78, pp. 1-8. https://doi.org/10.1016/j.compbiomed.2016.09.003

Article

An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)
Lane, Michael Steven and Shrestha, Anup. 2011. "An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)." Rotchanakitumnuai, Siriluck and Kaewkitipong, Laddawan (ed.) 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011). Bangkok, Thailand 28 Nov - 02 Dec 2011 Bangkok, Thailand.

Paper