4604. Cybersecurity and privacy


Title4604. Cybersecurity and privacy
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Network anomaly detection by using a time-decay closed frequent pattern
Zhao, Ying, Chen, Junjun, Wu, Di, Teng, Jian, Sharma, Nabin, Sajjanhar, Atul and Blumenstein, Michael. 2019. "Network anomaly detection by using a time-decay closed frequent pattern." Information (Basel). 10 (8). https://doi.org/10.3390/info10080262

Article

Multi-task network anomaly detection using federated learning
Zhao, Ying, Chen, Junjun, Wu, Di, Teng, Jian and Yu, Shui. 2019. "Multi-task network anomaly detection using federated learning." 10th international symposium on information and communication technology (SoICT 2019). Hanoi, Viet Nam 04 - 06 Dec 2019 United States. Association for Computing Machinery (ACM). https://doi.org/10.1145/3368926.3369705

Paper

A Critical Analysis of ECG-Based Key Distribution for Securing Wearable and Implantable Medical Devices
Zheng, Guanglou, Shankaran, Rajan, Yang Wencheng, Valli, Craig, Qiao, Li, Orgun, Mehmet A. and Mukhopadhyay, Subhas Chandra. 2019. "A Critical Analysis of ECG-Based Key Distribution for Securing Wearable and Implantable Medical Devices." IEEE Sensors Journal. 19 (3), pp. 1186-1198. https://doi.org/10.1109/JSEN.2018.2879929

Article

Securing clouds using cryptography and traffic classification
Khader Al-Nassar, Aqeel Sahi. 2018. Securing clouds using cryptography and traffic classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/5c0de0e2f69e0

PhD Thesis

Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60

Paper

Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan
Sahi, Aqeel, Lai, David and Li, Yan. 2016. "Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan." Computers in Biology and Medicine. 78, pp. 1-8. https://doi.org/10.1016/j.compbiomed.2016.09.003

Article

An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)
Lane, Michael Steven and Shrestha, Anup. 2011. "An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)." Rotchanakitumnuai, Siriluck and Kaewkitipong, Laddawan (ed.) 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011). Bangkok, Thailand 28 Nov - 02 Dec 2011 Bangkok, Thailand.

Paper

Cooperative jamming and power allocation with untrusty two-way relay nodes
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying and Wang, Wenbo. 2014. "Cooperative jamming and power allocation with untrusty two-way relay nodes." IET Communications. 8 (13), pp. 2290-2297. https://doi.org/10.1049/iet-com.2013.0580

Article

Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router
Addie, Ronald and Natarajan, Joshua. 2017. "Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router." 8th EAI International Conference on Simulation Tools and Techniques (SIMUTOOLS 2015). Athens, Greece 24 - 26 Aug 2015 Belgium . Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). https://doi.org/10.4108/eai.24-8-2015.2260965

Paper

Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
Khader, Aqeel Sahi and Lai, David. 2015. "Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol." 22nd International Conference on Telecommunications (ICT2015). Sydney, Australia 27 - 29 Apr 2015 United States. https://doi.org/10.1109/ICT.2015.7124683

Paper

The Inference Graph of Cybersecurity Rules
Sheniar, Dawood, Hadaad, Nabeel and Addie Ron. 2016. "The Inference Graph of Cybersecurity Rules." 29th International Telecommunication Networks and Applications Conference (ITNAC 2019). Auckland, New Zealand 27 - 29 Nov 2019 New Zealand. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ITNAC46935.2019.9077958

Paper

Novel iterative min-max clustering to minimize information loss in statistical disclosure control
Mahmood, Abdun Naser, Kabir, Md Enamul and Mustafa, Abdul K.. 2014. "Novel iterative min-max clustering to minimize information loss in statistical disclosure control." 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014). Beijing, China 24 - 26 Sep 2014 Germany. https://doi.org/10.1007/978-3-319-23802-9_14

Paper

A statistical framework for intrusion detection system
Kabir, Md Enamul and Hu, Jiankun. 2014. "A statistical framework for intrusion detection system." Zhang, Defu (ed.) 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014). Xiamen, China 19 - 21 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/FSKD.2014.6980966

Paper

Fieldwork in a digital age: questions of privacy and copyright
Ostini, Jenny. 2014. "Fieldwork in a digital age: questions of privacy and copyright." Field Research Method Lab at LSE.

Article

A dynamic subspace anomaly detection method using generic algorithm for streaming network data
Zhang, Ji and Li, Hongzhou. 2015. "A dynamic subspace anomaly detection method using generic algorithm for streaming network data." Gupta, Manish (ed.) Handbook of research on emerging developments in data privacy. Hershey, PA. United States. IGI Global. pp. 403-425

Edited book (chapter)

Impact of Cloud computing technology on e-government
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2014. "Impact of Cloud computing technology on e-government." Dregvaite, Giedre and Damasevicius, Robertas (ed.) 20th International Conference on Information and Software Technologies (ICIST 2014). Druskininkai, Lithuania 09 - 10 Oct 2014 Heidelberg, Germany. https://doi.org/10.1007/978-3-319-11958-8_22

Paper

Challenges and issues within Cloud computing technology
Ali, Omar and Soar, Jeffrey. 2014. "Challenges and issues within Cloud computing technology." Zimmermann, Wolf, Lee, Yong Woo and Reich, Christoph (ed.) 5th International Conference on Cloud Computing, GRIDs, and Virtualization (IARIA 2014). Venice, Italy 25 - 29 May 2014 Wilmington, DE. United States. https://doi.org/10.13140/2.1.3210.3369

Paper

Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node
Long, Hang, Xiang, Wei, Zhang, Xiaoli, Wang, Jing and Wang, Wenbo. 2014. "Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node." 31st URSI General Assembly and Scientific Symposium (URSI GASS 2014). Beijing, China 16 - 23 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/URSIGASS.2014.6929316

Paper

On addressing the imbalance problem: a correlated KNN approach for network traffic classification
Wu, Di, Chen, Xiao, Chen, Chao, Zhang, Jun, Xiang, Yang and Zhou, Wanlei. 2015. "On addressing the imbalance problem: a correlated KNN approach for network traffic classification." NSS 2014: 8th International Conference on Network and System Security. Xi'an, China 15 - 17 Oct 2014 Switzerland . Springer. https://doi.org/10.1007/978-3-319-11698-3_11

Paper

Detecting stepping stones by abnormal causality probability
Wen, Sheng, Wu, Di, Li, Ping, Xiang, Yang, Zhou, Wanlei and Wei, Guiyi. 2015. "Detecting stepping stones by abnormal causality probability." Security and Communication Networks. 8 (10), pp. 1831-1844. https://doi.org/10.1002/sec.1037

Article

The development and evaluation of an information security awareness capability model: linking ISO/IEC 27002 controls with awareness importance, capability and risk
Poepjes, Robert. 2015. The development and evaluation of an information security awareness capability model: linking ISO/IEC 27002 controls with awareness importance, capability and risk. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Security and privacy on low-cost radio frequency identification systems
Sun, L.. 2010. "Security and privacy on low-cost radio frequency identification systems ." International Journal of Security and Networks. 5 (2/3), pp. 128-134. https://doi.org/10.1504/IJSN.2010.032211

Article

Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3

Article

An efficient and robust privacy protection technique for massive streaming choice-based information
Zhang, Ji, Liu, Xuemei and Luo, Yonglong. 2013. "An efficient and robust privacy protection technique for massive streaming choice-based information." He, Qi and Iyengar, Arun (ed.) 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013). San Francisco, United States 27 Oct - 01 Nov 2013 New York, NY. United States. https://doi.org/10.1145/2505515.2507816

Paper

Cooperative jamming and power allocation in two-way relaying system with eavesdropper
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying, Zhao, Hui and Wang, Wenbo. 2013. "Cooperative jamming and power allocation in two-way relaying system with eavesdropper." Miller, Jeffrey (ed.) IEEE 78th Vehicular Technology Conference (VTC 2013 Fall): Connecting the Mobile World. Las Vegas, United States 02 - 05 Sep 2013 United States. https://doi.org/10.1109/VTCFall.2013.6692144

Paper

Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems
Long, Hang, Xiang, Wei, Zhang, Yueying, Liu, Yuanan and Wang, Wenbo. 2013. "Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems." IEEE Transactions on Information Forensics and Security. 8 (1), pp. 229-238. https://doi.org/10.1109/TIFS.2012.2229988

Article

Collaborative computing technologies and systems
Yong, Jianming, Shen, Weiming and James, Anne. 2013. "Collaborative computing technologies and systems ." Journal of Systems and Software. 86 (7), pp. 1725-1726. https://doi.org/10.1016/j.jss.2013.03.058

Editorial

UICC control over devices used to obtain service
Brown, Jason and Ahluwalia, Inderpreet Singh. 2014. UICC control over devices used to obtain service. US8639290B2

Patent

Information security and privacy in HRIS
Wong, Yuk Kuen and Thite, Mohan. 2009. "Information security and privacy in HRIS ." Kavanagh, Michael J. and Thite , Mohan (ed.) Human resource information systems: basics, applications, and future directions. New Delhi, India. SAGE Publications Ltd. pp. 395-407

Edited book (chapter)

Information security and privacy in human resource information systems
Wong, Yuk Kuen and Thite, Mohan. 2012. "Information security and privacy in human resource information systems." Kavanagh , Michael J. , Thite , Mohan and Johnson , Richard D. (ed.) Human resource information systems: basics, applications, and future directions, 2nd ed.. London, United Kingdom. SAGE Publications Ltd. pp. 518-533

Textbook (chapter)

Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.

Technical report

Efficient intrusion detection scheme based on SVM
Zhou, Guangping and Shrestha, Anup. 2013. "Efficient intrusion detection scheme based on SVM." Journal of Networks. 8 (9), pp. 2128-2134. https://doi.org/10.4304/jnw.8.9.2128-2134

Article

Medico legal issues
Mackenzie, Geraldine and Carter, Hugh. 2010. "Medico legal issues." Hovenga, Evelyn J. S., Kidd, Michael R., Garde, Sebastian, Hullin, Carola and Cossio, Lucay (ed.) Health informatics: an overview. Amsterdam, Netherlands . IOS Press. pp. 176-182

Edited book (chapter)

Metadata in organisational surveys
Machin, Tony. 2013. "Metadata in organisational surveys." Lacey, Ron (ed.) Advances in organisational research methods and analysis. New York, United States. Chamber & Row. pp. 74-85

Edited book (chapter)

A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1

Article

A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717

Article

A model for security and privacy in e-health
Wang, Peishun and Soar, Jeffrey. 2012. "A model for security and privacy in e-health." Su, Ying (ed.) 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud. Nanjing, China 23 - 25 Nov 2012 Irvine, CA. United States.

Paper

Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423

Article

Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings
Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wang, Hua (ed.) 2012. Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings . Heidelberg, Germany. Springer.

Edited book

Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028

Article