4604. Cybersecurity and privacy


Title4604. Cybersecurity and privacy
Parent46. Information and Computing Sciences

Latest research outputs

Sort by Date Title
Cooperative jamming and power allocation with untrusty two-way relay nodes
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying and Wang, Wenbo. 2014. "Cooperative jamming and power allocation with untrusty two-way relay nodes." IET Communications. 8 (13), pp. 2290-2297. https://doi.org/10.1049/iet-com.2013.0580

Article

Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router
Addie, Ronald and Natarajan, Joshua. 2017. "Netml-ns3-click: Modeling of Routers in Netml/ns3 by means of the Click Modular Router." 8th EAI International Conference on Simulation Tools and Techniques (SIMUTOOLS 2015). Athens, Greece 24 - 26 Aug 2015 Belgium . Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST). https://doi.org/10.4108/eai.24-8-2015.2260965

Paper

Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
Khader, Aqeel Sahi and Lai, David. 2015. "Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol." 22nd International Conference on Telecommunications (ICT2015). Sydney, Australia 27 - 29 Apr 2015 United States. https://doi.org/10.1109/ICT.2015.7124683

Paper

The Inference Graph of Cybersecurity Rules
Sheniar, Dawood, Hadaad, Nabeel and Addie Ron. 2016. "The Inference Graph of Cybersecurity Rules." 29th International Telecommunication Networks and Applications Conference (ITNAC 2019). Auckland, New Zealand 27 - 29 Nov 2019 New Zealand. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ITNAC46935.2019.9077958

Paper

Novel iterative min-max clustering to minimize information loss in statistical disclosure control
Mahmood, Abdun Naser, Kabir, Md Enamul and Mustafa, Abdul K.. 2014. "Novel iterative min-max clustering to minimize information loss in statistical disclosure control." 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014). Beijing, China 24 - 26 Sep 2014 Germany. https://doi.org/10.1007/978-3-319-23802-9_14

Paper

A statistical framework for intrusion detection system
Kabir, Md Enamul and Hu, Jiankun. 2014. "A statistical framework for intrusion detection system." Zhang, Defu (ed.) 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014). Xiamen, China 19 - 21 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/FSKD.2014.6980966

Paper

Fieldwork in a digital age: questions of privacy and copyright
Ostini, Jenny. 2014. "Fieldwork in a digital age: questions of privacy and copyright." Field Research Method Lab at LSE.

Article

A dynamic subspace anomaly detection method using generic algorithm for streaming network data
Zhang, Ji and Li, Hongzhou. 2015. "A dynamic subspace anomaly detection method using generic algorithm for streaming network data." Gupta, Manish (ed.) Handbook of research on emerging developments in data privacy. Hershey, PA. United States. IGI Global. pp. 403-425

Edited book (chapter)

Impact of Cloud computing technology on e-government
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2014. "Impact of Cloud computing technology on e-government." Dregvaite, Giedre and Damasevicius, Robertas (ed.) 20th International Conference on Information and Software Technologies (ICIST 2014). Druskininkai, Lithuania 09 - 10 Oct 2014 Heidelberg, Germany. https://doi.org/10.1007/978-3-319-11958-8_22

Paper

Challenges and issues within Cloud computing technology
Ali, Omar and Soar, Jeffrey. 2014. "Challenges and issues within Cloud computing technology." Zimmermann, Wolf, Lee, Yong Woo and Reich, Christoph (ed.) 5th International Conference on Cloud Computing, GRIDs, and Virtualization (IARIA 2014). Venice, Italy 25 - 29 May 2014 Wilmington, DE. United States. https://doi.org/10.13140/2.1.3210.3369

Paper

Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node
Long, Hang, Xiang, Wei, Zhang, Xiaoli, Wang, Jing and Wang, Wenbo. 2014. "Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node." 31st URSI General Assembly and Scientific Symposium (URSI GASS 2014). Beijing, China 16 - 23 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/URSIGASS.2014.6929316

Paper

On addressing the imbalance problem: a correlated KNN approach for network traffic classification
Wu, Di, Chen, Xiao, Chen, Chao, Zhang, Jun, Xiang, Yang and Zhou, Wanlei. 2015. "On addressing the imbalance problem: a correlated KNN approach for network traffic classification." NSS 2014: 8th International Conference on Network and System Security. Xi'an, China 15 - 17 Oct 2014 Switzerland . Springer. https://doi.org/10.1007/978-3-319-11698-3_11

Paper

Detecting stepping stones by abnormal causality probability
Wen, Sheng, Wu, Di, Li, Ping, Xiang, Yang, Zhou, Wanlei and Wei, Guiyi. 2015. "Detecting stepping stones by abnormal causality probability." Security and Communication Networks. 8 (10), pp. 1831-1844. https://doi.org/10.1002/sec.1037

Article

The development and evaluation of an information security awareness capability model: linking ISO/IEC 27002 controls with awareness importance, capability and risk
Poepjes, Robert. 2015. The development and evaluation of an information security awareness capability model: linking ISO/IEC 27002 controls with awareness importance, capability and risk. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Security and privacy on low-cost radio frequency identification systems
Sun, L.. 2010. "Security and privacy on low-cost radio frequency identification systems ." International Journal of Security and Networks. 5 (2/3), pp. 128-134. https://doi.org/10.1504/IJSN.2010.032211

Article

Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3

Article

An efficient and robust privacy protection technique for massive streaming choice-based information
Zhang, Ji, Liu, Xuemei and Luo, Yonglong. 2013. "An efficient and robust privacy protection technique for massive streaming choice-based information." He, Qi and Iyengar, Arun (ed.) 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013). San Francisco, United States 27 Oct - 01 Nov 2013 New York, NY. United States. https://doi.org/10.1145/2505515.2507816

Paper

Cooperative jamming and power allocation in two-way relaying system with eavesdropper
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying, Zhao, Hui and Wang, Wenbo. 2013. "Cooperative jamming and power allocation in two-way relaying system with eavesdropper." Miller, Jeffrey (ed.) IEEE 78th Vehicular Technology Conference (VTC 2013 Fall): Connecting the Mobile World. Las Vegas, United States 02 - 05 Sep 2013 United States. https://doi.org/10.1109/VTCFall.2013.6692144

Paper

Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems
Long, Hang, Xiang, Wei, Zhang, Yueying, Liu, Yuanan and Wang, Wenbo. 2013. "Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems." IEEE Transactions on Information Forensics and Security. 8 (1), pp. 229-238. https://doi.org/10.1109/TIFS.2012.2229988

Article

Collaborative computing technologies and systems
Yong, Jianming, Shen, Weiming and James, Anne. 2013. "Collaborative computing technologies and systems ." Journal of Systems and Software. 86 (7), pp. 1725-1726. https://doi.org/10.1016/j.jss.2013.03.058

Editorial

UICC control over devices used to obtain service
Brown, Jason and Ahluwalia, Inderpreet Singh. 2014. UICC control over devices used to obtain service. US8639290B2

Patent

Information security and privacy in HRIS
Wong, Yuk Kuen and Thite, Mohan. 2009. "Information security and privacy in HRIS ." Kavanagh, Michael J. and Thite , Mohan (ed.) Human resource information systems: basics, applications, and future directions. New Delhi, India. SAGE Publications Ltd. pp. 395-407

Edited book (chapter)

Information security and privacy in human resource information systems
Wong, Yuk Kuen and Thite, Mohan. 2012. "Information security and privacy in human resource information systems." Kavanagh , Michael J. , Thite , Mohan and Johnson , Richard D. (ed.) Human resource information systems: basics, applications, and future directions, 2nd ed.. London, United Kingdom. SAGE Publications Ltd. pp. 518-533

Textbook (chapter)

Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.

Technical report

Efficient intrusion detection scheme based on SVM
Zhou, Guangping and Shrestha, Anup. 2013. "Efficient intrusion detection scheme based on SVM." Journal of Networks. 8 (9), pp. 2128-2134. https://doi.org/10.4304/jnw.8.9.2128-2134

Article

Medico legal issues
Mackenzie, Geraldine and Carter, Hugh. 2010. "Medico legal issues." Hovenga, Evelyn J. S., Kidd, Michael R., Garde, Sebastian, Hullin, Carola and Cossio, Lucay (ed.) Health informatics: an overview. Amsterdam, Netherlands . IOS Press. pp. 176-182

Edited book (chapter)

Metadata in organisational surveys
Machin, Tony. 2013. "Metadata in organisational surveys." Lacey, Ron (ed.) Advances in organisational research methods and analysis. New York, United States. Chamber & Row. pp. 74-85

Edited book (chapter)

A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1

Article

A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717

Article

A model for security and privacy in e-health
Wang, Peishun and Soar, Jeffrey. 2012. "A model for security and privacy in e-health." Su, Ying (ed.) 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology (COINFO 2012): Information Sharing in the Cloud. Nanjing, China 23 - 25 Nov 2012 Irvine, CA. United States.

Paper

Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423

Article

Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings
Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wang, Hua (ed.) 2012. Internet and distributed computing systems: 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21-23, 2012, Proceedings . Heidelberg, Germany. Springer.

Edited book

Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028

Article

An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223

Article

On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724

Article

Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449

Article

Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment
Zhang, Zhongwei and Zhou, Hong. 2012. "Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment." Hochin, Teruhisa and Lee, Rodger (ed.) 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012). Kyoto, Japan 08 - 10 Aug 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2012.103

Paper

Conflict of laws and the cloud
Gray, Anthony. 2013. "Conflict of laws and the cloud." Computer Law and Security Review: the International Journal of Technology Law and Practice. 29 (1), pp. 58-65. https://doi.org/10.1016/j.clsr.2012.11.004

Article

Does the android permission system provide adequate information privacy protection for end-users of mobile apps?
Lane, Michael. 2012. "Does the android permission system provide adequate information privacy protection for end-users of mobile apps?" Williams, Trish, Johnstone, Mike and Valli, Craig (ed.) 10th Australian Information Security Management Conference (SECAU 2012). Perth, Western Australia 03 - 05 Dec 2012 Perth Western Australia.

Paper

An information security awareness capability model (ISACM)
Poepjes, Robert and Lane, Michael. 2012. "An information security awareness capability model (ISACM)." Williams, Trish, Johnstone, Mike and Valli, Craig (ed.) 10th Australian Information Security Management Conference (SECAU 2012). Perth, Western Australia 03 - 05 Dec 2012 Perth, Western Australia.

Paper