460403. Data security and protection
Title | 460403. Data security and protection |
---|---|
Parent | 4604. Cybersecurity and privacy |
Latest research outputs
Sort by Date Title
A Critical Analysis of ECG-Based Key Distribution for Securing Wearable and Implantable Medical Devices
Zheng, Guanglou, Shankaran, Rajan, Yang Wencheng, Valli, Craig, Qiao, Li, Orgun, Mehmet A. and Mukhopadhyay, Subhas Chandra. 2019. "A Critical Analysis of ECG-Based Key Distribution for Securing Wearable and Implantable Medical Devices." IEEE Sensors Journal. 19 (3), pp. 1186-1198. https://doi.org/10.1109/JSEN.2018.2879929Article
A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement
Cui, Yi, Bai, Feifei, Liu, Yong and Liu, Yilu. 2018. "A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement." IEEE Transactions on Smart Grid. 9 (4), pp. 3914-3916. https://doi.org/10.1109/TSG.2018.2826444Article
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566Article
A review of multi-factor authentication in the Internet of Healthcare Things
Suleski, Tance, Ahmed, Mohiuddin, Yang, Wencheng and Wang, Eugene. 2023. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital Health. 9, pp. 1-20. https://doi.org/10.1177/20552076231177144Article
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609Article
A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559Paper
An Achilles heel: denial of service attacks on Australian critical information infrastructures
Christensen, Sharon, Caelli, William J., Duncan, William D. and Georgiades, Eugenia. 2010. "An Achilles heel: denial of service attacks on Australian critical information infrastructures." Information and Communications Technology Law. 19 (1), pp. 61-85. https://doi.org/10.1080/13600831003708059Article
An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.Paper
An Efficient Scheme to Secure Data Provenance in Home Area Networks
Tang, Zhaohui and Keoh, Sye Loong. 2020. "An Efficient Scheme to Secure Data Provenance in Home Area Networks." IEEE 3rd 5G World Forum (5GWF 2020). Bangalore, India 10 - 12 Sep 2020 United States. https://doi.org/10.1109/5GWF49715.2020.9221402Paper
Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks
Cui, Yi, Bai, Feifei, Saha, Tapan and Yaghoobi, Jalil. 2022. "Authenticating source information of distribution synchrophasors at intra-state locations for cyber-physical resilient power networks." International Journal of Electrical Power and Energy Systems. 139, pp. 1-10. https://doi.org/10.1016/j.ijepes.2022.108009Article
BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management
Zhang, Guipeng, Xie, Haoran, Yang, Zhenguo, Tao, Xiaohui and Liu, Wenyin. 2022. "BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management." Neural Processing Letters. 54, pp. 2657-2674. https://doi.org/10.1007/s11063-021-10450-9Article
Biometrics for internet‐of‐things security: A review
Yang, Wencheng, Wang, Song, Sahri, Nor Masri, Karie, Nickson M., Ahmed, Mohiuddin and Valli, Craig. 2021. "Biometrics for internet‐of‐things security: A review." Sensors. 21 (18). https://doi.org/10.3390/s21186163Article
Blockchain technology transforms digital marketing by growing consumer trust
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain technology transforms digital marketing by growing consumer trust." Idrees, Sheikh Mohammad and Nowostawski, Mariusz (ed.) Transformations Through Blockchain Technology: The New Digital Revolution. Cham, Switzerland. Springer. pp. 265-289Edited book (chapter)
Blockchain-enabled trust management for digital marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-enabled trust management for digital marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321Edited book (chapter)
Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis
Bai, Feifei, Cui, Yi, Yan, Ruifeng, Yin, Hongzhi, Chen, Tong, Dart, David and Yaghoobi, Jalil. 2023. "Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis." International Journal of Electrical Power and Energy Systems. 144, pp. 1-8. https://doi.org/10.1016/j.ijepes.2022.108606Article
Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach
Zhang, Ge, Cui, Yi, Zhang, Ruiyuan and Bai, Feifei. 2023. "Cybersecurity Defence of Synchrophasors in Distribution Systems: A Deep Learning Approach." 2023 IEEE International Conference on Energy Technologies for Future Grids (ETFG). Wollongong, Australia 03 - 06 Dec 2023 Australia. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ETFG55873.2023.10407305Paper
Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM
Liu, Shengyuan, You, Shutang, Yin, He, Lin, Zhenzhi, Liu, Yilu, Cui, Yi, Yao, Wenxuan and Sundaresh, Lakshmi. 2022. "Data Source Authentication for Wide-Area Synchrophasor Measurements Based On Spatial Signature Extraction and Quadratic Kernel SVM." International Journal of Electrical Power and Energy Systems. 140, pp. 1-13. https://doi.org/10.1016/j.ijepes.2022.108083Article
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
Huang, Yongrong, Wang, Huiqing, Chen, Zhide, Feng, Chen, Zhu, Kexin, Yang, Xu and Yang, Wencheng. 2024. "Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model." IEEE Open Journal of the Computer Society. 5, pp. 83-94. https://doi.org/10.1109/OJCS.2024.3370603Article
Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication
Cui, Yi, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2018. "Exploiting Spatial Signatures of Power ENF Signal for Measurement Source Authentication." 2018 IEEE International Symposium on Technologies for Homeland Security (HST). Woburn, United States 23 - 24 Oct 2018 Woburn, United States. https://doi.org/10.1109/THS.2018.8574151Paper
Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements
Bai, Feifei, Cui, Yi, Zhang, Ge, Dart, David, Yaghoobi, Jalil and Zillmann, Matthew. 2022. "Feasibility Study on Condition Monitoring of Power Network Asset Using PMU Measurements." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949946Paper
Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. 9 (1), pp. 4-25. https://doi.org/10.1049/cit2.12283Article
Incorporating security into electronic health records based healthcare systems with wireless sensor networks
Al-Zubaidie, Mishall Hammed Awaad. 2020. Incorporating security into electronic health records based healthcare systems with wireless sensor networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/e7re-as86PhD Thesis
Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems
He, Qian, Bai, Feifei, Cui, Yi and Zillmann, Matthew. 2022. "Machine Learning-based Cybersecurity Defence of Wide-area Monitoring Systems." 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). Shanghai, China 08 - 11 Jul 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICPSAsia55496.2022.9949686Paper
Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu. 2022. "Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids." IEEE Transactions on Smart Grid. 13 (2), pp. 1658-1661. https://doi.org/10.1109/tsg.2021.3132536Article
Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282Article
Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data
Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L.. 2022. "Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data." IEEE Transactions on Smart Grid. 13 (6), pp. 4957-4960. https://doi.org/10.1109/tsg.2022.3207066Article
Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Farhan, Muhammad and Naseem, Nauman. 2021. "Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems." Journal of Computer Science. 17 (11), pp. 1046-1057. https://doi.org/10.3844/JCSSP.2021.1046.1058Article
Secret sharing-based IoT text data outsourcing: a secure and efficient scheme
Tang, Zhaohui. 2021. "Secret sharing-based IoT text data outsourcing: a secure and efficient scheme." IEEE Access. 9, pp. 76908 -76920. https://doi.org/10.1109/ACCESS.2021.3075282Article
Security and Forensics in the Internet of Things: Research Advances and Challenges
Yang, Wencheng, Johnstone, Michael N., Sikos, Leslie F. and Wang, Song. 2020. "Security and Forensics in the Internet of Things: Research Advances and Challenges." 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT). Sydney, Australia 21 - 21 Apr 2020 Australia. IEEE (Institute of Electrical and Electronics Engineers). pp. 12-17 https://doi.org/10.1109/ETSecIoT50046.2020.00007Paper
Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs." 25th Pacific Asia Conference on Information Systems (PACIS 2021). Dubai, United Arab Emirates 12 - 14 Jul 2021 United States.Paper
Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K. L. and Liu, Yilu. 2021. "Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids." IEEE Transactions on Smart Grid. 12 (5), pp. 4577-4580. https://doi.org/10.1109/tsg.2021.3089041Article
Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales
Yao, Wenxuan, Zhao, Jiecheng, Till, Micah J., You, Shutang, Liu, Yong, Cui, Yi and Liu, Yilu. 2017. "Source Location Identification of Distribution-Level Electric Network Frequency Signals at Multiple Geographic Scales." IEEE Access. 5, pp. 11166-11175. https://doi.org/10.1109/ACCESS.2017.2707060Article
Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids
Cui, Yi, Bai, Feifei, Liu, Yilu, Fuhr, Peter L. and Morales-Rodriguez, Marissa E.. 2019. "Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids." IEEE Transactions on Smart Grid. 10 (5), pp. 5807-5818. https://doi.org/10.1109/tsg.2019.2891852Article
Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids
Cui, Yi, Wang, Weikang, Liu, Yilu, Fuhr, Peter and Morales-Rodriguez, Marissa. 2019. "Spatio-Temporal Synchrophasor Data Characterization for Mitigating False Data Injection in Smart Grids." 2020 IEEE Power and Energy Society General Meeting (PESGM). Atlanta, United States 04 - 08 Aug 2020 Atlanta, United States. https://doi.org/10.1109/pesgm40551.2019.8973586Paper
Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373Article
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439Contribution to Journal