460406. Software and application security


Title460406. Software and application security
Parent4604. Cybersecurity and privacy

Latest research outputs

Sort by Date Title
A social contract for cyberspace
Sheniar, Dawood, Northway, James, Talbot, James, Millsom, David, Li, Yan and Addie, Ron. 2021. "A social contract for cyberspace." 31st International Telecommunication Networks and Application Conference (ITNAC). Sydney, Australia 24 - 26 Nov 2021 Sydney. https://doi.org/10.1109/ITNAC53136.2021.9652166

Paper

Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs." 25th Pacific Asia Conference on Information Systems (PACIS 2021). Dubai, United Arab Emirates 12 - 14 Jul 2021 United States.

Paper

Security concerns influencing the adoption of cloud computing of SMEs: a literature review
Nagahawatta, Ruwan, Warren, Matthew, Lokuge, Sachithra and Salzman, Scott. 2021. "Security concerns influencing the adoption of cloud computing of SMEs: a literature review." 27th Americas Conference on Information Systems: Digital Innovation and Entrepreneurship (AMCIS 2021). Montreal, Canada 09 - 13 Aug 2021 United States.

Paper

Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010

Article

Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9

Article

User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738

Edited book (chapter)

The Inference Graph of Cybersecurity Rules
Sheniar, Dawood, Hadaad, Nabeel and Addie Ron. 2016. "The Inference Graph of Cybersecurity Rules." 29th International Telecommunication Networks and Applications Conference (ITNAC 2019). Auckland, New Zealand 27 - 29 Nov 2019 New Zealand. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ITNAC46935.2019.9077958

Paper