460499. Cybersecurity and privacy not elsewhere classified


Title460499. Cybersecurity and privacy not elsewhere classified
Parent4604. Cybersecurity and privacy

Latest research outputs

Sort by Date Title
A systematic review of literature on credit card cyber fraud detection using machine and deep learning
Marazqah Btoush, Eyad Abdel Latif, Zhou, Xujuan, Gururajan, Raj, Chan, Ka Ching, Genrich, Rohan and Sankaran, Prema. 2023. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning." PeerJ Computer Science. 9 (1). https://doi.org/10.7717/peerj-cs.1278

Article

Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises
Nagahawatta, Ruwan, Lokuge, Sachithra, Warren, Matthew and Salzman, Scott. 2021. "Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises." 32nd Australasian Conference on Information Systems (ACIS 2021). Sydney, Australia 06 - 10 Dec 2021 Australia.

Paper

A social contract for cyberspace
Sheniar, Dawood, Northway, James, Talbot, James, Millsom, David, Li, Yan and Addie, Ron. 2021. "A social contract for cyberspace." 31st International Telecommunication Networks and Application Conference (ITNAC). Sydney, Australia 24 - 26 Nov 2021 Sydney. https://doi.org/10.1109/ITNAC53136.2021.9652166

Paper

A survey on detection of cybersecurity threats on Twitter using deep learning
Alsodi, Omar, Zhou, Xujuan, Gururajan, Raj and Shrestha, Anup. 2021. "A survey on detection of cybersecurity threats on Twitter using deep learning." Xu, Guandong, Ali, Raian, Zaghouani, Wajdi, Tao, Xiaohui and Li, Lin (ed.) 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 United States. https://doi.org/10.1109/BESC53957.2021.9635406

Paper

Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321

Edited book (chapter)

Security Assurance Process for Service Component-Oriented Application Logic for Social Interaction in E-Commerce Banking Applications
Nabi, Faisal. 2021. Security Assurance Process for Service Component-Oriented Application Logic for Social Interaction in E-Commerce Banking Applications. PhD by Publication Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/q7q82

PhD by Publication

Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Mahmood, Umar and Iqbal, Usman. 2020. "Concepts of Safety Critical Systems Unification Approach & Security Assurance Process." Journal of Information Security. 11 (4), pp. 292-303. https://doi.org/10.4236/jis.2020.114018

Article

Classification of logical vulnerability based on group attack method
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Classification of logical vulnerability based on group attack method." Journal of Ubiquitous Systems and Pervasive Networks. 14 (1), pp. 19-26. https://doi.org/10.5383/JUSPN.14.01.004

Article

Developing new techniques to improve licence plate detection systems for complicated and low quality vehicle images
Al-Shemarry, Meeras Salman Juwad. 2020. Developing new techniques to improve licence plate detection systems for complicated and low quality vehicle images. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/cbeg-yw22

PhD Thesis

A security review of event-based application function and service component architecture
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A security review of event-based application function and service component architecture." International Journal of Systems and Software Security and Protection. 11 (2), pp. 58-70. https://doi.org/10.4018/IJSSSP.2020070104

Article

Classification of Logical Vulnerability Based on Group Attacking Method
Nabi, Faisal, Yong, Jianming and Tao, Xaiohui. 2020. "Classification of Logical Vulnerability Based on Group Attacking Method." 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020). Warsaw Poland 06 - 09 Apr 2020 Netherlands. https://doi.org/10.1016/j.procs.2020.03.109

Paper

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2020. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences. 10 (6), pp. 1-36. https://doi.org/10.3390/app10062007

Article

Proposing a secure component-based-application logic and system’s integration testing approach
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2019. "Proposing a secure component-based-application logic and system’s integration testing approach." International Journal of Information and Electronics Engineering. 11 (1), pp. 25-39. https://doi.org/10.6636/IJEIE.20190911(1).04

Article

A novel approach for component based application logic event attack modeling
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A novel approach for component based application logic event attack modeling." International Journal of Network Security. 22 (3), pp. 437-443.

Article

Security in the software defined networking infrastructure
Edge, Peter. 2019. Security in the software defined networking infrastructure. Masters Thesis Master of Science (Research). University of Southern Queensland. https://doi.org/10.26192/3xxt-zv02

Masters Thesis

Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.

Article

Securing clouds using cryptography and traffic classification
Khader Al-Nassar, Aqeel Sahi. 2018. Securing clouds using cryptography and traffic classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/5c0de0e2f69e0

PhD Thesis

Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60

Paper

Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan
Sahi, Aqeel, Lai, David and Li, Yan. 2016. "Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan." Computers in Biology and Medicine. 78, pp. 1-8. https://doi.org/10.1016/j.compbiomed.2016.09.003

Article

An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)
Lane, Michael Steven and Shrestha, Anup. 2011. "An empirical analysis of SNS users and their privacy and security awareness of risks associated with sharing SNS profiles (online identities)." Rotchanakitumnuai, Siriluck and Kaewkitipong, Laddawan (ed.) 11th International Conference on Electronic Business: Borderless e-Business for the Next Decade (ICEB 2011). Bangkok, Thailand 28 Nov - 02 Dec 2011 Bangkok, Thailand.

Paper

Cooperative jamming and power allocation with untrusty two-way relay nodes
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying and Wang, Wenbo. 2014. "Cooperative jamming and power allocation with untrusty two-way relay nodes." IET Communications. 8 (13), pp. 2290-2297. https://doi.org/10.1049/iet-com.2013.0580

Article

Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
Khader, Aqeel Sahi and Lai, David. 2015. "Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol." 22nd International Conference on Telecommunications (ICT2015). Sydney, Australia 27 - 29 Apr 2015 United States. https://doi.org/10.1109/ICT.2015.7124683

Paper

Novel iterative min-max clustering to minimize information loss in statistical disclosure control
Mahmood, Abdun Naser, Kabir, Md Enamul and Mustafa, Abdul K.. 2014. "Novel iterative min-max clustering to minimize information loss in statistical disclosure control." 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014). Beijing, China 24 - 26 Sep 2014 Germany. https://doi.org/10.1007/978-3-319-23802-9_14

Paper

A statistical framework for intrusion detection system
Kabir, Md Enamul and Hu, Jiankun. 2014. "A statistical framework for intrusion detection system." Zhang, Defu (ed.) 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014). Xiamen, China 19 - 21 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/FSKD.2014.6980966

Paper

Fieldwork in a digital age: questions of privacy and copyright
Ostini, Jenny. 2014. "Fieldwork in a digital age: questions of privacy and copyright." Field Research Method Lab at LSE.

Article

A dynamic subspace anomaly detection method using generic algorithm for streaming network data
Zhang, Ji and Li, Hongzhou. 2015. "A dynamic subspace anomaly detection method using generic algorithm for streaming network data." Gupta, Manish (ed.) Handbook of research on emerging developments in data privacy. Hershey, PA. United States. IGI Global. pp. 403-425

Edited book (chapter)

Impact of Cloud computing technology on e-government
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2014. "Impact of Cloud computing technology on e-government." Dregvaite, Giedre and Damasevicius, Robertas (ed.) 20th International Conference on Information and Software Technologies (ICIST 2014). Druskininkai, Lithuania 09 - 10 Oct 2014 Heidelberg, Germany. https://doi.org/10.1007/978-3-319-11958-8_22

Paper

Challenges and issues within Cloud computing technology
Ali, Omar and Soar, Jeffrey. 2014. "Challenges and issues within Cloud computing technology." Zimmermann, Wolf, Lee, Yong Woo and Reich, Christoph (ed.) 5th International Conference on Cloud Computing, GRIDs, and Virtualization (IARIA 2014). Venice, Italy 25 - 29 May 2014 Wilmington, DE. United States. https://doi.org/10.13140/2.1.3210.3369

Paper

Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node
Long, Hang, Xiang, Wei, Zhang, Xiaoli, Wang, Jing and Wang, Wenbo. 2014. "Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node." 31st URSI General Assembly and Scientific Symposium (URSI GASS 2014). Beijing, China 16 - 23 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/URSIGASS.2014.6929316

Paper

The development and evaluation of an information security awareness capability model: linking ISO/IEC 27002 controls with awareness importance, capability and risk
Poepjes, Robert. 2015. The development and evaluation of an information security awareness capability model: linking ISO/IEC 27002 controls with awareness importance, capability and risk. PhD Thesis Doctor of Philosophy. University of Southern Queensland.

PhD Thesis

Security and privacy on low-cost radio frequency identification systems
Sun, L.. 2010. "Security and privacy on low-cost radio frequency identification systems ." International Journal of Security and Networks. 5 (2/3), pp. 128-134. https://doi.org/10.1504/IJSN.2010.032211

Article

Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3

Article

An efficient and robust privacy protection technique for massive streaming choice-based information
Zhang, Ji, Liu, Xuemei and Luo, Yonglong. 2013. "An efficient and robust privacy protection technique for massive streaming choice-based information." He, Qi and Iyengar, Arun (ed.) 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013). San Francisco, United States 27 Oct - 01 Nov 2013 New York, NY. United States. https://doi.org/10.1145/2505515.2507816

Paper

Cooperative jamming and power allocation in two-way relaying system with eavesdropper
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying, Zhao, Hui and Wang, Wenbo. 2013. "Cooperative jamming and power allocation in two-way relaying system with eavesdropper." Miller, Jeffrey (ed.) IEEE 78th Vehicular Technology Conference (VTC 2013 Fall): Connecting the Mobile World. Las Vegas, United States 02 - 05 Sep 2013 United States. https://doi.org/10.1109/VTCFall.2013.6692144

Paper

Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems
Long, Hang, Xiang, Wei, Zhang, Yueying, Liu, Yuanan and Wang, Wenbo. 2013. "Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems." IEEE Transactions on Information Forensics and Security. 8 (1), pp. 229-238. https://doi.org/10.1109/TIFS.2012.2229988

Article

Collaborative computing technologies and systems
Yong, Jianming, Shen, Weiming and James, Anne. 2013. "Collaborative computing technologies and systems ." Journal of Systems and Software. 86 (7), pp. 1725-1726. https://doi.org/10.1016/j.jss.2013.03.058

Editorial

UICC control over devices used to obtain service
Brown, Jason and Ahluwalia, Inderpreet Singh. 2014. UICC control over devices used to obtain service. US8639290B2

Patent

Information security and privacy in HRIS
Wong, Yuk Kuen and Thite, Mohan. 2009. "Information security and privacy in HRIS ." Kavanagh, Michael J. and Thite , Mohan (ed.) Human resource information systems: basics, applications, and future directions. New Delhi, India. SAGE Publications Ltd. pp. 395-407

Edited book (chapter)

Information security and privacy in human resource information systems
Wong, Yuk Kuen and Thite, Mohan. 2012. "Information security and privacy in human resource information systems." Kavanagh , Michael J. , Thite , Mohan and Johnson , Richard D. (ed.) Human resource information systems: basics, applications, and future directions, 2nd ed.. London, United Kingdom. SAGE Publications Ltd. pp. 518-533

Textbook (chapter)

Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.

Technical report