460499. Cybersecurity and privacy not elsewhere classified


Title460499. Cybersecurity and privacy not elsewhere classified
Parent4604. Cybersecurity and privacy

Latest research outputs

Sort by Date Title
An information security awareness capability model (ISACM)
Poepjes, Robert and Lane, Michael. 2012. "An information security awareness capability model (ISACM)." Williams, Trish, Johnstone, Mike and Valli, Craig (ed.) 10th Australian Information Security Management Conference (SECAU 2012). Perth, Western Australia 03 - 05 Dec 2012 Perth, Western Australia.

Paper

An intelligent scheme of secure routing for mobile ad hoc networks
Zhang, Zhongwei. 2009. "An intelligent scheme of secure routing for mobile ad hoc networks." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813739

Poster

Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.

Paper

Attitudes towards information privacy
Cockcroft, Sophie and Clutterbuck, Peter. 2001. "Attitudes towards information privacy." 12th Australasian Conference on Information Systems (ACIS 2001). Coffs Harbour, Australia 04 - 07 Dec 2001 Australia.

Paper

Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782

Article

Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.

Paper

Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era
Rabby, Fazla, Chimhundu, Ranga and Hassan, Rumman. 2022. "Blockchain-Enabled Trust Management for Digital Marketing in the Industry 4.0 Era." Maleh, Yassine, Tawalbeh, Lo’ai, Motahhir, Saad and Hafid, Abdelhakim Senhaji (ed.) Advances in Blockchain Technology for Cyber Physical Systems. Cham, Switzerland. Springer. pp. 303-321

Edited book (chapter)

Building a distributed authenticating CDN
Moffatt, Sam. 2011. "Building a distributed authenticating CDN ." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053930

Paper

Challenges and issues within Cloud computing technology
Ali, Omar and Soar, Jeffrey. 2014. "Challenges and issues within Cloud computing technology." Zimmermann, Wolf, Lee, Yong Woo and Reich, Christoph (ed.) 5th International Conference on Cloud Computing, GRIDs, and Virtualization (IARIA 2014). Venice, Italy 25 - 29 May 2014 Wilmington, DE. United States. https://doi.org/10.13140/2.1.3210.3369

Paper

Chinese government and software copyright: manipulating the boundaries between public and private
Lu, Jia and Weber, Ian. 2008. "Chinese government and software copyright: manipulating the boundaries between public and private ." International Journal of Communication. 2, pp. 81-99.

Article

Classification of logical vulnerability based on group attack method
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Classification of logical vulnerability based on group attack method." Journal of Ubiquitous Systems and Pervasive Networks. 14 (1), pp. 19-26. https://doi.org/10.5383/JUSPN.14.01.004

Article

Classification of Logical Vulnerability Based on Group Attacking Method
Nabi, Faisal, Yong, Jianming and Tao, Xaiohui. 2020. "Classification of Logical Vulnerability Based on Group Attacking Method." 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020). Warsaw Poland 06 - 09 Apr 2020 Netherlands. https://doi.org/10.1016/j.procs.2020.03.109

Paper

Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705

Paper

Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60

Paper

Collaborative computing technologies and systems
Yong, Jianming, Shen, Weiming and James, Anne. 2013. "Collaborative computing technologies and systems ." Journal of Systems and Software. 86 (7), pp. 1725-1726. https://doi.org/10.1016/j.jss.2013.03.058

Editorial

Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Mahmood, Umar and Iqbal, Usman. 2020. "Concepts of Safety Critical Systems Unification Approach & Security Assurance Process." Journal of Information Security. 11 (4), pp. 292-303. https://doi.org/10.4236/jis.2020.114018

Article

Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.

Paper

Conflict of laws and the cloud
Gray, Anthony. 2013. "Conflict of laws and the cloud." Computer Law and Security Review: the International Journal of Technology Law and Practice. 29 (1), pp. 58-65. https://doi.org/10.1016/j.clsr.2012.11.004

Article

Constructing robust digital identity infrastructure for future networked society
Yong, Jianming, Tiwari, Sanjib, Huang, Xiaodi and Jin, Qun. 2011. "Constructing robust digital identity infrastructure for future networked society." Shen, Weiming, Barthès, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960129

Paper

Continuous fraud detection in enterprise systems through audit trial analysis
Best, Peter J., Rikhardsson, Pall and Toleman, Mark. 2009. "Continuous fraud detection in enterprise systems through audit trial analysis." Journal of Digital Forensics, Security and Law. 4 (1), pp. 39-60.

Article

Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node
Long, Hang, Xiang, Wei, Zhang, Xiaoli, Wang, Jing and Wang, Wenbo. 2014. "Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node." 31st URSI General Assembly and Scientific Symposium (URSI GASS 2014). Beijing, China 16 - 23 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/URSIGASS.2014.6929316

Paper

Cooperative jamming and power allocation in two-way relaying system with eavesdropper
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying, Zhao, Hui and Wang, Wenbo. 2013. "Cooperative jamming and power allocation in two-way relaying system with eavesdropper." Miller, Jeffrey (ed.) IEEE 78th Vehicular Technology Conference (VTC 2013 Fall): Connecting the Mobile World. Las Vegas, United States 02 - 05 Sep 2013 United States. https://doi.org/10.1109/VTCFall.2013.6692144

Paper

Cooperative jamming and power allocation with untrusty two-way relay nodes
Long, Hang, Xiang, Wei, Wang, Jing, Zhang, Yueying and Wang, Wenbo. 2014. "Cooperative jamming and power allocation with untrusty two-way relay nodes." IET Communications. 8 (13), pp. 2290-2297. https://doi.org/10.1049/iet-com.2013.0580

Article

Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).

Article

Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises
Nagahawatta, Ruwan, Lokuge, Sachithra, Warren, Matthew and Salzman, Scott. 2021. "Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises." 32nd Australasian Conference on Information Systems (ACIS 2021). Sydney, Australia 06 - 10 Dec 2021 Australia.

Paper

Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24

Paper

Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29

Paper

Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6

Article

Developing new techniques to improve licence plate detection systems for complicated and low quality vehicle images
Al-Shemarry, Meeras Salman Juwad. 2020. Developing new techniques to improve licence plate detection systems for complicated and low quality vehicle images. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/cbeg-yw22

PhD Thesis

Digital identity control mechanism for e-learning
Yong, Jianming. 2009. "Digital identity control mechanism for e-learning." IEEE International Symposium on IT in Medicine and Education (ITME 2009) . Jinan, China 14 - 16 Aug 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ITIME.2009.5236204

Paper

Digital identity design and privacy preservation for e-learning
Yong, Jianming. 2007. "Digital identity design and privacy preservation for e-learning." Shen, Weiming, Yang, Yun, Yong, Jianming, Hawryszkiewycz, Igor, Lin, Zongkai, Barthes, Jean-Paul, Mathre, Mary Lou, Hao, Qi and Tran, Minh Hong (ed.) CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design. Melbourne, Australia 26 - 28 Apr 2007 Melbourne, Australia. https://doi.org/10.1109/CSCWD.2007.4281549

Paper

Digital identity enrolment and assurance support for VeryIDX
Yong, Jianming and Bertino, Elisa. 2010. "Digital identity enrolment and assurance support for VeryIDX." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 https://doi.org/10.1109/CSCWD.2010.5471880

Paper

DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54

Paper

Does the android permission system provide adequate information privacy protection for end-users of mobile apps?
Lane, Michael. 2012. "Does the android permission system provide adequate information privacy protection for end-users of mobile apps?" Williams, Trish, Johnstone, Mike and Valli, Craig (ed.) 10th Australian Information Security Management Conference (SECAU 2012). Perth, Western Australia 03 - 05 Dec 2012 Perth Western Australia.

Paper

Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.

Technical report

Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.

Article

Efficient intrusion detection scheme based on SVM
Zhou, Guangping and Shrestha, Anup. 2013. "Efficient intrusion detection scheme based on SVM." Journal of Networks. 8 (9), pp. 2128-2134. https://doi.org/10.4304/jnw.8.9.2128-2134

Article

Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6

Article

Enforcing secure access control in integrated systems over the internet
Yong, Jianming, Lane, Michael S., Toleman, Mark and Yang, Yun. 2003. "Enforcing secure access control in integrated systems over the internet." 1st Australian Information Security Management Conference. Perth, Western Australia 24 Nov 2003 Perth, Western Australia.

Paper

Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.

Article