Alex Ng

Orcid: 0000-0002-5809-2150

According to our database1, Alex Ng authored at least 21 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation.
Comput. Secur., November, 2023

Applying staged event-driven access control to combat ransomware.
Comput. Secur., May, 2023

2022
Ransomware Mitigation in the Modern Era: A Comprehensive Review, Research Challenges, and Future Directions.
ACM Comput. Surv., 2022

2021
Enforcing situation-aware access control to build malware-resilient file systems.
Future Gener. Comput. Syst., 2021

A Mechanism to Detect and Prevent Ethereum Blockchain Smart Contract Reentrancy Attacks.
Frontiers Comput. Sci., 2021

Dynamic user-centric access control for detection of ransomware attacks.
Comput. Secur., 2021

2020
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020

Cybersecurity data science: an overview from machine learning perspective.
J. Big Data, 2020

Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study.
First Monday, 2020

Responsibility Attribution Against Data Breaches.
Proceedings of the IEEE International Conference on Informatics, 2020

Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Trust Modeling for Blockchain-Based Wearable Data Market.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2013
A performance evaluation of distributed database architectures.
Concurr. Comput. Pract. Exp., 2013

A Performance Evaluation of Public Cloud Using TPC-C.
Proceedings of the Service-Oriented Computing - ICSOC 2012 Workshops, 2013

2012
A Consolidated Process Model for Identity Management.
Inf. Resour. Manag. J., 2012

2008
Forensic Characteristics of Phishing - Petty Theft or Organized Crime?
Proceedings of the WEBIST 2008, 2008

2007
An evaluation of the performance of web services using table-driven XML.
Int. J. Bus. Process. Integr. Manag., 2007

Towards a Table Driven XML QoS Aware Transmission Framework.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Evaluation and Modeling of Web Services Performance.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Optimising Web Services Performance with Table Driven XML.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

Evaluation of the Serialisation and Deserialisation Performance of Table Driven XML.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006


  Loading...