Benjamin P. Turnbull

Orcid: 0000-0003-0440-5032

According to our database1, Benjamin P. Turnbull authored at least 60 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities.
Sensors, September, 2023

An explainable deep learning-enabled intrusion detection framework in IoT networks.
Inf. Sci., August, 2023

OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey.
ACM Comput. Surv., 2023

Reinforcement Learning Agents Playing Ticket to Ride-A Complex Imperfect Information Board Game With Delayed Rewards.
IEEE Access, 2023

2022
ASU/UNSW-CNATCC-001.
Dataset, February, 2022

Privacy-preserving big data analytics for cyber-physical systems.
Wirel. Networks, 2022

Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks.
ACM Trans. Multim. Comput. Commun. Appl., 2022

A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol.
IEEE Open J. Comput. Soc., 2022

Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems.
Ad Hoc Networks, 2022

2021
A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture.
IEEE Open J. Comput. Soc., 2021

Biometrics and Privacy-Preservation: How Do They Evolve?
IEEE Open J. Comput. Soc., 2021

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks.
IEEE Internet Things J., 2021

A Data Driven Review of Board Game Design and Interactions of Their Mechanics.
IEEE Access, 2021

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems.
IEEE Access, 2021

Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies.
IEEE Access, 2021

A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020

An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
IEEE Trans. Inf. Forensics Secur., 2020

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions.
IEEE Access, 2020

Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Experiment Design for Complex Immersive Visualisation.
Proceedings of the 2020 Military Communications and Information Systems Conference, 2020

A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks.
Proceedings of the Intelligent Systems and Applications, 2020

Interactive 3D Visualization of Network Traffic in Time for Forensic Analysis.
Proceedings of the 15th International Joint Conference on Computer Vision, 2020

A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems.
Proceedings of the AI 2020: Advances in Artificial Intelligence, 2020

2019
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.
IEEE Internet Things J., 2019

The Modelling and Simulation of Integrated Battlefield Cyber-Kinetic Effects.
Int. J. Cyber Warf. Terror., 2019

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset.
Future Gener. Comput. Syst., 2019

Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.
IEEE Access, 2019

2018
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems.
IEEE Access, 2018

Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Mission-Centric Automated Cyber Red Teaming.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017

Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success.
Int. J. Cyber Warf. Terror., 2017

2015
Automated event and social network extraction from digital evidence sources with ontological mapping.
Digit. Investig., 2015

System of systems cyber effects simulation ontology.
Proceedings of the 2015 Winter Simulation Conference, 2015

Visual analytics for cyber red teaming.
Proceedings of the 12th IEEE Symposium on Visualization for Cyber Security, 2015

2013
An Overview of the Parallax BattleMind v1.5 for Computer Network Defence.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
Development of InfoVis Software for Digital Forensics.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2010
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation.
Proceedings of the ARES 2010, 2010

2009
Towards a Formalization of Digital Forensics.
Proceedings of the Advances in Digital Forensics V, 2009

Legal and Technical Implications of Collecting Wireless Data as an Evidence Source.
Proceedings of the Forensics in Telecommunications, 2009

A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC.
Proceedings of the Forensics in Telecommunications, 2009

Acer Aspire One Netbooks: A Forensic Challenge.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data.
Proceedings of the The Forth International Conference on Availability, 2009

Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications.
J. Digit. Forensics Secur. Law, 2008

Extracting Evidence Using Google Desktop Search.
Proceedings of the Advances in Digital Forensics IV, 2008

The adaptability of electronic evidence acquisition guides for new technologies.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics.
Proceedings of the The Third International Conference on Availability, 2008

Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
Proceedings of the The Third International Conference on Availability, 2008

2007
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Google Desktop as a Source of Digital Evidence.
Int. J. Digit. EVid., 2006

Computer Security Education and Research in Australia.
IEEE Secur. Priv., 2006

2005
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Googling Forensics.
Proceedings of 3rd Australian Computer, 2005

2004
Wireless Network Security in Australia: A Study of 7 Australian Capital Cities.
Proceedings of the Pacific Asia Conference on Information Systems, 2004


  Loading...