Kenneth Radke

According to our database1, Kenneth Radke authored at least 25 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges.
J. Intell. Inf. Syst., April, 2023

2019
Extending the cyber-attack landscape for SCADA-based critical infrastructure.
Int. J. Crit. Infrastructure Prot., 2019

2018
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols.
Int. J. Crit. Infrastructure Prot., 2018

Anomaly detection for industrial control systems using process mining.
Comput. Secur., 2018

2017
Security Proofs for Protocols Involving Humans.
Comput. J., 2017

Process Discovery for Industrial Control System Cyber Attack Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Framework for SCADA cyber-attack dataset creation.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Authenticated encryption for time-sensitive critical infrastructure.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures.
ACM Comput. Surv., 2016

Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.
Proceedings of the Network and System Security - 10th International Conference, 2016

DNP3 network scanning and reconnaissance for critical infrastructure.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

A network forensics tool for precise data packet capture and replay in cyber-physical systems.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
CHURNs: Freshness Assurance for Humans.
Comput. J., 2015

Designing for Collections: Building Histories, Sharing the Spectacle.
Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, 2015

Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy.
Proceedings of the 13th Australasian Information Security Conference, 2015

Internet-wide Scanning Taxonomy and Framework.
Proceedings of the 13th Australasian Information Security Conference, 2015

2014
Privacy in the new era of visible and sharable energy-use information.
Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures, 2014

Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
"Who decides?": security and privacy in the wild.
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013

2012
Towards a Secure Human-and-Computer Mutual Authentication Protocol.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
Ceremony Analysis: Strengths and Weaknesses.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

2010
How HCI design influences web security decisions.
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010

Interaction, privacy and profiling considerations in local mobile social software: a prototype agile ride share system.
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010


  Loading...