Kim-Kwang Raymond Choo

According to our database1, Kim-Kwang Raymond Choo authored at least 644 papers between 2004 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain in Cybersecurity Realm: An Overview.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020

BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment.
IEEE Trans. Veh. Technol., 2020

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020

Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks.
IEEE Trans. Ind. Informatics, 2020

A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020

A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups.
IEEE Trans. Ind. Informatics, 2020

Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.
IEEE Trans. Ind. Informatics, 2020

A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications.
IEEE Trans. Inf. Forensics Secur., 2020

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
IEEE Trans. Inf. Forensics Secur., 2020

SDTE: A Secure Blockchain-Based Data Trading Ecosystem.
IEEE Trans. Inf. Forensics Secur., 2020

An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
IEEE Trans. Inf. Forensics Secur., 2020

Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.
IEEE Trans. Emerg. Top. Comput., 2020

Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.
IEEE Trans. Dependable Secur. Comput., 2020

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Artificial Emotional Intelligence for Cooperative Social Human-Machine Interaction.
IEEE Trans. Comput. Soc. Syst., 2020

Introduction to the Special Issue on User-Centric Security and Safety for CPS.
TCPS, 2020

Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
IEEE Trans. Cloud Comput., 2020

Geospatial Event Detection by Grouping Emotion Contagion in Social Media.
IEEE Trans. Big Data, 2020

An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.
IEEE Systems Journal, 2020

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.
IEEE Systems Journal, 2020

White-Box Implementation of Shamir's Identity-Based Signature Scheme.
IEEE Systems Journal, 2020

Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Security and Communication Networks, 2020

Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT.
IEEE Network, 2020

MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT.
J. Syst. Archit., 2020

A high-performance framework for a network programmable packet processor using P4 and FPGA.
J. Netw. Comput. Appl., 2020

FSFC: An input filter-based secure framework for smart contract.
J. Netw. Comput. Appl., 2020

Sidechain technologies in blockchain networks: An examination and state-of-the-art review.
J. Netw. Comput. Appl., 2020

Detecting Internet of Things attacks using distributed deep learning.
J. Netw. Comput. Appl., 2020

R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity.
J. Netw. Comput. Appl., 2020

An efficient reinforcement learning-based Botnet detection approach.
J. Netw. Comput. Appl., 2020

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.
Inf. Sci., 2020

Blockchain-based system for secure outsourcing of bilinear pairings.
Inf. Sci., 2020

A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.
IEEE Internet Things J., 2020

Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2020

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.
IEEE Internet Things J., 2020

Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.
IEEE Internet Things J., 2020

Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home.
IEEE Internet Things J., 2020

BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020

Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization.
IEEE Internet Things J., 2020

Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0.
IEEE Internet Things J., 2020

Guest Editorial Special Issue on Edge-Cloud Interplay Based on SDN and NFV for Next-Generation IoT Applications.
IEEE Internet Things J., 2020

Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.
IEEE Internet Things J., 2020

Imaging and fusing time series for wearable sensor-based human activity recognition.
Inf. Fusion, 2020

A framework for hierarchical division of retinal vascular networks.
Neurocomputing, 2020

Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Information Security, 2020

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020

A crowdsourcing method for online social networks security assessment based on human-centric computing.
HCIS, 2020

Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020

A task scheduling algorithm considering game theory designed for energy management in cloud computing.
Future Gener. Comput. Syst., 2020

Driverless vehicle security: Challenges and future research opportunities.
Future Gener. Comput. Syst., 2020

Sharpening the edge: Towards improved edge computing environment for mobile and IoT applications.
Future Gener. Comput. Syst., 2020

PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020

Smart vehicle forensics: Challenges and case study.
Future Gener. Comput. Syst., 2020

Energy Management for Cyber-Physical Cloud Systems.
Future Gener. Comput. Syst., 2020

A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
ACM Comput. Surv., 2020

VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
CoRR, 2020

An opcode-based technique for polymorphic Internet of Things malware detection.
Concurr. Comput. Pract. Exp., 2020

Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Comput. Secur., 2020

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Comput. Secur., 2020

Query-efficient label-only attacks against black-box machine learning models.
Comput. Secur., 2020

A secure and scalable data integrity auditing scheme based on hyperledger fabric.
Comput. Secur., 2020

What's really '<i>Happn</i>ing'? A forensic analysis of Android and iOS <i>Happn</i> dating apps.
Comput. Secur., 2020

An improved two-hidden-layer extreme learning machine for malware hunting.
Comput. Secur., 2020

An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020

SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.
Sci. China Inf. Sci., 2020

Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective.
Comput. Hum. Behav., 2020

Consumer IoT: Security Vulnerability Case Studies and Solutions.
IEEE Consumer Electron. Mag., 2020

Introduction to the special section on blockchain technologies for industrial Internet of Things (SI-bciot).
Comput. Electr. Eng., 2020

Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.
Appl. Math. Comput., 2020

Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies.
IEEE Access, 2020

A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks.
IEEE Access, 2020

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing.
IEEE Access, 2020

Categorization and Organization of Database Forensic Investigation Processes.
IEEE Access, 2020

Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

How Helpful are Comparative Reviews for Predicting Product demand?
Proceedings of the 28th European Conference on Information Systems, 2020

Experiential Learning in Digital Forensics.
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020

The Way Forward.
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020

Forensic Investigation of Ransomware Activities - Part 1.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

The Bitcoin-Network Protocol from a Forensic Perspective.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Forensic Investigation of PayPal Accounts.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Digital Forensic Approaches for Cloud Service Models: A Survey.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Long Term Evolution Network Security and Real-Time Data Extraction.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Defending IoT Devices from Malware.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

So, What's Next?
Proceedings of the Cyber and Digital Forensic Investigations, 2020

The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Towards an Automated Process to Categorise Tor's Hidden Services.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

CCTV Forensics in the Big Data Era: Challenges and Approaches.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Forensic Investigation of Ransomware Activities - Part 2.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

2019
Authenticated key agreement scheme for fog-driven IoT healthcare system.
Wirel. Networks, 2019

Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
IEEE Trans. Sustain. Comput., 2019

Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.
IEEE Trans. Sustain. Comput., 2019

Are you emotional or depressed? Learning about your emotional state from your music using machine learning.
J. Supercomput., 2019

Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019

Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud.
IEEE Trans. Ind. Informatics, 2019

Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks.
IEEE Trans. Ind. Informatics, 2019

Secure Key Agreement and Key Protection for Mobile Device User Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
IEEE Trans. Inf. Forensics Secur., 2019

HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets.
IEEE Trans. Inf. Forensics Secur., 2019

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.
IEEE Trans. Emerg. Top. Comput., 2019

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Secur. Comput., 2019

A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory.
TCPS, 2019

On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
TCPS, 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019

A fuzzy-PSO system for indoor localization based on visible light communications.
Soft Comput., 2019

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
Security and Communication Networks, 2019

Improved t-SNE based manifold dimensional reduction for remote sensing data processing.
Multim. Tools Appl., 2019

A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method.
MONET, 2019

Editorial: Security and Privacy in Internet of Things.
MONET, 2019

Privacy-aware smart city: A case study in collaborative filtering recommender systems.
J. Parallel Distributed Comput., 2019

Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking.
J. Parallel Distributed Comput., 2019

A provably secure and anonymous message authentication scheme for smart grids.
J. Parallel Distributed Comput., 2019

Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities.
J. Netw. Comput. Appl., 2019

Blockchain in healthcare applications: Research challenges and opportunities.
J. Netw. Comput. Appl., 2019

AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019

Fog data analytics: A taxonomy and process model.
J. Netw. Comput. Appl., 2019

Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

Blockchain for smart communities: Applications, challenges and opportunities.
J. Netw. Comput. Appl., 2019

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019

Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019

Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification.
KSII Trans. Internet Inf. Syst., 2019

Game theoretic security of quantum bit commitment.
Inf. Sci., 2019

Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019

Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019

A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data.
Inf. Sci., 2019

Privacy preserving similarity joins using MapReduce.
Inf. Sci., 2019

How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform.
IEEE Internet Things J., 2019

Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.
IEEE Internet Things J., 2019

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.
IEEE Internet Things J., 2019

Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019

Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.
IEEE Internet Things J., 2019

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019

CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2019

IoT Forensics: Amazon Echo as a Use Case.
IEEE Internet Things J., 2019

Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.
IEEE Internet Things J., 2019

Secure Range Search Over Encrypted Uncertain IoT Outsourced Data.
IEEE Internet Things J., 2019

Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition.
IEEE Internet Things J., 2019

On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019

Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things.
IEEE Internet Things J., 2019

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019

Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Int. J. Found. Comput. Sci., 2019

An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case.
HCIS, 2019

Controllable and trustworthy blockchain-based cloud data management.
Future Gener. Comput. Syst., 2019

Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things.
Future Gener. Comput. Syst., 2019

Cracking Bitcoin wallets: I want what you have in the wallets.
Future Gener. Comput. Syst., 2019

A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise.
Future Gener. Comput. Syst., 2019

Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.
Future Gener. Comput. Syst., 2019

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.
Future Gener. Comput. Syst., 2019

Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression.
Future Gener. Comput. Syst., 2019

Blockchain based searchable encryption for electronic health record sharing.
Future Gener. Comput. Syst., 2019

Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns.
Digital Investigation, 2019

Blockchain-enabled Authentication Handover with Efficient Privacy Protection in SDN-based 5G Networks.
CoRR, 2019

Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things.
CoRR, 2019

A relative privacy model for effective privacy preservation in transactional data.
Concurr. Comput. Pract. Exp., 2019

A hierarchical key pre-distribution scheme for fog networks.
Concurr. Comput. Pract. Exp., 2019

<i>BEST</i>: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system.
Comput. Secur., 2019

Parking Management: A Blockchain-Based Privacy-Preserving System.
IEEE Consumer Electron. Mag., 2019

A post-quantum light weight 1-out-<i>n</i> oblivious transfer protocol.
Comput. Electr. Eng., 2019

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.
Comput. Electr. Eng., 2019

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.
Comput. Electr. Eng., 2019

An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems.
IEEE Access, 2019

A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.
IEEE Access, 2019

IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management.
IEEE Access, 2019

A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns.
IEEE Access, 2019

Detecting Malicious Social Bots Based on Clickstream Sequences.
IEEE Access, 2019

Hierarchical Adversarial Network for Human Pose Estimation.
IEEE Access, 2019

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.
IEEE Access, 2019

Joint Optimization of Area Throughput and Grid-Connected Microgeneration in UAV-Based Mobile Networks.
IEEE Access, 2019

Blockchain Applications for Industry 4.0 and Industrial IoT: A Review.
IEEE Access, 2019

Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.
IEEE Access, 2019

Deep Android Malware Classification with API-Based Feature Graph.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Graph Database-Based Approach to Analyze Network Log Files.
Proceedings of the Network and System Security - 13th International Conference, 2019

Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.
Proceedings of the National Cyber Summit, 2019

Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Data Sharing and Privacy for Patient IoT Devices Using Blockchain.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Where Does My Product Stand? A Social Network Perspective on Online Product Reviews.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019

Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

BlockIPFS - Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability.
Proceedings of the IEEE International Conference on Blockchain, 2019

Complex contagions of information diffusion across social networking platforms.
Proceedings of the 25th Americas Conference on Information Systems, 2019

AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.
Wirel. Commun. Mob. Comput., 2018

Rethinking Authentication on Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wirel. Commun. Mob. Comput., 2018

Intelligent OS X malware threat detection with code inspection.
J. Comput. Virol. Hacking Tech., 2018

EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018

Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.
IEEE Trans. Veh. Technol., 2018

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City.
IEEE Trans. Sustain. Comput., 2018

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Network and Service Management, 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Ind. Informatics, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Secur. Comput., 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018

Reliable Inversion in GF(2<sup>8</sup>) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2018

From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources.
IEEE Trans. Big Data, 2018

DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image sequence.
Soft Comput., 2018

A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.
Soft Comput., 2018

Applications of computational intelligence in vehicle traffic congestion problem: a survey.
Soft Comput., 2018

Heterogeneous investment in spatial public goods game with mixed strategy.
Soft Comput., 2018

A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Security and Communication Networks, 2018

Security Measurements of Cyber Networks.
Security and Communication Networks, 2018

Multimedia Security: Novel Steganography and Privacy Preserving.
Security and Communication Networks, 2018

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Security and Communication Networks, 2018

FGDA: Fine-grained data analysis in privacy-preserving smart grid communications.
Peer Peer Netw. Appl., 2018

Feature extraction and classification of VHR images with attribute profiles and convolutional neural networks.
Multim. Tools Appl., 2018

E-government multimedia big data platform for disaster management.
Multim. Tools Appl., 2018

Signature-based three-factor authenticated key exchange for internet of things applications.
Multim. Tools Appl., 2018

DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation.
J. Parallel Distributed Comput., 2018

Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distributed Comput., 2018

Online task scheduling for edge computing based on repeated stackelberg game.
J. Parallel Distributed Comput., 2018

Micro-blog topic recommendation based on knowledge flow and user selection.
J. Comput. Sci., 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Sci., 2018

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018

Multimedia big data computing and Internet of Things applications: A taxonomy and process model.
J. Netw. Comput. Appl., 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intell. Humaniz. Comput., 2018

Jo-DPMF: Differentially private matrix factorization learning through joint optimization.
Inf. Sci., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

Task aware hybrid DVFS for multi-core real-time systems using machine learning.
Inf. Sci., 2018

Designing the Sensing as a Service Ecosystem for the Internet of Things.
IEEE Internet Things Mag., 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018

A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds.
IEEE Internet Things J., 2018

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things.
IEEE Internet Things J., 2018

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018

Mobile crowd sensing of human-like intelligence using social sensors: A survey.
Neurocomputing, 2018

Efficient revocable ID-based encryption with cloud revocation server.
Int. J. Commun. Syst., 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018

The Role of the Adversary Model in Applied Security Research.
IACR Cryptol. ePrint Arch., 2018

Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst., 2018

Stag hunt and trust emergence in social networks.
Future Gener. Comput. Syst., 2018

Enhancing privacy through uniform grid and caching in location-based services.
Future Gener. Comput. Syst., 2018

HEPart: A balanced hypergraph partitioning algorithm for big data applications.
Future Gener. Comput. Syst., 2018

A cloud-based remote sensing data production system.
Future Gener. Comput. Syst., 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018

QRFence: A flexible and scalable QR link security detection framework for Android devices.
Future Gener. Comput. Syst., 2018

Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix.
Future Gener. Comput. Syst., 2018

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Gener. Comput. Syst., 2018

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018

Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Gener. Comput. Syst., 2018

Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps.
Future Gener. Comput. Syst., 2018

Measurements and security of complex networks and systems: Research advances and challenges.
Future Gener. Comput. Syst., 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018

Secure policy execution using reusable garbled circuit in the cloud.
Future Gener. Comput. Syst., 2018

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018

User influence analysis for Github developer social networks.
Expert Syst. Appl., 2018

Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.
EURASIP J. Wireless Comm. and Networking, 2018

A model for sentiment and emotion analysis of unstructured social media text.
Electron. Commer. Res., 2018

Digital forensic investigation of two-way radio communication equipment and services.
Digital Investigation, 2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018

Ubuntu One Investigation: Detecting Evidences on Client Machines.
CoRR, 2018

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
CoRR, 2018

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.
CoRR, 2018

CloudMe Forensics: A Case of Big-Data Investigation.
CoRR, 2018

IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
CoRR, 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study.
CoRR, 2018

CloudMe forensics: A case of big data forensic investigation.
Concurr. Comput. Pract. Exp., 2018

Visual Question Authentication Protocol (VQAP).
Comput. Secur., 2018

Identifying 3D printer residual data via open-source documentation.
Comput. Secur., 2018

Internet- and cloud-of-things cybersecurity research challenges and advances.
Comput. Secur., 2018

An efficient privacy mechanism for electronic health records.
Comput. Secur., 2018

Cyber-physical systems information gathering: A smart home case study.
Comput. Networks, 2018

Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.
IEEE Communications Magazine, 2018

Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Communications Magazine, 2018

Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment.
IEEE Communications Magazine, 2018

Performance prediction of parallel computing models to analyze cloud-based big data applications.
Cluster Computing, 2018

Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security.
IEEE Cloud Comput., 2018

Blockchain-Enabled Reengineering of Cloud Datacenters.
IEEE Cloud Comput., 2018

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
IEEE Cloud Comput., 2018

Cloud Message Queueing and Notification: Challenges and Opportunities.
IEEE Cloud Comput., 2018

Cloud Reliability: Possible Sources of Security and Legal Issues?
IEEE Cloud Comput., 2018

Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications.
IEEE Cloud Comput., 2018

Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond.
IEEE Cloud Comput., 2018

Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
Comput. J., 2018

Information privacy in online social networks: Uses and gratification perspective.
Comput. Hum. Behav., 2018

Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.
IEEE Consumer Electron. Mag., 2018

A smartphone-based wearable sensors for monitoring real-time physiological data.
Comput. Electr. Eng., 2018

Crowd computing for social media ecosystems.
Appl. Soft Comput., 2018

Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.
Appl. Math. Comput., 2018

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage.
IEEE Access, 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network.
IEEE Access, 2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018

A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials.
IEEE Access, 2018

IoT Device Forensics and Data Reduction.
IEEE Access, 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

Lico: A Lightweight Access Control Model for Inter-Networking Linkages.
IEEE Access, 2018

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Lightweight Path Authentication Protocol for RFID-Based Supply Chains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Digital Blues: An Investigation Into the Use of Bluetooth Protocols.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Forensic Investigation Framework for Smart Home Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Browser Analysis of Residual Facebook Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018

User Relationship Classification of Facebook Messenger Mobile Data using WEKA.
Proceedings of the Network and System Security - 12th International Conference, 2018

Walking on the Cloud: Gait Recognition, a Wearable Solution.
Proceedings of the Network and System Security - 12th International Conference, 2018

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

An Extended Exploration to the Epidemic Containment Game.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

Using Social Media Data to Improve Situational Awareness during Emergent Events.
Proceedings of the 24th Americas Conference on Information Systems, 2018

A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Intelligent Home Assistant Use in the Home Environment.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-13-0262-6, 2018

Big Digital Forensic Data - Volume 1: Data Reduction Framework and Selective Imaging
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7762-3, 2018

2017
Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications.
Wireless Personal Communications, 2017

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
J. Supercomput., 2017

Hierarchy-Cutting Model Based Association Semantic for Analyzing Domain Topic on the Web.
IEEE Trans. Ind. Informatics, 2017

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017

Social Sensors Based Online Attention Computing of Public Safety Events.
IEEE Trans. Emerg. Top. Comput., 2017

SIPF: A Secure Installment Payment Framework for Drive-Thru Internet.
ACM Trans. Embedded Comput. Syst., 2017

Embedded Device Forensics and Security.
ACM Trans. Embedded Comput. Syst., 2017

Emerging Embedded and Cyber Physical System Security Challenges and Innovations.
IEEE Trans. Dependable Secur. Comput., 2017

Cloud Security Engineering: Theory, Practice and Future Research.
IEEE Trans. Cloud Comput., 2017

Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data.
Softw. Pract. Exp., 2017

A cloud-based taxi trace mining framework for smart city.
Softw. Pract. Exp., 2017

Is the data on your wearable device secure? An Android Wear smartwatch case study.
Softw. Pract. Exp., 2017

Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification.
Soft Comput., 2017

SVM or deep learning? A comparative study on remote sensing image classification.
Soft Comput., 2017

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017

Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model".
Security and Communication Networks, 2017

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model.
Security and Communication Networks, 2017

Practical <i>m</i>-<i>k</i>-Anonymization for Collaborative Data Publishing without Trusted Third Party.
Security and Communication Networks, 2017

Erratum to: Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

V2X security: A case study of anonymous authentication.
Pervasive Mob. Comput., 2017

Guest Editorial: Multimedia Social Network Security and Applications.
Multim. Tools Appl., 2017

A biologically inspired spatio-chromatic feature for color object recognition.
Multim. Tools Appl., 2017

Tamper detection and image recovery for BTC-compressed images.
Multim. Tools Appl., 2017

A password based authentication scheme for wireless multimedia systems.
Multim. Tools Appl., 2017

Forensic taxonomy of android productivity apps.
Multim. Tools Appl., 2017

The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.
MONET, 2017

Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distributed Comput., 2017

EPLS: A novel feature extraction method for migration data clustering.
J. Parallel Distributed Comput., 2017

Hypergraph partitioning for social networks based on information entropy modularity.
J. Netw. Comput. Appl., 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

Pervasive social networking forensics: Intelligence and evidence from mobile device extracts.
J. Netw. Comput. Appl., 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017

Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
J. Comput. Syst. Sci., 2017

Secure outsourcing of modular exponentiations under single untrusted programme model.
J. Comput. Syst. Sci., 2017

Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017

Building spatial temporal relation graph of concepts pair using web repository.
Inf. Syst. Frontiers, 2017

Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies.
IEEE Internet Things J., 2017

Air quality data clustering using EPLS method.
Inf. Fusion, 2017

Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptol. ePrint Arch., 2017

Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Gener. Comput. Syst., 2017

Associative retrieval in spatial big data based on spreading activation with semantic ontology.
Future Gener. Comput. Syst., 2017

An optimized approach for massive web page classification using entity similarity based on semantic network.
Future Gener. Comput. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

A technique to circumvent SSL/TLS validations on iOS devices.
Future Gener. Comput. Syst., 2017

A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digital Investigation, 2017

Searchable Symmetric Encryption: Designs and Challenges.
ACM Comput. Surv., 2017

SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.
Comput. Stand. Interfaces, 2017

Mobile cloud security: An adversary model for lightweight browser security.
Comput. Stand. Interfaces, 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017

Performance of Android Forensics Data Recovery Tools.
CoRR, 2017

Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study.
CoRR, 2017

Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
CoRR, 2017

Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
CoRR, 2017

Honeypots for employee information security awareness and education training: A conceptual EASY training model.
CoRR, 2017

Cloud incident handling and forensic-by-design: cloud storage as a case study.
Concurr. Comput. Pract. Exp., 2017

Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication.
Concurr. Comput. Pract. Exp., 2017

Astroturfing detection in social media: a binary n-gram-based approach.
Concurr. Comput. Pract. Exp., 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study.
Concurr. Comput. Pract. Exp., 2017

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017

Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Comput. Secur., 2017

Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review.
Comput. Secur., 2017

Resilient interconnection in cyber-physical control systems.
Comput. Secur., 2017

Secure hitch in location based social networks.
Comput. Commun., 2017

An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Comput. Commun., 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.
IEEE Communications Magazine, 2017

Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging.
IEEE Cloud Comput., 2017

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Comput., 2017

Evidence and Forensics in the Cloud: Challenges and Future Research Directions.
IEEE Cloud Comput., 2017

Context Aware Ubiquitous Biometrics in Edge of Military Things.
IEEE Cloud Comput., 2017

Biometrics in the Cloud: Challenges and Research Opportunities.
IEEE Cloud Comput., 2017

I-Marks: An iris code embedding system for ownership identification of multimedia content.
Comput. Electr. Eng., 2017

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Comput. Electr. Eng., 2017

Machine learning aided Android malware classification.
Comput. Electr. Eng., 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017

Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Comput. Electr. Eng., 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017

Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Appl. Math. Comput., 2017

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.
Appl. Math. Comput., 2017

Revisiting Semi-Supervised Learning for Online Deceptive Review Detection.
IEEE Access, 2017

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols.
IEEE Access, 2017

IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics.
IEEE Access, 2017

A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017

Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core.
IEEE Access, 2017

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things.
IEEE Access, 2017

Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Volkswagen Car Entertainment System Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Situational Crime Prevention and the Mitigation of Cloud Computing Threats.
Proceedings of the Security and Privacy in Communication Networks, 2017

Identification of Forensic Artifacts in VMWare Virtualized Computing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Manipulating the Five V's in the Next Generation Air Transportation System.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Deep Learning Based Online Malicious URL and DNS Detection Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Making Decisions about Self-Disclosure in Online Social Networks.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Investigating Mobile Social Media Users? Behaviors in Tourism Collaborative Information Seeking.
Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval, 2017

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Research Challenges and Opportunities in Big Forensic Data.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

The Effect of the Recommendation System in the Mobile App Market.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Internet of Things (IoT): Smart and Secure Service Delivery.
ACM Trans. Internet Techn., 2016

Intent-Based Extensible Real-Time PHP Supervision Framework.
IEEE Trans. Inf. Forensics Secur., 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Inf. Forensics Secur., 2016

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Inf. Forensics Secur., 2016

A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.
IEEE Trans. Inf. Forensics Secur., 2016

Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive Mob. Comput., 2016

Mobile security and privacy: Advances, challenges and future research directions.
Pervasive Mob. Comput., 2016

Guest Editorial: Network Forensics and Surveillance for Emerging Networks.
IEEE Network, 2016

On the Analysis and Detection of Mobile Botnet Applications.
J. UCS, 2016

Copy-move forgery detection: Survey, challenges and future directions.
J. Netw. Comput. Appl., 2016

Web application protection techniques: A taxonomy.
J. Netw. Comput. Appl., 2016

User profiling in intrusion detection: A review.
J. Netw. Comput. Appl., 2016

Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles.
J. Netw. Comput. Appl., 2016

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework.
J. Netw. Comput. Appl., 2016

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016

Survey on key revocation mechanisms in wireless sensor networks.
J. Netw. Comput. Appl., 2016

Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016

Building the search pattern of web users using conceptual semantic space model.
IJWGS, 2016

An Improved Online/Offline Identity-Based Signature Scheme for WSNs.
Int. J. Netw. Secur., 2016

Cloud Cryptography: Theory, Practice and Future Research Directions.
Future Gener. Comput. Syst., 2016

Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media.
EURASIP J. Wireless Comm. and Networking, 2016

Internet data budget allocation policies for diverse smartphone applications.
EURASIP J. Wireless Comm. and Networking, 2016

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wireless Comm. and Networking, 2016

Android mobile VoIP apps: a survey and examination of their security and privacy.
Electron. Commer. Res., 2016

Cloud forensics: State-of-the-art and future directions.
Digital Investigation, 2016

Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digital Investigation, 2016

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
CoRR, 2016

Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective.
CoRR, 2016

Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study.
CoRR, 2016

Building knowledge base of urban emergency events based on crowdsourcing of social media.
Concurr. Comput. Pract. Exp., 2016

An adversary model to evaluate DRM protection of video contents on iOS devices.
Comput. Secur., 2016

Geographical information system parallelization for spatial big data processing: a review.
Cluster Computing, 2016

Big forensic data reduction: digital forensic images and electronic evidence.
Cluster Computing, 2016

PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment.
Cluster Computing, 2016

Forensic-by-Design Framework for Cyber-Physical Cloud Systems.
IEEE Cloud Comput., 2016

Live Migration in Emerging Cloud Paradigms.
IEEE Cloud Comput., 2016

Cloud Manufacturing: Security, Privacy, and Forensic Concerns.
IEEE Cloud Comput., 2016

Challenges in Delivering Software in the Cloud as Microservices.
IEEE Cloud Comput., 2016

Encryption-Based Solution for Data Sovereignty in Federated Clouds.
IEEE Cloud Comput., 2016

Enhanced Network Support for Federated Cloud Infrastructures.
IEEE Cloud Comput., 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Comput., 2016

Context-oriented web application protection model.
Appl. Math. Comput., 2016

A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016

Tinder Me Softly - How Safe Are You Really on Tinder?
Proceedings of the Security and Privacy in Communication Networks, 2016

Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

A New Transitive Signature Scheme.
Proceedings of the Network and System Security - 10th International Conference, 2016

The role of mobile forensics in terrorism investigations involving the use of cloud apps.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Provably Secure Blind Signature Based on Coding Theory.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

An Android Social App Forensics Adversary Model.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Improving Security Awareness in the Government Sector.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Change-point cloud DDoS detection using packet inter-arrival time.
Proceedings of the 2016 8th Computer Science and Electronic Engineering Conference, 2016

Next Generation Aircraft Architecture and Digital Forensic.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Application of HAZOP to the Design of Cyber Security Experiments.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
Symmetry, 2015

Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms.
J. Org. Computing and E. Commerce, 2015

A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles.
Informatica, 2015

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies.
EAIT, 2015

Cyber security readiness in the South Australian Government.
Comput. Stand. Interfaces, 2015

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015

Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps.
CoRR, 2015

Conceptual evidence collection and analysis methodology for Android devices.
CoRR, 2015

A Forensically Sound Adversary Model for Mobile Devices.
CoRR, 2015

A survey of information security incident handling in the cloud.
Comput. Secur., 2015

Exfiltrating data from Android devices.
Comput. Secur., 2015

Trustworthy Processing of Healthcare Big Data in Hybrid Clouds.
IEEE Cloud Comput., 2015

Cloud Attack and Risk Assessment Taxonomy.
IEEE Cloud Comput., 2015

A Cloud-Focused Mobile Forensics Methodology.
IEEE Cloud Comput., 2015

Balancing Privacy with Legitimate Surveillance and Lawful Data Access.
IEEE Cloud Comput., 2015

A Review of Free Cloud-Based Anti-Malware Apps for Android.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Forensic Collection and Analysis of Thumbnails in Android.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Android Cache Taxonomy and Forensic Process.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015

What Influences Employees to Use Enterprise Social Networks? A Socio-Technical Perspective.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

On Lightweight Security Enforcement in Cyber-Physical Systems.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis.
Proceedings of the 13th Australasian Information Security Conference, 2015

Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Privacy Risks in Mobile Dating Apps.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Enterprise Social Networks: A Successful Implementation within a Telecommunication Company.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Forensic Taxonomy of Popular Android mHealth Apps.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Cloud security and forensic readiness: The current state of an IaaS provider.
Proceedings of the Cloud Security Ecosystem, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model.
Proceedings of the Cloud Security Ecosystem, 2015

Mobile cloud forensics: An analysis of seven popular Android apps.
Proceedings of the Cloud Security Ecosystem, 2015

Conceptual evidence collection and analysis methodology for Android devices.
Proceedings of the Cloud Security Ecosystem, 2015

Cloud security ecosystem.
Proceedings of the Cloud Security Ecosystem, 2015

CATRA: Conceptual cloud attack taxonomy and risk assessment framework.
Proceedings of the Cloud Security Ecosystem, 2015

2014
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption.
Security and Communication Networks, 2014

Google Drive: Forensic analysis of data remnants.
J. Netw. Comput. Appl., 2014

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014

Information security in the South Australian real estate industry: A study of 40 real estate organisations.
Inf. Manag. Comput. Secur., 2014

Impacts of increasing volume of digital forensic data: A survey and future research challenges.
Digital Investigation, 2014

Distributed filesystem forensics: XtreemFS as a case study.
Digital Investigation, 2014

Cloud Forensic Technical Challenges and Solutions: A Snapshot.
IEEE Cloud Comput., 2014

Mobile Cloud Storage Users.
IEEE Cloud Comput., 2014

A Cloud Security Risk-Management Strategy.
IEEE Cloud Comput., 2014

Legal Issues in the Cloud.
IEEE Cloud Comput., 2014

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users.
Behav. Inf. Technol., 2014

Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Windows Event Forensic Process.
Proceedings of the Advances in Digital Forensics X, 2014

Enhancing User Privacy on Android Mobile Devices via Permissions Removal.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

iOS Anti-forensics: How Can We Securely Conceal, Delete and Insert Data?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Building the Next Generation of Cyber Security Professionals.
Proceedings of the 22st European Conference on Information Systems, 2014

Should there be a New Body of Law for Cyber Space?
Proceedings of the 22st European Conference on Information Systems, 2014

Multi-sender Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Forensic Analysis of Windows Thumbcache files.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Bridging the Air Gap: Inaudible Data Exfiltration by Insiders.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Cloud Storage Forensics.
Syngress Publishing / Elsevier, ISBN: 978-0-12-419970-5, 2014

2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013

An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2013

On the security of a password-only authenticated three-party key exchange protocol.
IACR Cryptol. ePrint Arch., 2013

Digital droplets: Microsoft SkyDrive forensic data remnants.
Future Gener. Comput. Syst., 2013

Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Digital Investigation, 2013

Dropbox analysis: Data remnants on user machines.
Digital Investigation, 2013

Cloud storage forensics: ownCloud as a case study.
Digital Investigation, 2013

New payment methods: A review of 2010-2012 FATF mutual evaluation reports.
Comput. Secur., 2013

Data Recovery from Proprietary Formatted Cctv Hard Disks.
Proceedings of the Advances in Digital Forensics IX, 2013

Digital Camcorder Forensics.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.
SIGACT News, 2012

An integrated conceptual digital forensic framework for cloud computing.
Digital Investigation, 2012

2011
The cyber threat landscape: Challenges and future research directions.
Comput. Secur., 2011

An ID-based digital watermarking protocol for copyright protection.
Comput. Electr. Eng., 2011

2010
On the security of an enhanced novel access control protocol for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010

High tech criminal threats to the national information infrastructure.
Inf. Secur. Tech. Rep., 2010

Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Secure Key Establishment
Advances in Information Security 41, Springer, ISBN: 978-0-387-87968-0, 2009

An improved identity-based key agreement protocol and its security proof.
Inf. Sci., 2009

Security weakness in a dynamic program update protocol for wireless sensor networks.
IEEE Communications Letters, 2009

On the anonymity of some authentication schemes for wireless communications.
IEEE Communications Letters, 2009

Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Sci. China Ser. F Inf. Sci., 2009

2008
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols.
Int. J. Netw. Secur., 2008

Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2008

Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition.
Comput. J., 2008

2007
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker.
Informatica, 2007

Strongly-Secure Identity-based Key Agreement and Anonymous Extension.
IACR Cryptol. ePrint Arch., 2007

A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.
IACR Cryptol. ePrint Arch., 2007

Secret Signatures: How to Achieve Business Privacy Efficiently?
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007

2006
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.
Informatica, 2006

Issue report on business adoption of Microsoft Passport.
Inf. Manag. Comput. Secur., 2006

Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol.
Int. J. Netw. Secur., 2006

On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol.
Int. J. Netw. Secur., 2006

New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptol. ePrint Arch., 2006

The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Comput. Commun., 2006

Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Formal analysis of secure contracting protocol for e-tendering.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols.
Int. J. Netw. Secur., 2005

Errors in Computational Complexity Proofs for Protocols.
IACR Cryptol. ePrint Arch., 2005

Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
IACR Cryptol. ePrint Arch., 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.
IACR Cryptol. ePrint Arch., 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols.
Proceedings of the Progress in Cryptology, 2005

Security of Two-Party Identity-Based Key Agreement.
Proceedings of the Progress in Cryptology, 2005

A Secure Anonymous Authorisation Architecture for E-Commerce.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
IACR Cryptol. ePrint Arch., 2004

Complementing Computational Protocol Analysis with Formal Specifications.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

A user-centric anonymous authorisation framework in e-commerce environment.
Proceedings of the 6th International Conference on Electronic Commerce, 2004


  Loading...