Michael N. Johnstone

Orcid: 0000-0001-7192-7098

According to our database1, Michael N. Johnstone authored at least 19 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Voice Synthesis Improvement by Machine Learning of Natural Prosody.
Sensors, March, 2024

Examination of Traditional Botnet Detection on IoT-Based Bots.
Sensors, February, 2024

2022
A linear convolution-based cancelable fingerprint biometric authentication system.
Comput. Secur., 2022

A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation.
CoRR, 2021

Towards Evaluating the Effectiveness of Botnet Detection Techniques.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Detection of Induced False Negatives in Malware Samples.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms.
Proceedings of the 31st International Telecommunication Networks and Applications Conference, 2021

A Comparative Study of ML-ELM and DNN for Intrusion Detection.
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021

2020
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Secure Fingerprint Authentication with Homomorphic Encryption.
Proceedings of the Digital Image Computing: Techniques and Applications, 2020

2019
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
Sensors, 2019

2017
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One.
IEEE Trans. Inf. Forensics Secur., 2017

The effectiveness of classification algorithms on IPv6 IID construction.
Int. J. Auton. Adapt. Commun. Syst., 2017

An Exploration of Some Security Issues Within the BACnet Protocol.
Proceedings of the Information Systems Security and Privacy, 2017

Security Issues with BACnet Value Handling.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2015
Controlled Android Application Execution for the IoT Infrastructure.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

2013
Security Aspects of Military Sensor-Based Defence Systems.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Towards Effective Algorithms for Intelligent Defense Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012


  Loading...