Steven Gordon

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Empowering Patients to Delegate and Revoke Access to Blockchain-based Electronic Health Records.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications.
Comput. Secur., 2022

A tree-based stacking ensemble technique with feature selection for network intrusion detection.
Appl. Intell., 2022

2021
Cloud Effects on Organisational Performance: A Local Government Perspective.
Proceedings of the Applications and Techniques in Information Security, 2021

2020
Midpoint Relay Selection Using Social Trust and Battery Level to Enhance Throughput in Cooperative Device-to-Device Communications.
Sensors, 2020

Base station assisted relay selection in device-to-device communications.
Int. J. Ad Hoc Ubiquitous Comput., 2020

Incumbent Organizations Transform Through Digital Platforms.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Safety Message Verification Using History-Based Relative-Time Zone Priority Scheme.
J. Comput. Networks Commun., 2019

Giving Voice to the Voiceless: The Use of Digital Technologies by Marginalized Groups.
Commun. Assoc. Inf. Syst., 2019

2018
Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks.
Sensors, 2018

A Sustainable Connectivity Model of the Internet Access Technologies in Rural and Low-Income Areas.
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018

2017
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Inf. Forensics Secur., 2017

The Political Power of Social Media Revisited.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
A Matrix Based ORAM: Design, Implementation and Experimental Analysis.
IEICE Trans. Inf. Syst., 2016

Security and experimental performance analysis of a matrix ORAM.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space.
Proceedings of the Applications and Techniques in Information Security, 2016

2015
M-ORAM: A Matrix ORAM with Log N Bandwidth Cost.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Analysis of Path ORAM toward Practical Utilization.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

A proxy-based Passive Duplicate Address Detection protocol for IPv6 wireless sensor networks.
Proceedings of the 2015 IEEE International Conference on Control System, 2015

2014
A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols.
J. Comput., 2014

2013
New nodal design for high throughput data vortex optical interconnection network.
Opt. Switch. Netw., 2013

2011
Performance of Handovers between NEMO and Mobile Ad Hoc Networks Using Buffering.
IEICE Trans. Commun., 2011

Impact of Delay Variability on LEDBAT Performance.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2009
Performance Analysis of BitTorrent and Its Impact on Real-Time Video Applications.
Proceedings of the Advances in Information Technology - Third International Conference, 2009

2008
Formal Analysis of PANA Authentication and Authorisation Protocol.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

2007
Using Relay Balance and AQM Schemes to Improve Performance in Multi-hop Wireless Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2006
A General Framework for Context Transfer in Mobile IP Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

2005
Proactive context transfer and forced handover in IEEE 802.11 wireless LAN based access networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Infocratic Perspective on the Delivery of Personal Financial Services.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Proactive context transfer in WLAN-based access networks.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

2002
Hybrid Quality of Service Architecture for Wireless/Mobile Environment.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002

Design of High Capacity Wireless LANs Based on 802.11b Technology.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002

Verification of a Revised WAP Wireless Transaction Protocol.
Proceedings of the Applications and Theory of Petri Nets 2002, 2002

2000
Analysing the WAP Class 2 Wireless Transaction Protocol Using Coloured Petri Nets.
Proceedings of the Application and Theory of Petri Nets 2000, 2000

1999
Modelling the WAP Transaction Service using Coloured Petri Nets.
Proceedings of the Mobile Data Access, First International Conference, 1999

1998
Analysing a Missile Simulator with Coloured Petri Nets.
Int. J. Softw. Tools Technol. Transf., 1998


  Loading...