Search filters

List of works by Kim-Kwang Raymond Choo

A Blockchain Future To Internet Of Things Security: A Position Paper

journal article from 'Digital Communications and Networks' published in 2017

A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems

scientific article published in 2021

A Blockchain-Based Shamir’s Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings

scientific article published in 2022

A Blockchain-based Access Control Scheme for Zero Trust Cross-organizational Data Sharing

scientific article published in 2022

A Blockchain-based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things

scientific article published in 2022

A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution

A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors

scientific article published on 16 December 2023

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

scholarly article by Quratulain Alam et al published June 2017 in IEEE Transactions on Information Forensics and Security

A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers

scientific article published in 2016

A Deep Learning Based Online Malicious URL and DNS Detection Scheme

scholarly article by Jianguo Jiang et al published 2018 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images

scholarly article by Cheng Guo et al published 2018 in IEEE Transactions on Industrial Informatics

A Forensic Investigation Framework for Smart Home Environment

conference paper published in 2018

A Forensically Sound Adversary Model for Mobile Devices

scientific article published on 22 September 2015

A General Architecture for Multiserver Authentication Key Agreement with Provable Security

A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things

scientific article published in 2020

A Lightweight Path Authentication Protocol for RFID-Based Supply Chains

A Lightweight Radio Propagation Model for Vehicular Communication in Road Tunnels

scientific article

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps

scholarly article by Christian J. D'Orazio et al published January 2017 in Applied Mathematics and Computation

A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage

article by Peng Zeng & Kim-Kwang Raymond Choo published 2018 in IEEE Access

A New Multidimensional and Fault-Tolerable Data Aggregation Scheme for Privacy-Preserving Smart Grid Communications

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things

scientific article

A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method

article by Weitong Hu et al published 9 November 2018 in Mobile Networks and Applications

A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network

A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing

scientific article published in 2019

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

scientific article published in 2020

A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds

scholarly article published August 2018

A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems

scientific article published in 2023

A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular <i>Ad-Hoc</i> Networks

scientific article published in 2022

A Provably Secure Blind Signature Based on Coding Theory

A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems

scientific article published in 2022

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

article

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity

A Relative Privacy Model for Effective Privacy Preservation in Transactional Data

A Review of Supervised Classification based on Contrast Patterns: Applications, Trends, and Challenges

scientific article published on 04 October 2020

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

scholarly article published June 2018

A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials

A Secure, Flexible and PPG-based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest

scientific article published in 2023

A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids

scientific article published in 2022

A Survey on Redactable Blockchain: Challenges and Opportunities

scientific article published in 2023

A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph

article

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks

A biologically inspired spatio-chromatic feature for color object recognition

article by Tian Tian et al published 24 January 2017 in Multimedia Tools and Applications

A blockchain future for internet of things security: a position paper

article by Mandrita Banerjee et al published August 2018 in Digital Communications and Networks

A blockchain-based cross-domain and autonomous access control scheme for internet of things

scientific article published in 2022

A cloud-based remote sensing data production system

A cloud-based taxi trace mining framework for smart city

A crowdsourcing method for online social networks security assessment based on human-centric computing

scientific article published in 2020

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting

journal article from 'Future Generation Computer Systems' published in 2018

A design science approach to developing an integrated mobile app forensic framework

scientific article published in 2021

A foggy research future: Advances and future opportunities in fog computing research

A fuzzy-PSO system for indoor localization based on visible light communications

scholarly article by Giovanni Pau et al published 27 April 2018 in Soft Computing

A heuristic line piloting method to disclose malicious taxicab driver’s privacy over GPS big data

A hierarchical key pre-distribution scheme for fog networks

A lightweight machine learning-based authentication framework for smart IoT devices

scholarly article by P. Punithavathi et al published May 2019 in Information Sciences

A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise

scholarly article by Umara Noor et al published July 2019 in Future Generation Computer Systems

A model for sentiment and emotion analysis of unstructured social media text

scholarly article by Jitendra Kumar Rout et al published 4 April 2017 in Electronic Commerce Research

A multi-objective software defined network traffic measurement

scholarly article by Hamid Tahaei et al published January 2017 in Measurement

A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks

scientific article published in 2021

A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management

scientific article published in 2021

A novel association rule mining approach using TID intermediate itemset

scientific article published on 19 January 2018

A novel audio forensic data-set for digital multimedia forensics

A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics

A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns

A password based authentication scheme for wireless multimedia systems

A post-quantum light weight 1-out-n oblivious transfer protocol

A privacy preservation method for multiple-source unstructured data in online social networks

scientific article published on 07 December 2021

A provably secure and anonymous message authentication scheme for smart grids

A relative privacy model for effective privacy preservation in transactional data

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city

article

A secure and efficient public auditing scheme using RSA algorithm for cloud storage

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy

A secure and scalable data integrity auditing scheme based on hyperledger fabric

journal article from 'Computers & Security' published in 2020

A smartphone-based wearable sensors for monitoring real-time physiological data

A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities

scientific article published in 2021

A survey of information security incident handling in the cloud

scientific article published in 2015

A survey of machine learning techniques in adversarial image forensics

scientific article published in 2021

A systematic literature review of blockchain cyber security

scientific article published in 2020

A technique to circumvent SSL/TLS validations on iOS devices

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud

scientific article published in 2022

Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment

Achieving Lightweight and Privacy-preserving Object Detection for Connected Autonomous Vehicles

scientific article published in 2022

Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data

Air quality data clustering using EPLS method

scholarly article by Yunliang Chen et al published July 2017 in Information Fusion

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

An Android Communication App Forensic Taxonomy

scientific article

An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability

An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks

scientific article published in 2019

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System

An Enhanced Anonymous Identification Scheme for Smart Grids

An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things

scholarly article published 2018

An Evidence-Based Forensic Taxonomy of Windows Phone Communication Apps

scientific article

An Evidence-based Forensic Taxonomy of Windows Phone Dating Apps

article

An Extended Exploration to the Epidemic Containment Game

An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks

scientific article published in 2017

An adversary model to evaluate DRM protection of video contents on iOS devices

scientific article published in 2016

An efficient privacy mechanism for electronic health records

article

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network

An improved two-hidden-layer extreme learning machine for malware hunting

scientific article published in 2020

An opcode-based technique for polymorphic Internet of Things malware detection

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks

Anonymity preserving and Lightweight Multi-Medical Server Authentication Protocol for Telecare Medical Information System

scientific article published on 01 July 2019

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey

scientific article published on 15 July 2020

Applications of computational intelligence in vehicle traffic congestion problem: a survey

Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis

Are you emotional or depressed? Learning about your emotional state from your music using machine learning

scholarly article by Sharaj Panwar et al published 31 July 2018 in The Journal of Supercomputing

Artificial Intelligence Technologies for COVID-19-Like Epidemics: Methods and Challenges

scientific article published on 14 June 2021

Assessment of the Blockchain Technology Adoption for the Management of the Electronic Health Record Systems

scientific article published in 2023

Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things

scientific article published in 2021

Authenticated key agreement scheme for fog-driven IoT healthcare system

article

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis

scientific article published on 28 December 2023

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs

scientific article published in 2023

BESIFL: Blockchain-Empowered Secure and Incentive Federated Learning Paradigm in IoT

scientific article published in 2023

BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system

scientific article published in 2019

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records

scientific article published in 2023

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users

BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT

Biometrics in the Cloud: Challenges and Research Opportunities

scientific article published in July 2017

Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications

Black-box adversarial attacks on XSS attack detection model

scientific article published in 2022

Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence

scientific article published on 14 November 2022

Blockchain based searchable encryption for electronic health record sharing

article

Blockchain based secure data sharing system for Internet of vehicles: A position paper

journal article from 'Vehicular Communications' published in 2019

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities

book published in 2020

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities

scientific article published in 2020

Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems

scientific article published in 2022

Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design

Blockchain-Enabled Reengineering of Cloud Datacenters

Blockchain-based identity management systems: A review

journal article from 'Journal of Network and Computer Applications' published in 2020

Blockchain-based system for secure outsourcing of bilinear pairings

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?

article

BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things

scientific article published in 2020

Browser Analysis of Residual Facebook Data

article

Building knowledge base of urban emergency events based on crowdsourcing of social media

scientific article published in 2016

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective

journal article from 'IEEE Cloud Computing' published in 2017

Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps

Cloud Message Queueing and Notification: Challenges and Opportunities

journal article from 'IEEE Cloud Computing' published in 2018

Cloud Reliability: Possible Sources of Security and Legal Issues?

Cloud forecasting: Legal visibility issues in saturated environments

Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond

article published in 2018

CloudMe forensics: A case of big data forensic investigation

journal article from 'Concurrency and Computation: Practice and Experience' published in 2018

Comments on “Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources”

scientific article published in 2020

Confluence of Blockchain and Artificial Intelligence Technologies for Secure and Scalable Healthcare Solutions: A Review

scientific article published in 2023

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

scientific article

Consumer IoT: Security Vulnerability Case Studies and Solutions

scientific article published in 2020

Contributors

Controllable and trustworthy blockchain-based cloud data management

Copy-move forgery detection: Survey, challenges and future directions

Correction: A novel association rule mining approach using TID intermediate itemset.

scientific article published in May 2018

Cracking Bitcoin wallets: I want what you have in the wallets

Crowd computing for social media ecosystems

scholarly article by Zhiyong Zhang et al published May 2018 in Applied Soft Computing

CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage

Cryptanalysis of an Improved Smartcard-based Remote Password Authentication Scheme

scientific article published in 2014

Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities

scientific article published in 2022

Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities

Cyber security challenges in aviation communication, navigation, and surveillance

scientific article published in 2022

Cyber security readiness in the South Australian Government

scientific article published in 2015

Cyber-physical systems information gathering: A smart home case study

journal article from 'Computer Networks' published in 2018

DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer

DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image sequence

DVREI: Dynamic Verifiable Retrieval over Encrypted Images

scientific article published in 2021

Decentralized Authentication of Distributed Patients in Hospital Networks using Blockchain

scientific article published on 27 January 2020

Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things

DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption

scientific article published in 2022

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment

scientific article

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

Digital Blues: An Investigation Into the Use of Bluetooth Protocols

article

Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix

Digital forensic investigation of two-way radio communication equipment and services

Digital forensic readiness intelligence crime repository

scientific article published in 2021

Distributed controller clustering in software defined networks.

scientific article

Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression

scholarly article by Arun Das et al published April 2019 in Future Generation Computer Systems

Driverless vehicle security: Challenges and future research opportunities

DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware

scientific article

E-government multimedia big data platform for disaster management

EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks

Edge Computing and Lightning Network Empowered Secure Food Supply Management

scientific article published in 2022

Editorial: Blockchain Ecosystem—Technological and Management Opportunities and Challenges

scientific article published in 2020

Editorial: Blockchain Ecosystem—Technological and Management Opportunities and Challenges: Part II

scientific article published in 2022

Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice

scientific article published on 22 September 2022

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

Efficient Location-Based Skyline Queries With Secure R-Tree Over Encrypted Data

scientific article published in 2023

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems

scientific article published on 18 March 2020

Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things

scientific article published in 2021

Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain

scientific article published in 2022

Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data

scientific article published in 2023

Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols

article

Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data

scientific article published in 2021

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers

article

Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network

scientific article

Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation

scientific article

Efficient and secure identity-based encryption scheme with equality test in cloud computing

scientific article published in 2017

Efficient and secure searchable encryption protocol for cloud-based Internet of Things

Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data

scientific article published in 2019

Efficient revocable ID-based encryption with cloud revocation server

Efficiently and securely harnessing cloud to solve linear regression and other matrix operations

scholarly article by Lu Zhou et al published April 2018 in Future Generation Computer Systems

Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis

Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization

scientific article published in 2020

Enabling verifiable multiple keywords search over encrypted cloud data

Encrypted Domain Secret Medical-Image Sharing with Secure Outsourcing Computation in IoT Environment

scientific article published in 2023

Encryption-Based Solution for Data Sovereignty in Federated Clouds

scientific article

Enhancing privacy through uniform grid and caching in location-based services

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

scholarly article by Opeyemi Osanaiye et al published 10 May 2016 in EURASIP Journal on Wireless Communications and Networking

Enzymatic hydrolysis of steam exploded corncob residues after pretreatment in a twin-screw extruder.

scientific article published on 26 June 2014

Ethereum smart contract security research: survey and future research opportunities

scientific article published in 2020

Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices

Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks

Exfiltrating data from Android devices

scientific article published in 2015

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts

scientific article published in 2017

FGDA: Fine-grained data analysis in privacy-preserving smart grid communications

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems

scientific article published in 2020

FVW: Finding Valuable Weight on Deep Neural Network for Model Pruning

scientific article published on 21 October 2023

Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices

Family locating sharing app forensics: Life360 as a case study

scientific article published in 2023

Feature extraction and classification of VHR images with attribute profiles and convolutional neural networks

scholarly article by Tian Tian et al published 13 November 2017 in Multimedia Tools and Applications

Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives

scientific article published on 09 July 2021

Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.

scientific article

Fog data analytics: A taxonomy and process model

Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study

scientific article published on 25 November 2016

Forensic Taxonomy of Android Social Apps

scientific article

Forensic analysis and security assessment of Android m-banking apps

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study

journal article from 'Computers & Electrical Engineering' published in 2017

Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study

scientific article published on 29 January 2019

Forward Private Verifiable Dynamic Searchable Symmetric Encryption with Efficient Conjunctive Query

scientific article published in 2023

From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources

scientific article published in 2018

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

Fuzzy-folded Bloom Filter-as-a-Service for Big Data Storage on Cloud

GDTN: Genome-Based Delay Tolerant Network Formation in Heterogeneous 5G Using Inter-UA Collaboration

scientific article (publication date: 2016)

Game theoretic security of quantum bit commitment

HAPPS: A hidden attribute and privilege-protection data sharing scheme with verifiability

scientific article published in 2022

HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets

scientific article published in 2019

HEPart: A balanced hypergraph partitioning algorithm for big data applications

Heterogeneous investment in spatial public goods game with mixed strategy

I-Marks: An iris code embedding system for ownership identification of multimedia content

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies

Identification of Forensic Artifacts in VMWare Virtualized Computing

Identifying 3D printer residual data via open-source documentation

article

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic

Impact of a participatory cyber crime prevention programme on secondary school students’ attainment in crime prevention concepts in civic education and social studies

scientific article published in 2013

Information privacy in online social networks: Uses and gratification perspective

Information security in the South Australian real estate industry

scientific article published in 2014

Intelligent OS X malware threat detection with code inspection

Internet data budget allocation policies for diverse smartphone applications

Internet- and cloud-of-things cybersecurity research challenges and advances

article

Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies

scientific article published in 2017

IoT Device Forensics and Data Reduction

journal article from 'IEEE Access' published in 2018

Jo-DPMF: Differentially private matrix factorization learning through joint optimization

Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage

scientific article published in 2020

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems

LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation

scientific article

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions

Lico: A Lightweight Access Control Model for Inter-Networking Linkages

Lightweight Privacy-preserving Distributed Recommender System using Tag-based Multikey Fully Homomorphic Data Encapsulation

scientific article published in 2023

Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data

scientific article published in 2021

Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function

scientific article published in 2022

LinkedLegal: Investigating social media as evidence in courtrooms

scientific article published in 2020

MAS-Encryption and its Applications in Privacy-Preserving Classifiers

scientific article published in 2022

MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-user Setting

scientific article published in 2022

Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting

Manipulating the Five V’s in the Next Generation Air Transportation System

article

Measurements and security of complex networks and systems: Research advances and challenges

Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things

scholarly article by Zhe Liu et al published 2018 in IEEE Transactions on Dependable and Secure Computing

Micro-blog topic recommendation based on knowledge flow and user selection

Mobile cloud security: An adversary model for lightweight browser security

scientific article published in 2017

Mobile crowd sensing of human-like intelligence using social sensors: A survey

Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data

scientific article published in 2021

Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things

Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks

article

Multimedia Security: Novel Steganography and Privacy Preserving

Multimedia big data computing and Internet of Things applications: A taxonomy and process model

NLP-based digital forensic investigation platform for online communications

scientific article published in 2021

Neighbor-considered migration facilitates cooperation in prisoner’s dilemma games

scholarly article by Yizhi Ren et al published April 2018 in Applied Mathematics and Computation

New payment methods: A review of 2010–2012 FATF mutual evaluation reports

article

Node Immunization in Networks with Uncertainty

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks

scholarly article published August 2018

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation

scientific article

On Data Sovereignty in Cloud-based Computation Offloading for Smart Cities Applications

On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures

scientific article published on 09 August 2023

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

scientific article published in 2016

On the design of a secure user authentication and key agreement scheme for wireless sensor networks

On the need for AI to triage encrypted data containers in U.S. law enforcement applications

scientific article published in 2021

On the security of a simple three-party key exchange protocol without server's public keys.

scientific article published in September 2014

Online child exploitation: Challenges and future research directions

scientific article published in 2014

Online task scheduling for edge computing based on repeated Stackelberg game

Organised crime groups in cyberspace: a typology

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking

scientific article published on 02 October 2019

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains

Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media

scholarly article by Zheng Xu et al published 9 February 2016 in EURASIP Journal on Wireless Communications and Networking

Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

scientific article published on 18 September 2014

Password-only authenticated three-party key exchange with provable security in the standard model.

scientific article published on 14 April 2014

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and S

scholarly article by Sheng Zhong et al published 2018 in IEEE Access

Performance prediction of parallel computing models to analyze cloud-based big data applications

Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds

Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data

scientific article published in 2022

Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions

scientific article published in 2017

Practicalm-k-Anonymization for Collaborative Data Publishing without Trusted Third Party

article by Jingyu Hua et al published 2017 in Security and Communication Networks

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails

Prediction-based association control scheme in dense femtocell networks.

scientific article

Privacy, accuracy, and model fairness trade-offs in federated learning

scientific article published in 2022

Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET

scientific article published on 06 January 2022

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems

scientific article published in 2022

Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things

scholarly article published August 2018

Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT

scientific article published in 2022

Privacy-Preserving Fast Authentication and Key Agreement for E-health Systems in IoT, based on Three-Factor Authentication

scientific article published in 2022

Privacy-Preserving Outsourced Calculation Toolkit in the Cloud

Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery

Privacy-Preserving Tensor Decomposition over Encrypted Data in a Federated Cloud Environment

Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT

scientific article published in 2022

Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things

scientific article published in 2022

Privacy-aware smart city: A case study in collaborative filtering recommender systems

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud

Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images

scientific article published in 2020

Process Memory Investigation Of The Bitcoin Clients Electrum And Bitcoin Core

journal article from 'IEEE Access' published in 2017

Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment

Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.

scientific article published on 2 September 2014

QRFence: A flexible and scalable QR link security detection framework for Android devices

Query-efficient label-only attacks against black-box machine learning models

scientific article published in 2020

Quick Analysis of Digital Forensic Data

book section published in 2018

R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity

scientific article published in 2020

Ranked Keyword Search over Encrypted Cloud Data Through Machine Learning Method

scientific article published in 2022

Reliable Inversion in GF(28) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures

Remote Wiping and Secure Deletion on Mobile Devices: A Review

scientific article published on 21 September 2016

Reputation-Based Investment Helps to Optimize Group Behaviors in Spatial Lattice Networks.

scientific article

Resilient interconnection in cyber-physical control systems

scientific article published in 2017

Rethinking Authentication on Smart Mobile Devices

Rethinking maximum-margin softmax for adversarial robustness

scientific article published in 2022

SCS-WoT: Secure Communication Scheme for Web of Things Deployment

scientific article published on 14 December 2021

SDTE: A Secure Blockchain-Based Data Trading Ecosystem

scientific article published in 2020

SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing

scholarly article by Wei Ren published in November 2017

SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system

scientific article published in 2020

Secure Key Agreement and Key Protection for Mobile Device User Authentication

Secure Range Search over Encrypted Uncertain IoT Outsourced Data

Secure Semantic-Aware Search Over Dynamic Spatial Data in VANETs

scientific article published in 2021

Secure and Efficient ${K}$ Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem

scientific article published on 02 August 2019

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

scholarly article by Debiao He et al published 2018 in IEEE Transactions on Dependable and Secure Computing

Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network

Secure outsourcing of modular exponentiations under single untrusted programme model

Secure policy execution using reusable garbled circuit in the cloud

Secure search for encrypted personal health records from big data NoSQL databases in cloud

scientific article published in 2019

Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography

scholarly article by Zhe Liu et al published February 2018 in IEEE Communications Magazine

Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps

Security and Privacy Challenges for Internet-of-Things and Fog Computing

Security and Privacy for the Internet of Drones: Challenges and Solutions

Shellshock Vulnerability Exploitation and Mitigation: A Demonstration

article

Side-Channel Attack on a Protected RFID Card

Sidechain technologies in blockchain networks: An examination and state-of-the-art review

journal article from 'Journal of Network and Computer Applications' published in 2020

Signature-based three-factor authenticated key exchange for internet of things applications

Similarity Search for Encrypted Images in Secure Cloud Computing

scientific article published in 2022

Situational Crime Prevention and the Mitigation of Cloud Computing Threats

scholarly article by Chaz Vidal & Kim-Kwang Raymond Choo published 2018 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Smart vehicle forensics: Challenges and case study

journal article from 'Future Generation Computer Systems' published in 2018

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence – Part 1

scientific article published in 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence – Part 2

scientific article published in 2019

Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions

scientific article published in 2017

Special issue on cybersecurity in the critical infrastructure: Advances and future directions

Stag hunt and trust emergence in social networks

article by Lu Zhou et al published November 2018 in Future Generation Computer Systems

Stalking the stalkers – detecting and deterring stalking behaviours using technology: A review

scientific article published in 2017

Task aware hybrid DVFS for multi-core real-time systems using machine learning

scholarly article by Fakhruddin Muhammad Mahbub ul Islam et al published April 2018 in Information Sciences

Technical Requirements and Approaches in Personal Data Control

scientific article published on 25 August 2022

The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities

scientific article published on 21 March 2022

The convergence of new computing paradigms and big data analytics methodologies for online social networks

The cyber threat landscape: Challenges and future research directions

scientific article published in 2011

The importance of proofs of security for key establishment protocols

scientific article published in 2006

The role of national cybersecurity strategies on the improvement of cybersecurity education

scientific article published in 2022

The role of the adversary model in applied security research

Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication

Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing

scientific article published in 2022

Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT

scientific article published in 2022

Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks

article

Towards Better Ocular Recognition for Secure Real-World Applications

Towards Efficient Verifiable Boolean Search over Encrypted Cloud Data

scientific article published in 2021

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

scientific article published in 2017

Traceable and Controllable Encrypted Cloud Image Search in Multi-user Settings

scientific article published in 2020

Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT

scientific article published in 2022

Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security

scholarly article published July 2018

Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

scientific article published in 2015

Understanding the Trends in Blockchain Domain Through an Unsupervised Systematic Patent Analysis

scientific article published in 2023

Universal location referencing and homomorphic evaluation of geospatial query

scientific article published in 2021

User Relationship Classification of Facebook Messenger Mobile Data using WEKA

scholarly article by Amber Umair et al published 2018 in Lecture Notes in Computer Science

User influence analysis for Github developer social networks

article

VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-owner Multi-user Settings

scientific article published in 2021

VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things

scientific article published in 2020

VRFMS: Verifiable Ranked Fuzzy Multi-keyword Search over Encrypted Data

scientific article published in 2022

Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things

scientific article published in 2022

Verifiable Fuzzy Multi-keyword Search over Encrypted Data with Adaptive Security

scientific article published on 16 February 2022

Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-health System

scientific article published in 2023

Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage

scientific article published in 2022

Verifiable and Dynamic Multi-keyword Search over Encrypted Cloud Data Using Bitmap

scientific article published in 2021

Visual Question Authentication Protocol (VQAP)

Visualizing Digital Forensic Datasets: A Proof of Concept

scientific article

Walking on the Cloud: Gait Recognition, a Wearable Solution

What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps

scientific article published on 28 April 2020

Windows 7 Antiforensics: A Review and a Novel Approach

scientific article published on 2 February 2017

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies

scientific article