|
2022 Journal Article PrefaceKo, Ryan K. L., Xu, Yang and Crispo, Bruno (2022). Preface. Communications in Computer and Information Science, 1557 CCIS, v-vi. |
|
2022 Journal Article Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic ReviewHo, Heemeng, Ko, Ryan and Mazerolle, Lorraine (2022). Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review. Computers & Security, 115 102611, 1-24. doi: 10.1016/j.cose.2022.102611 |
|
2021 Journal Article Security and privacy in smart citiesVorakulpipat, Chalee, Ko, Ryan K. L., Li, Qi and Meddahi, Ahmed (2021). Security and privacy in smart cities. Security and Communication Networks, 2021 9830547, 1-2. doi: 10.1155/2021/9830547 |
|
2021 Journal Article Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart gridsCui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu (2021). Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids. IEEE Transactions on Smart Grid, 13 (2), 1658-1661. doi: 10.1109/tsg.2021.3132536 |
|
2021 Journal Article PrefaceThampi, Sabu M., Wang, Guojun, Rawat, Danda B., Ko, Ryan and Fan, Chun-I (2021). Preface. Communications in Computer and Information Science, 1364. |
|
2021 Journal Article Source authentication of distribution synchrophasors for cybersecurity of microgridsCui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041 |
|
2020 Journal Article Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offendersO’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9 |
|
2020 Journal Article Welcome Messages from IEEE TrustCom 2020 Program ChairsKo, Ryan, Alam Bhuiyan, Md Zakirul and Pan, Yi (2020). Welcome Messages from IEEE TrustCom 2020 Program Chairs. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 9343234. doi: 10.1109/TrustCom50675.2020.00006 |
|
2020 Journal Article Differentially private collaborative coupling learning for recommender systemsZhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930 |
|
2019 Journal Article Message from the guest editorsTakahashi, Takeshi, Roman Castro, Rodrigo, Silverajan, Bilhanan, Ko, Ryan K. L. and Tabet, Said (2019). Message from the guest editors. International Journal of Information Security, 19 (1), 1-2. doi: 10.1007/s10207-019-00472-9 |
|
2017 Journal Article Malware propagation and prevention model for time-varying community networks within software defined networksLiu, Lan, Ko, Ryan K. L., Ren, Guangming and Xu, Xiaoping (2017). Malware propagation and prevention model for time-varying community networks within software defined networks. Security and Communication Networks, 2017 2910310, 1-8. doi: 10.1155/2017/2910310 |
|
2017 Journal Article A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computingChase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626 |
|
2015 Journal Article PrefaceKo, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Preface. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. doi: 10.1016/B978-0-12-801595-7.09982-1 |
|
2014 Journal Article Special issue on trust and security in cloud computingKo, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7 (11), 2183-2184. doi: 10.1002/sec.1154 |
|
2014 Journal Article Special issue on advances in trust, security and privacy for wireless and mobile networksWu, Yulei, Ko, Ryan and Al-Dubai, Ahmed (2014). Special issue on advances in trust, security and privacy for wireless and mobile networks. Wireless Personal Communications, 75 (3), 1587-1589. doi: 10.1007/s11277-014-1649-7 |
|
2014 Journal Article TSP 2013: message from workshop chairsMin, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350 |
|
2014 Journal Article A toolkit for automating compliance in cloud computing servicesPapanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830 |
|
2014 Journal Article Computing Mod Without ModWill, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod. |
|
2012 Journal Article Understanding cloud failuresKo, Ryan K. L., Lee, Stephen S. G. and Rajan, Veerappa (2012). Understanding cloud failures. IEEE Spectrum, 49 (12), 84-84. doi: 10.1109/MSPEC.2012.6361788 |
|
2012 Journal Article Message from UbiSafe-2012 symposium chairsVasilakos, Athanasios V., Jiang, Webin, Martinez, Gregorio and Ko, Ryan K.L. (2012). Message from UbiSafe-2012 symposium chairs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 6296254 doi: 10.1109/TrustCom.2012.305 |