2022 Journal Article Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor dataCui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L. (2022). Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data. IEEE Transactions on Smart Grid, 13 (6), 1-4. doi: 10.1109/tsg.2022.3207066 |
Featured 2022 Journal Article Preserving privacy for distributed genome-wide analysis against identity tracing attacksZhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672 |
2022 Journal Article An exploratory study of organizational cyber resilience, its precursors and outcomesTsen, Elinor, Ko, Ryan K. L. and Slapnicar, Sergeja (2022). An exploratory study of organizational cyber resilience, its precursors and outcomes. Journal of Organizational Computing and Electronic Commerce, 32 (2), 1-22. doi: 10.1080/10919392.2022.2068906 |
2022 Journal Article Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic ReviewHo, Heemeng, Ko, Ryan and Mazerolle, Lorraine (2022). Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review. Computers & Security, 115 102611, 1-24. doi: 10.1016/j.cose.2022.102611 |
2021 Journal Article Source authentication of distribution synchrophasors for cybersecurity of microgridsCui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041 |
2020 Journal Article Differentially private collaborative coupling learning for recommender systemsZhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930 |
2017 Journal Article A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computingChase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626 |
2025 Journal Article Adapting to the stream: an instance-attention GNN method for irregular multivariate time series dataHan, Kun, Koay, Abigail M. Y., Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2025). Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data. Frontiers of Computer Science, 19 (8) 198340. doi: 10.1007/s11704-024-40449-z |
2025 Journal Article Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theoryJoshi, Chaitanya, Slapničar, Sergeja, Yang, Jinming and Ko, Ryan (2025). Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory. Computers and Security, 154 104450, 1-14. doi: 10.1016/j.cose.2025.104450 |
2025 Journal Article A container security survey: exploits, attacks, and defensesJarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A container security survey: exploits, attacks, and defenses. ACM Computing Surveys, 57 (7) 170, 1-36. doi: 10.1145/3715001 |
2024 Journal Article Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimesHo, Heemeng, Ko, Ryan, Mazerolle, Lorraine, Gilmour, John and Miao, Cheng (2024). Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. Journal of Cybersecurity, 10 (1) tyae020. doi: 10.1093/cybsec/tyae020 |
2024 Journal Article Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental studyHo, Heemeng, Gilmour, John, Mazerolle, Lorraine and Ko, Ryan (2024). Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study. Security Journal, 37 (1), 129-152. doi: 10.1057/s41284-023-00371-8 |
2023 Journal Article Evasion attack and defense on machine learning models in cyber-physical systems: a surveyWang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun and Zhang, Yanjun (2023). Evasion attack and defense on machine learning models in cyber-physical systems: a survey. IEEE Communications Surveys and Tutorials, 26 (2), 930-966. doi: 10.1109/comst.2023.3344808 |
2023 Journal Article ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verificationJarkas, Omar, Hall, Josh, Smith, Stuart, Mahmud, Redowan, Khojasteh, Parham, Scarsbrook, Joshua and Ko, Ryan K.L. (2023). ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Engineering Applications of Artificial Intelligence, 125 106679, 106679. doi: 10.1016/j.engappai.2023.106679 |
2023 Journal Article Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impactBingley, William J., Haslam, S. Alexander, Steffens, Niklas K., Gillespie, Nicole, Worthy, Peter, Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Ko, Ryan K.L. and Wiles, Janet (2023). Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact. New Ideas in Psychology, 70 101025, 1-12. doi: 10.1016/j.newideapsych.2023.101025 |
2023 Journal Article Where is the human in human-centered AI? Insights from developer priorities and user experiencesBingley, William J., Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Gillespie, Nicole, Haslam, S. Alexander, Ko, Ryan K.L., Steffens, Niklas, Wiles, Janet and Worthy, Peter (2023). Where is the human in human-centered AI? Insights from developer priorities and user experiences. Computers in Human Behavior, 141 107617, 1-8. doi: 10.1016/j.chb.2022.107617 |
2023 Journal Article Realizing credible remote agricultural auditing with trusted video technologyMahmud, Redowan, Scarsbrook, Joshua D., Ko, Ryan K. L., Jarkas, Omar, Hall, Josh, Smith, Stuart and Marshall, Jonathan (2023). Realizing credible remote agricultural auditing with trusted video technology. Journal of Cybersecurity, 9 (1) tyad012. doi: 10.1093/cybsec/tyad012 |
2022 Journal Article Machine learning in industrial control system (ICS) security: current landscape, opportunities and challengesKoay, Abigail M. Y., Ko, Ryan K. L, Hettema, Hinne and Radke, Kenneth (2022). Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. Journal of Intelligent Information Systems, 60 (2), 1-29. doi: 10.1007/s10844-022-00753-1 |
2022 Journal Article Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and BeyondCui, Laizhong, Wu, Yulei, Ko, Ryan, Ladur, Alex and Wu, Jianping (2022). Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond. ACM Transactions on Sensor Networks, 18 (3) 40e, 1-3. doi: 10.1145/3538515 |
2022 Journal Article Editorial: Human-centric security and privacyNepal, Surya, Ko, Ryan K. L., Grobler, Marthie and Camp, L. Jean (2022). Editorial: Human-centric security and privacy. Frontiers in Big Data, 5 848058, 848058. doi: 10.3389/fdata.2022.848058 |