Skip to menu Skip to content Skip to footer

2022

Journal Article

Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data

Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L. (2022). Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data. IEEE Transactions on Smart Grid, 13 (6), 1-4. doi: 10.1109/tsg.2022.3207066

Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data

Featured

2022

Journal Article

Preserving privacy for distributed genome-wide analysis against identity tracing attacks

Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672

Preserving privacy for distributed genome-wide analysis against identity tracing attacks

2022

Journal Article

An exploratory study of organizational cyber resilience, its precursors and outcomes

Tsen, Elinor, Ko, Ryan K. L. and Slapnicar, Sergeja (2022). An exploratory study of organizational cyber resilience, its precursors and outcomes. Journal of Organizational Computing and Electronic Commerce, 32 (2), 1-22. doi: 10.1080/10919392.2022.2068906

An exploratory study of organizational cyber resilience, its precursors and outcomes

2022

Journal Article

Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review

Ho, Heemeng, Ko, Ryan and Mazerolle, Lorraine (2022). Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review. Computers & Security, 115 102611, 1-24. doi: 10.1016/j.cose.2022.102611

Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review

2021

Journal Article

Source authentication of distribution synchrophasors for cybersecurity of microgrids

Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041

Source authentication of distribution synchrophasors for cybersecurity of microgrids

2020

Journal Article

Differentially private collaborative coupling learning for recommender systems

Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930

Differentially private collaborative coupling learning for recommender systems

2017

Journal Article

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

2025

Journal Article

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

Han, Kun, Koay, Abigail M. Y., Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2025). Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data. Frontiers of Computer Science, 19 (8) 198340. doi: 10.1007/s11704-024-40449-z

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

2025

Journal Article

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

Joshi, Chaitanya, Slapničar, Sergeja, Yang, Jinming and Ko, Ryan (2025). Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory. Computers and Security, 154 104450, 1-14. doi: 10.1016/j.cose.2025.104450

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

2025

Journal Article

A container security survey: exploits, attacks, and defenses

Jarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A container security survey: exploits, attacks, and defenses. ACM Computing Surveys, 57 (7) 170, 1-36. doi: 10.1145/3715001

A container security survey: exploits, attacks, and defenses

2024

Journal Article

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes

Ho, Heemeng, Ko, Ryan, Mazerolle, Lorraine, Gilmour, John and Miao, Cheng (2024). Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. Journal of Cybersecurity, 10 (1) tyae020. doi: 10.1093/cybsec/tyae020

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes

2024

Journal Article

Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study

Ho, Heemeng, Gilmour, John, Mazerolle, Lorraine and Ko, Ryan (2024). Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study. Security Journal, 37 (1), 129-152. doi: 10.1057/s41284-023-00371-8

Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study

2023

Journal Article

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

Wang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun and Zhang, Yanjun (2023). Evasion attack and defense on machine learning models in cyber-physical systems: a survey. IEEE Communications Surveys and Tutorials, 26 (2), 930-966. doi: 10.1109/comst.2023.3344808

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

2023

Journal Article

ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification

Jarkas, Omar, Hall, Josh, Smith, Stuart, Mahmud, Redowan, Khojasteh, Parham, Scarsbrook, Joshua and Ko, Ryan K.L. (2023). ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Engineering Applications of Artificial Intelligence, 125 106679, 106679. doi: 10.1016/j.engappai.2023.106679

ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification

2023

Journal Article

Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact

Bingley, William J., Haslam, S. Alexander, Steffens, Niklas K., Gillespie, Nicole, Worthy, Peter, Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Ko, Ryan K.L. and Wiles, Janet (2023). Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact. New Ideas in Psychology, 70 101025, 1-12. doi: 10.1016/j.newideapsych.2023.101025

Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact

2023

Journal Article

Where is the human in human-centered AI? Insights from developer priorities and user experiences

Bingley, William J., Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Gillespie, Nicole, Haslam, S. Alexander, Ko, Ryan K.L., Steffens, Niklas, Wiles, Janet and Worthy, Peter (2023). Where is the human in human-centered AI? Insights from developer priorities and user experiences. Computers in Human Behavior, 141 107617, 1-8. doi: 10.1016/j.chb.2022.107617

Where is the human in human-centered AI? Insights from developer priorities and user experiences

2023

Journal Article

Realizing credible remote agricultural auditing with trusted video technology

Mahmud, Redowan, Scarsbrook, Joshua D., Ko, Ryan K. L., Jarkas, Omar, Hall, Josh, Smith, Stuart and Marshall, Jonathan (2023). Realizing credible remote agricultural auditing with trusted video technology. Journal of Cybersecurity, 9 (1) tyad012. doi: 10.1093/cybsec/tyad012

Realizing credible remote agricultural auditing with trusted video technology

2022

Journal Article

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges

Koay, Abigail M. Y., Ko, Ryan K. L, Hettema, Hinne and Radke, Kenneth (2022). Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. Journal of Intelligent Information Systems, 60 (2), 1-29. doi: 10.1007/s10844-022-00753-1

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges

2022

Journal Article

Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond

Cui, Laizhong, Wu, Yulei, Ko, Ryan, Ladur, Alex and Wu, Jianping (2022). Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond. ACM Transactions on Sensor Networks, 18 (3) 40e, 1-3. doi: 10.1145/3538515

Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond

2022

Journal Article

Editorial: Human-centric security and privacy

Nepal, Surya, Ko, Ryan K. L., Grobler, Marthie and Camp, L. Jean (2022). Editorial: Human-centric security and privacy. Frontiers in Big Data, 5 848058, 848058. doi: 10.3389/fdata.2022.848058

Editorial: Human-centric security and privacy