Skip to menu Skip to content Skip to footer

2022

Journal Article

Preface

Ko, Ryan K. L., Xu, Yang and Crispo, Bruno (2022). Preface. Communications in Computer and Information Science, 1557 CCIS, v-vi.

Preface

2021

Journal Article

Security and privacy in smart cities

Vorakulpipat, Chalee, Ko, Ryan K. L., Li, Qi and Meddahi, Ahmed (2021). Security and privacy in smart cities. Security and Communication Networks, 2021 9830547, 1-2. doi: 10.1155/2021/9830547

Security and privacy in smart cities

2021

Journal Article

Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids

Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu (2021). Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids. IEEE Transactions on Smart Grid, 13 (2), 1658-1661. doi: 10.1109/tsg.2021.3132536

Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids

2021

Journal Article

Preface

Thampi, Sabu M., Wang, Guojun, Rawat, Danda B., Ko, Ryan and Fan, Chun-I (2021). Preface. Communications in Computer and Information Science, 1364.

Preface

2020

Journal Article

Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders

O’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9

Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders

2020

Journal Article

Welcome Messages from IEEE TrustCom 2020 Program Chairs

Ko, Ryan, Alam Bhuiyan, Md Zakirul and Pan, Yi (2020). Welcome Messages from IEEE TrustCom 2020 Program Chairs. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 9343234. doi: 10.1109/TrustCom50675.2020.00006

Welcome Messages from IEEE TrustCom 2020 Program Chairs

2019

Journal Article

Message from the guest editors

Takahashi, Takeshi, Roman Castro, Rodrigo, Silverajan, Bilhanan, Ko, Ryan K. L. and Tabet, Said (2019). Message from the guest editors. International Journal of Information Security, 19 (1), 1-2. doi: 10.1007/s10207-019-00472-9

Message from the guest editors

2017

Journal Article

Malware propagation and prevention model for time-varying community networks within software defined networks

Liu, Lan, Ko, Ryan K. L., Ren, Guangming and Xu, Xiaoping (2017). Malware propagation and prevention model for time-varying community networks within software defined networks. Security and Communication Networks, 2017 2910310, 1-8. doi: 10.1155/2017/2910310

Malware propagation and prevention model for time-varying community networks within software defined networks

2015

Journal Article

Preface

Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Preface. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. doi: 10.1016/B978-0-12-801595-7.09982-1

Preface

2014

Journal Article

Special issue on trust and security in cloud computing

Ko, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7 (11), 2183-2184. doi: 10.1002/sec.1154

Special issue on trust and security in cloud computing

2014

Journal Article

Special issue on advances in trust, security and privacy for wireless and mobile networks

Wu, Yulei, Ko, Ryan and Al-Dubai, Ahmed (2014). Special issue on advances in trust, security and privacy for wireless and mobile networks. Wireless Personal Communications, 75 (3), 1587-1589. doi: 10.1007/s11277-014-1649-7

Special issue on advances in trust, security and privacy for wireless and mobile networks

2014

Journal Article

Computing Mod Without Mod

Will, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod.

Computing Mod Without Mod

2014

Journal Article

TSP 2013: message from workshop chairs

Min, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350

TSP 2013: message from workshop chairs

2014

Journal Article

A toolkit for automating compliance in cloud computing services

Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830

A toolkit for automating compliance in cloud computing services

2012

Journal Article

Understanding cloud failures

Ko, Ryan K. L., Lee, Stephen S. G. and Rajan, Veerappa (2012). Understanding cloud failures. IEEE Spectrum, 49 (12), 84-84. doi: 10.1109/MSPEC.2012.6361788

Understanding cloud failures

2012

Journal Article

Message from UbiSafe-2012 symposium chairs

Vasilakos, Athanasios V., Jiang, Webin, Martinez, Gregorio and Ko, Ryan K.L. (2012). Message from UbiSafe-2012 symposium chairs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 6296254 doi: 10.1109/TrustCom.2012.305

Message from UbiSafe-2012 symposium chairs

2012

Journal Article

Tracking of data leaving the cloud

Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. HP Laboratories Technical Report (108)

Tracking of data leaving the cloud

2012

Journal Article

How to track your data: Rule-based data provenance tracing algorithms

Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: Rule-based data provenance tracing algorithms. HP Laboratories Technical Report (109)

How to track your data: Rule-based data provenance tracing algorithms

2012

Journal Article

Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation

Ko, Ryan K. L., Lee, E. W. and Lee, S. G. (2012). Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation. IEEE Transactions on Services Computing, 5 (2) 5989787, 246-259. doi: 10.1109/TSC.2011.48

Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation

2012

Journal Article

How to track your data: The case for cloud computing provenance

Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K L and Lee, Bu Sung (2012). How to track your data: The case for cloud computing provenance. HP Laboratories Technical Report (11).

How to track your data: The case for cloud computing provenance