Skip to menu Skip to content Skip to footer

2021

Journal Article

Preface

Thampi, Sabu M., Wang, Guojun, Rawat, Danda B., Ko, Ryan and Fan, Chun-I (2021). Preface. Communications in Computer and Information Science, 1364.

Preface

Featured

2021

Journal Article

Source authentication of distribution synchrophasors for cybersecurity of microgrids

Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041

Source authentication of distribution synchrophasors for cybersecurity of microgrids

2020

Journal Article

Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders

O’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9

Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders

2020

Journal Article

Welcome Messages from IEEE TrustCom 2020 Program Chairs

Ko, Ryan, Alam Bhuiyan, Md Zakirul and Pan, Yi (2020). Welcome Messages from IEEE TrustCom 2020 Program Chairs. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 9343234. doi: 10.1109/TrustCom50675.2020.00006

Welcome Messages from IEEE TrustCom 2020 Program Chairs

2020

Journal Article

Differentially private collaborative coupling learning for recommender systems

Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930

Differentially private collaborative coupling learning for recommender systems

2019

Journal Article

Message from the guest editors

Takahashi, Takeshi, Roman Castro, Rodrigo, Silverajan, Bilhanan, Ko, Ryan K. L. and Tabet, Said (2019). Message from the guest editors. International Journal of Information Security, 19 (1), 1-2. doi: 10.1007/s10207-019-00472-9

Message from the guest editors

2017

Journal Article

Malware propagation and prevention model for time-varying community networks within software defined networks

Liu, Lan, Ko, Ryan K. L., Ren, Guangming and Xu, Xiaoping (2017). Malware propagation and prevention model for time-varying community networks within software defined networks. Security and Communication Networks, 2017 2910310, 1-8. doi: 10.1155/2017/2910310

Malware propagation and prevention model for time-varying community networks within software defined networks

2017

Journal Article

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

2015

Journal Article

Preface

Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Preface. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. doi: 10.1016/B978-0-12-801595-7.09982-1

Preface

2014

Journal Article

Special issue on trust and security in cloud computing

Ko, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7 (11), 2183-2184. doi: 10.1002/sec.1154

Special issue on trust and security in cloud computing

2014

Journal Article

Special issue on advances in trust, security and privacy for wireless and mobile networks

Wu, Yulei, Ko, Ryan and Al-Dubai, Ahmed (2014). Special issue on advances in trust, security and privacy for wireless and mobile networks. Wireless Personal Communications, 75 (3), 1587-1589. doi: 10.1007/s11277-014-1649-7

Special issue on advances in trust, security and privacy for wireless and mobile networks

2014

Journal Article

TSP 2013: message from workshop chairs

Min, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350

TSP 2013: message from workshop chairs

2014

Journal Article

A toolkit for automating compliance in cloud computing services

Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830

A toolkit for automating compliance in cloud computing services

2014

Journal Article

Computing Mod Without Mod

Will, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod.

Computing Mod Without Mod

2012

Journal Article

Understanding cloud failures

Ko, Ryan K. L., Lee, Stephen S. G. and Rajan, Veerappa (2012). Understanding cloud failures. IEEE Spectrum, 49 (12), 84-84. doi: 10.1109/MSPEC.2012.6361788

Understanding cloud failures

2012

Journal Article

Message from UbiSafe-2012 symposium chairs

Vasilakos, Athanasios V., Jiang, Webin, Martinez, Gregorio and Ko, Ryan K.L. (2012). Message from UbiSafe-2012 symposium chairs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 6296254 doi: 10.1109/TrustCom.2012.305

Message from UbiSafe-2012 symposium chairs

2012

Journal Article

How to track your data: Rule-based data provenance tracing algorithms

Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: Rule-based data provenance tracing algorithms. HP Laboratories Technical Report (109)

How to track your data: Rule-based data provenance tracing algorithms

2012

Journal Article

Tracking of data leaving the cloud

Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. HP Laboratories Technical Report (108)

Tracking of data leaving the cloud

2012

Journal Article

Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation

Ko, Ryan K. L., Lee, E. W. and Lee, S. G. (2012). Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation. IEEE Transactions on Services Computing, 5 (2) 5989787, 246-259. doi: 10.1109/TSC.2011.48

Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation

2012

Journal Article

How to track your data: The case for cloud computing provenance

Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K L and Lee, Bu Sung (2012). How to track your data: The case for cloud computing provenance. HP Laboratories Technical Report (11).

How to track your data: The case for cloud computing provenance