2022 Journal Article PrefaceKo, Ryan K. L., Xu, Yang and Crispo, Bruno (2022). Preface. Communications in Computer and Information Science, 1557 CCIS, v-vi. |
2021 Journal Article Security and privacy in smart citiesVorakulpipat, Chalee, Ko, Ryan K. L., Li, Qi and Meddahi, Ahmed (2021). Security and privacy in smart cities. Security and Communication Networks, 2021 9830547, 1-2. doi: 10.1155/2021/9830547 |
2021 Journal Article Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart gridsCui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu (2021). Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids. IEEE Transactions on Smart Grid, 13 (2), 1658-1661. doi: 10.1109/tsg.2021.3132536 |
2021 Journal Article PrefaceThampi, Sabu M., Wang, Guojun, Rawat, Danda B., Ko, Ryan and Fan, Chun-I (2021). Preface. Communications in Computer and Information Science, 1364. |
2020 Journal Article Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offendersO’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9 |
2020 Journal Article Welcome Messages from IEEE TrustCom 2020 Program ChairsKo, Ryan, Alam Bhuiyan, Md Zakirul and Pan, Yi (2020). Welcome Messages from IEEE TrustCom 2020 Program Chairs. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 9343234. doi: 10.1109/TrustCom50675.2020.00006 |
2019 Journal Article Message from the guest editorsTakahashi, Takeshi, Roman Castro, Rodrigo, Silverajan, Bilhanan, Ko, Ryan K. L. and Tabet, Said (2019). Message from the guest editors. International Journal of Information Security, 19 (1), 1-2. doi: 10.1007/s10207-019-00472-9 |
2017 Journal Article Malware propagation and prevention model for time-varying community networks within software defined networksLiu, Lan, Ko, Ryan K. L., Ren, Guangming and Xu, Xiaoping (2017). Malware propagation and prevention model for time-varying community networks within software defined networks. Security and Communication Networks, 2017 2910310, 1-8. doi: 10.1155/2017/2910310 |
2015 Journal Article PrefaceKo, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Preface. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. doi: 10.1016/B978-0-12-801595-7.09982-1 |
2014 Journal Article Special issue on trust and security in cloud computingKo, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7 (11), 2183-2184. doi: 10.1002/sec.1154 |
2014 Journal Article Special issue on advances in trust, security and privacy for wireless and mobile networksWu, Yulei, Ko, Ryan and Al-Dubai, Ahmed (2014). Special issue on advances in trust, security and privacy for wireless and mobile networks. Wireless Personal Communications, 75 (3), 1587-1589. doi: 10.1007/s11277-014-1649-7 |
2014 Journal Article Computing Mod Without ModWill, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod. |
2014 Journal Article TSP 2013: message from workshop chairsMin, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350 |
2014 Journal Article A toolkit for automating compliance in cloud computing servicesPapanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830 |
2012 Journal Article Understanding cloud failuresKo, Ryan K. L., Lee, Stephen S. G. and Rajan, Veerappa (2012). Understanding cloud failures. IEEE Spectrum, 49 (12), 84-84. doi: 10.1109/MSPEC.2012.6361788 |
2012 Journal Article Message from UbiSafe-2012 symposium chairsVasilakos, Athanasios V., Jiang, Webin, Martinez, Gregorio and Ko, Ryan K.L. (2012). Message from UbiSafe-2012 symposium chairs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 6296254 doi: 10.1109/TrustCom.2012.305 |
2012 Journal Article Tracking of data leaving the cloudTan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. HP Laboratories Technical Report (108) |
2012 Journal Article How to track your data: Rule-based data provenance tracing algorithmsZhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: Rule-based data provenance tracing algorithms. HP Laboratories Technical Report (109) |
2012 Journal Article Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulationKo, Ryan K. L., Lee, E. W. and Lee, S. G. (2012). Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation. IEEE Transactions on Services Computing, 5 (2) 5989787, 246-259. doi: 10.1109/TSC.2011.48 |
2012 Journal Article How to track your data: The case for cloud computing provenanceZhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K L and Lee, Bu Sung (2012). How to track your data: The case for cloud computing provenance. HP Laboratories Technical Report (11). |