2024 Book Chapter Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation ApproachHan, Kun, Koay, Abigail, Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2024). Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach. Lecture Notes in Computer Science. (pp. 293-307) Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-1242-0_22 |
2024 Book Chapter AI for designing responsible and resilient food systemsKo, Ryan, Gain, Alexandria, Bongiovanni, Ivano, Browne, Will, Jarkas, Omar, Uhlmann, Kora and Viller, Stephen (2024). AI for designing responsible and resilient food systems. Food AI: A game changer for Australia’s food and beverage sector. (pp. 69-78) edited by Janet R. McColl-Kennedy and Damian Hine. Brisbane, QLD, Australia: The University of Queensland, Australia's Food and Beverage Accelerator (FaBA). doi: 10.14264/f5f35d0 |
2023 Book Chapter Preserving the privacy and cybersecurity of home energy dataBean, Richard, Zhang, Yanjun, Ko, Ryan K. L., Mao, Xinyu and Bai, Guangdong (2023). Preserving the privacy and cybersecurity of home energy data. Emerging trends in cybersecurity applications. (pp. 323-343) edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples and Nour El Madhoun. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-031-09640-2_14 |
2020 Book Chapter Cyber autonomy: automating the hacker – self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national securityKo, Ryan K. L. (2020). Cyber autonomy: automating the hacker – self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national security. Emerging technologies and international security: machines, the state, and war. (pp. 173-191) edited by Reuben Steff, Joe Burton and Simona R. Soare. London, United Kingdom: Routledge. |
2018 Book Chapter Data Provenance for Big Data Security and AccountabilityPhua, Thye Way and Ko, Ryan K. L. (2018). Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies. (pp. 1-6) Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-63962-8_237-1 |
2017 Book Chapter Security visualization for cloud computing: an overviewGarae, Jeffery, Ko, Ryan K. and Apperley, Mark (2017). Security visualization for cloud computing: an overview. Data security in cloud computing. (pp. 277-295) edited by Vimal Kumar , Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch13 |
2017 Book Chapter Data provenance in cloudYu Shyang Tan, Alan, Chaisiri, Sivadon, Leong, Ryan Ko, Holmes, Geoff and Rogers, Bill (2017). Data provenance in cloud. Data security in cloud computing. (pp. 261-275) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch12 |
2017 Book Chapter Visualization and data provenance trends in decision support for cybersecurityGarae, Jeffery and Ko, Ryan K. L. (2017). Visualization and data provenance trends in decision support for cybersecurity. Data analytics and decision support for cybersecurity: trends, methodologies and applications. (pp. 243-270) edited by Iván Palomares Carrascosa, Harsha Kumara Kalutarage and Yan Huang. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-59439-2_9 |
2017 Book Chapter The Waikato Data Privacy MatrixScoon, Craig and Ko, Ryan K. L. (2017). The Waikato Data Privacy Matrix. Data security in cloud computing. (pp. 243-259) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch11 |
2017 Book Chapter Distributing encoded data for private processing in the cloudWill, Mark A. and Ko, Ryan K. L. (2017). Distributing encoded data for private processing in the cloud. Data security in cloud computing. (pp. 89-115) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch5 |
2017 Book Chapter A data-centric view of cloud securityKumar, Vimal, Chaisiri, Sivadon and Ko, Ryan (2017). A data-centric view of cloud security. Data security in cloud computing. (pp. 1-17) Hertfordshire, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch1 |
2015 Book Chapter Provenance for cloud data accountabilityTan, Alan Y. S., Ko, Ryan K. L., Holmes, Geoff and Rogers, Bill (2015). Provenance for cloud data accountability. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. (pp. 171-185) Waltham, MA United States: Elsevier. doi: 10.1016/B978-0-12-801595-7.00008-2 |
2015 Book Chapter Cloud security ecosystemKo, Ryan K. L. and Choo, Kim-Kwang Raymond (2015). Cloud security ecosystem. The cloud security ecosystem: technical, legal, business and management issues. (pp. 1-14) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00001-X |
2015 Book Chapter Security as a service (SecaaS)—An overviewDelamore, Baden and Ko, Ryan K. L. (2015). Security as a service (SecaaS)—An overview. The Cloud Security Ecosystem. (pp. 187-203) Waltham, MA United States: Elsevier. doi: 10.1016/b978-0-12-801595-7.00009-4 |
2015 Book Chapter A guide to homomorphic encryptionWill, Mark A. and Ko, Ryan K. L. (2015). A guide to homomorphic encryption. The cloud security ecosystem: technical, legal, business and management issues. (pp. 101-127) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00005-7 |
2014 Book Chapter Data accountability in cloud systemsKo, Ryan K. L. (2014). Data accountability in cloud systems. Security, privacy and trust in cloud systems. (pp. 211-238) edited by Surya Nepal and Mukaddim Pathan. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-38586-5_7 |