Skip to menu Skip to content Skip to footer

Featured

2018

Other Outputs

ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers

Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO.

ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers

2024

Other Outputs

PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes

Ho, Hee Meng, Ko, Ryan, Mazerolle, Lorraine and Miao, Cheng (2024). PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes. The University of Queensland. (Dataset) doi: 10.48610/71aa67b

PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes

2023

Other Outputs

Digital Service Transformation: Pathways to human and economic wellbeing: White paper

Andreassen, Tor W., Archibald, Gordon, Beekhuyzen, Jenine, Bongiovanni, Ivano, Brea, Edgar, Breidbach, Christoph, Burchill, Keith, Burgers, Henri, Cao, Selina, Coote, Len, Coram, Brendan, Cunningham, Claire, Feast, George, Field, Mitch, Ford, Jerad, Fouche, Leon, Gain, Alexandria, Gooding, Glen, Goyeneche Ramirez, David, Green, Teegan, Gschwind, Daniel, Hall, Thomas, Hartley, Nicole, Heinz, Daniel, Hine, Damian, Indulska, Marta, Kapernick, Brett, Kastelle, Tim, Ko, Ryan ... Zhang, Wenlu (2023). Digital Service Transformation: Pathways to human and economic wellbeing: White paper. Brisbane, QLD, Australia: The University of Queensland. doi: 10.14264/aed4918

Digital Service Transformation: Pathways to human and economic wellbeing: White paper

2023

Other Outputs

Discussion Paper: 2023-2030 Australian Cyber Security Strategy

Abeysooriya, Sasenka, Akhlaghpour, Saeed, Bongiovanni, Ivano, Dowsett, Dallas, Grotowski, Joseph, Holm, Mike, Kim, Dan, Ko, Ryan, Phillips, Andelka M., Slapnicar, Sergeja, Stockdale, David, Swinson, John, Thonon, Geoffroy, Utting, Mark, Walker-Munro, Brendan and Willoughby, Shannon (2023). Discussion Paper: 2023-2030 Australian Cyber Security Strategy. UQ CYBER and AUSCERT.

Discussion Paper: 2023-2030 Australian Cyber Security Strategy

2022

Other Outputs

Dataset for SCP Survey Paper published in the journal Computers & Security.

Ho, Hee Meng and Ko, Ryan (2022). Dataset for SCP Survey Paper published in the journal Computers & Security.. The University of Queensland. (Dataset) doi: 10.48610/213f95d

Dataset for SCP Survey Paper published in the journal Computers & Security.

2021

Other Outputs

Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific

Nabbs-Keller, G., Ko, R., Mackay, T., Salmawan, N. A., Widodo, W. N. and Reksoprodjo, A. H. S. (2021). Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific. Policy Futures Brisbane, Australia: The University of Queensland. doi: 10.14264/4364b42

Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific

2021

Other Outputs

Systems and methods for enhancing data provenance by logging kernel-level events

Ko, Ryan Kok Leong, Choi, Taejun and Anderson-Scott, Christian (2021). Systems and methods for enhancing data provenance by logging kernel-level events. WO2021038527A1.

Systems and methods for enhancing data provenance by logging kernel-level events

2020

Other Outputs

PrivColl: Practical Privacy-Preserving Collaborative Machine Learning

Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan KL (2020). PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.

PrivColl: Practical Privacy-Preserving Collaborative Machine Learning

2020

Other Outputs

Submission to Department of Foreign Affairs and Trade’s Cyber and Critical Technology Engagement Strategy

Nabbs-Keller, Greta, Ko, Ryan, Axelsen, Michael, Bongiovanni, Ivano, Dowsett, Dallas, Liivoja, Rain, Maher, Ray, Massingham, Eve, McEwan, Chris, McKenzie, Simon, O’Quinn, Richard, Radke, Amelia and Williams, John (2020). Submission to Department of Foreign Affairs and Trade’s Cyber and Critical Technology Engagement Strategy. Brisbane, QLD, Australia: The University of Queensland.

Submission to Department of Foreign Affairs and Trade’s Cyber and Critical Technology Engagement Strategy

2020

Other Outputs

Dataset of data breaches and ransomware attacks over 15 years from 2004

Tsen, Elinor, Ko, Ryan and Slapnicar, Sergeja (2020). Dataset of data breaches and ransomware attacks over 15 years from 2004. The University of Queensland. (Dataset) doi: 10.14264/dfe5027

Dataset of data breaches and ransomware attacks over 15 years from 2004

2019

Other Outputs

A matter of security, privacy and trust: a study of the principles and values of encryption in New Zealand

Dizon, Michael, Ko, Ryan, Rumbles, Wayne, Gonzalez, Patricia, McHugh, Philip and Meehan, Anthony (2019). A matter of security, privacy and trust: a study of the principles and values of encryption in New Zealand. NZ Law Foundation: NZ Law Foundation.

A matter of security, privacy and trust: a study of the principles and values of encryption in New Zealand

2019

Other Outputs

Security systems, methods and devices

Ko, Ryan Kok Leong , Choi, Taejun and Anderson-Scott, Christian (2019). Security systems, methods and devices. 756876.

Security systems, methods and devices

2018

Other Outputs

Towards one global privacy law

Ryan Ko, Mark Rodrigues, Aleksey Ladur and Craig Scoon (2018, 01 04). Towards one global privacy law AsiaGlobal Online

Towards one global privacy law

2017

Other Outputs

Turning the tide with cyber toolmakers

Ko, Ryan (2017, 09 01). Turning the tide with cyber toolmakers The National Business Review (NZ) 101-127.

Turning the tide with cyber toolmakers

2017

Other Outputs

Opinion: ransomware attack needs global solution

Burton, Joe and Ko, Ryan (2017, 05 22). Opinion: ransomware attack needs global solution Waikato Times 1-1.

Opinion: ransomware attack needs global solution

2014

Other Outputs

Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.

Benzie, Julie, McCarter, Dale and Ko, Ryan (2014). Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.. New Zealand: Vodafone NZ.

Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.

2013

Other Outputs

Determining file allocation based on file operations

Tan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2.

Determining file allocation based on file operations

2013

Other Outputs

Cloud computing vulnerability incidents: a statistical overview

Ko, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance.

Cloud computing vulnerability incidents: a statistical overview

2013

Other Outputs

Tracing data block operations

Suen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1.

Tracing data block operations

2013

Other Outputs

Tracing operations in a cloud system

Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.

Tracing operations in a cloud system