2018 Other Outputs ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized serversKo, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO. |
2024 Other Outputs The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030Ko, Ryan (2024). The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030. Seoul, Republic of Korea: Korea on Point. |
2024 Other Outputs PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent CybercrimesHo, Hee Meng, Ko, Ryan, Mazerolle, Lorraine and Miao, Cheng (2024). PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes. The University of Queensland. (Dataset) doi: 10.48610/71aa67b |
2023 Other Outputs Digital Service Transformation: Pathways to human and economic wellbeing: White paperAndreassen, Tor W., Archibald, Gordon, Beekhuyzen, Jenine, Bongiovanni, Ivano, Brea, Edgar, Breidbach, Christoph, Burchill, Keith, Burgers, Henri, Cao, Selina, Coote, Len, Coram, Brendan, Cunningham, Claire, Feast, George, Field, Mitch, Ford, Jerad, Fouche, Leon, Gain, Alexandria, Gooding, Glen, Goyeneche Ramirez, David, Green, Teegan, Gschwind, Daniel, Hall, Thomas, Hartley, Nicole, Heinz, Daniel, Hine, Damian, Indulska, Marta, Kapernick, Brett, Kastelle, Tim, Ko, Ryan ... Zhang, Wenlu (2023). Digital Service Transformation: Pathways to human and economic wellbeing: White paper. Brisbane, QLD, Australia: The University of Queensland. doi: 10.14264/aed4918 |
2023 Other Outputs Discussion Paper: 2023-2030 Australian Cyber Security StrategyAbeysooriya, Sasenka, Akhlaghpour, Saeed, Bongiovanni, Ivano, Dowsett, Dallas, Grotowski, Joseph, Holm, Mike, Kim, Dan, Ko, Ryan, Phillips, Andelka M., Slapnicar, Sergeja, Stockdale, David, Swinson, John, Thonon, Geoffroy, Utting, Mark, Walker-Munro, Brendan and Willoughby, Shannon (2023). Discussion Paper: 2023-2030 Australian Cyber Security Strategy. UQ CYBER and AUSCERT. |
2022 Other Outputs Dataset for SCP Survey Paper published in the journal Computers & Security.Ho, Hee Meng and Ko, Ryan (2022). Dataset for SCP Survey Paper published in the journal Computers & Security.. The University of Queensland. (Dataset) doi: 10.48610/213f95d |
2021 Other Outputs Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the PacificNabbs-Keller, G., Ko, R., Mackay, T., Salmawan, N. A., Widodo, W. N. and Reksoprodjo, A. H. S. (2021). Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific. Policy Futures Brisbane, Australia: The University of Queensland. doi: 10.14264/4364b42 |
2021 Other Outputs Systems and methods for enhancing data provenance by logging kernel-level eventsKo, Ryan Kok Leong, Choi, Taejun and Anderson-Scott, Christian (2021). Systems and methods for enhancing data provenance by logging kernel-level events. WO2021038527A1. |
2020 Other Outputs PrivColl: Practical Privacy-Preserving Collaborative Machine LearningZhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan KL (2020). PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. |
2020 Other Outputs Submission to Department of Foreign Affairs and Trade’s Cyber and Critical Technology Engagement StrategyNabbs-Keller, Greta, Ko, Ryan, Axelsen, Michael, Bongiovanni, Ivano, Dowsett, Dallas, Liivoja, Rain, Maher, Ray, Massingham, Eve, McEwan, Chris, McKenzie, Simon, O’Quinn, Richard, Radke, Amelia and Williams, John (2020). Submission to Department of Foreign Affairs and Trade’s Cyber and Critical Technology Engagement Strategy. Brisbane, QLD, Australia: The University of Queensland. |
2020 Other Outputs Dataset of data breaches and ransomware attacks over 15 years from 2004Tsen, Elinor, Ko, Ryan and Slapnicar, Sergeja (2020). Dataset of data breaches and ransomware attacks over 15 years from 2004. The University of Queensland. (Dataset) doi: 10.14264/dfe5027 |
2019 Other Outputs A matter of security, privacy and trust: a study of the principles and values of encryption in New ZealandDizon, Michael, Ko, Ryan, Rumbles, Wayne, Gonzalez, Patricia, McHugh, Philip and Meehan, Anthony (2019). A matter of security, privacy and trust: a study of the principles and values of encryption in New Zealand. NZ Law Foundation: NZ Law Foundation. |
2019 Other Outputs Security systems, methods and devicesKo, Ryan Kok Leong , Choi, Taejun and Anderson-Scott, Christian (2019). Security systems, methods and devices. 756876. |
2018 Other Outputs Towards one global privacy lawRyan Ko, Mark Rodrigues, Aleksey Ladur and Craig Scoon (2018, 01 04). Towards one global privacy law AsiaGlobal Online |
2017 Other Outputs Turning the tide with cyber toolmakersKo, Ryan (2017, 09 01). Turning the tide with cyber toolmakers The National Business Review (NZ) 101-127. |
2017 Other Outputs Opinion: ransomware attack needs global solutionBurton, Joe and Ko, Ryan (2017, 05 22). Opinion: ransomware attack needs global solution Waikato Times 1-1. |
2014 Other Outputs Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.Benzie, Julie, McCarter, Dale and Ko, Ryan (2014). Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.. New Zealand: Vodafone NZ. |
2013 Other Outputs Determining file allocation based on file operationsTan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2. |
2013 Other Outputs Cloud computing vulnerability incidents: a statistical overviewKo, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance. |
2013 Other Outputs Tracing data block operationsSuen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1. |