Skip to menu Skip to content Skip to footer

2025

Journal Article

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

Han, Kun, Koay, Abigail M. Y., Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2025). Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data. Frontiers of Computer Science, 19 (8) 198340. doi: 10.1007/s11704-024-40449-z

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

2025

Journal Article

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

Joshi, Chaitanya, Slapničar, Sergeja, Yang, Jinming and Ko, Ryan (2025). Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory. Computers and Security, 154 104450, 1-14. doi: 10.1016/j.cose.2025.104450

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

2025

Journal Article

A container security survey: exploits, attacks, and defenses

Jarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A container security survey: exploits, attacks, and defenses. ACM Computing Surveys, 57 (7) 170, 1-36. doi: 10.1145/3715001

A container security survey: exploits, attacks, and defenses

2025

Conference Publication

Intelligent data refinement and analysis of real-world cyber attacks on SCADA systems

Zhang, Wenlu, Dong, Naipeng, Choi, Taejun, Bai, Guangdong and Ko, Ryan K. L. (2025). Intelligent data refinement and analysis of real-world cyber attacks on SCADA systems. E-Energy '25: The 16th ACM International Conference on Future and Sustainable Energy Systems, Rotterdam, Netherlands, 17-20 June 2025. New York, NY USA: Association for Computing Machinery. doi: 10.1145/3679240.3734654

Intelligent data refinement and analysis of real-world cyber attacks on SCADA systems

2025

Conference Publication

Practical poisoning attacks with limited Byzantine clients in clustered federated learning

Vo, Viet, Ma, Mengyao, Bai, Guangdong, Ko, Ryan and Neplal, Surya (2025). Practical poisoning attacks with limited Byzantine clients in clustered federated learning. 2025 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, United States, 12-15 May 2025. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/sp61157.2025.00163

Practical poisoning attacks with limited Byzantine clients in clustered federated learning

2025

Book Chapter

Auditing the Auditor: Heuristics for Testing Password Auditing System Security

Choi, Taejun, van Niekerk, Daniel, Opaschi, Octav, Enache, Costin and Ko, Ryan K. L. (2025). Auditing the Auditor: Heuristics for Testing Password Auditing System Security. Communications in Computer and Information Science. (pp. 86-100) Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-4836-8_7

Auditing the Auditor: Heuristics for Testing Password Auditing System Security

2024

Conference Publication

Mining irregular time series data with noisy labels: A risk estimation approach

Han, Kun, Koay, Abigail, Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2024). Mining irregular time series data with noisy labels: A risk estimation approach. 35th Australasian Database Conference, ADC 2024, Gold Coast, QLD Australia, 16–18 December 2024. Singapore: Springer. doi: 10.1007/978-981-96-1242-0_22

Mining irregular time series data with noisy labels: A risk estimation approach

2024

Journal Article

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes

Ho, Heemeng, Ko, Ryan, Mazerolle, Lorraine, Gilmour, John and Miao, Cheng (2024). Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. Journal of Cybersecurity, 10 (1) tyae020, 1-33. doi: 10.1093/cybsec/tyae020

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes

2024

Other Outputs

The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030

Ko, Ryan (2024). The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030. Seoul, Republic of Korea: Korea on Point.

The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030

2024

Conference Publication

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

Zhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

2024

Book Chapter

AI for designing responsible and resilient food systems

Ko, Ryan, Gain, Alexandria, Bongiovanni, Ivano, Browne, Will, Jarkas, Omar, Uhlmann, Kora and Viller, Stephen (2024). AI for designing responsible and resilient food systems. Food AI: A game changer for Australia’s food and beverage sector. (pp. 69-78) edited by Janet R. McColl-Kennedy and Damian Hine. Brisbane, QLD, Australia: The University of Queensland, Australia's Food and Beverage Accelerator (FaBA). doi: 10.14264/f5f35d0

AI for designing responsible and resilient food systems

2024

Conference Publication

Scp-bp framework: situational crime prevention for managing data breaches in business processes

Miao, Cheng, Ho, Heemeng, Tsen, Elinor, Gilmour, John and Ko, Ryan K. L. (2024). Scp-bp framework: situational crime prevention for managing data breaches in business processes. Business Process Management 22nd International Conference, BPM 2024, Krakow, Poland, 1-6 September 2024. Cham, Switzerland: Springer Nature Switzerland. doi: 10.1007/978-3-031-70396-6_26

Scp-bp framework: situational crime prevention for managing data breaches in business processes

2024

Journal Article

Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study

Ho, Heemeng, Gilmour, John, Mazerolle, Lorraine and Ko, Ryan (2024). Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study. Security Journal, 37 (1), 129-152. doi: 10.1057/s41284-023-00371-8

Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study

2024

Other Outputs

PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes

Ho, Hee Meng, Ko, Ryan, Mazerolle, Lorraine and Miao, Cheng (2024). PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes. The University of Queensland. (Dataset) doi: 10.48610/71aa67b

PRISMA Results for Using Situational Crime Prevention (SCP)-C3 Cycle and Common Inventory of Cybersecurity Controls from ISO/IEC 27002:2022 to Prevent Cybercrimes

2023

Journal Article

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

Wang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun and Zhang, Yanjun (2023). Evasion attack and defense on machine learning models in cyber-physical systems: a survey. IEEE Communications Surveys and Tutorials, 26 (2), 930-966. doi: 10.1109/comst.2023.3344808

Evasion attack and defense on machine learning models in cyber-physical systems: a survey

2023

Journal Article

ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification

Jarkas, Omar, Hall, Josh, Smith, Stuart, Mahmud, Redowan, Khojasteh, Parham, Scarsbrook, Joshua and Ko, Ryan K.L. (2023). ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Engineering Applications of Artificial Intelligence, 125 106679, 106679. doi: 10.1016/j.engappai.2023.106679

ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification

2023

Journal Article

Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact

Bingley, William J., Haslam, S. Alexander, Steffens, Niklas K., Gillespie, Nicole, Worthy, Peter, Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Ko, Ryan K.L. and Wiles, Janet (2023). Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact. New Ideas in Psychology, 70 101025, 1-12. doi: 10.1016/j.newideapsych.2023.101025

Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact

2023

Conference Publication

A framework for user-centric visualisation of blockchain transactions in critical infrastructure

Jeyakumar, Samantha Tharani, Ko, Ryan and Muthukkumarasamy, Vallipuram (2023). A framework for user-centric visualisation of blockchain transactions in critical infrastructure. BSCI '23: Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Melbourne, VIC, Australia, 10 - 14 July 2023. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3594556.3594624

A framework for user-centric visualisation of blockchain transactions in critical infrastructure

2023

Other Outputs

Digital Service Transformation: Pathways to human and economic wellbeing: White paper

Andreassen, Tor W., Archibald, Gordon, Beekhuyzen, Jenine, Bongiovanni, Ivano, Brea, Edgar, Breidbach, Christoph, Burchill, Keith, Burgers, Henri, Cao, Selina, Coote, Len, Coram, Brendan, Cunningham, Claire, Feast, George, Field, Mitch, Ford, Jerad, Fouche, Leon, Gain, Alexandria, Gooding, Glen, Goyeneche Ramirez, David, Green, Teegan, Gschwind, Daniel, Hall, Thomas, Hartley, Nicole, Heinz, Daniel, Hine, Damian, Indulska, Marta, Kapernick, Brett, Kastelle, Tim, Ko, Ryan ... Zhang, Wenlu (2023). Digital Service Transformation: Pathways to human and economic wellbeing: White paper. Brisbane, QLD, Australia: The University of Queensland. doi: 10.14264/aed4918

Digital Service Transformation: Pathways to human and economic wellbeing: White paper

2023

Conference Publication

TypeScript’s evolution: an analysis of feature adoption over time

Scarsbrook, Joshua D., Utting, Mark and Ko, Ryan K. L. (2023). TypeScript’s evolution: an analysis of feature adoption over time. IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), Melbourne, VIC, Australia, 15-16 May 2023. Piscataway, NJ, United States: IEEE. doi: 10.1109/msr59073.2023.00027

TypeScript’s evolution: an analysis of feature adoption over time