Skip to menu Skip to content Skip to footer

2022

Conference Publication

Positive-unlabeled learning using random forests via recursive greedy risk minimization

Wilton, Jonathan, Koay, Abigail M. Y., Ko, Ryan K. L., Miao Xu and Ye, Nan (2022). Positive-unlabeled learning using random forests via recursive greedy risk minimization. 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans, LA, United States, 29 November - 1 December 2022. New Orleans, LA, United States: Neural information processing systems foundation.

Positive-unlabeled learning using random forests via recursive greedy risk minimization

2022

Journal Article

Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data

Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L. (2022). Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data. IEEE Transactions on Smart Grid, 13 (6), 1-4. doi: 10.1109/tsg.2022.3207066

Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data

2022

Journal Article

Preserving privacy for distributed genome-wide analysis against identity tracing attacks

Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672

Preserving privacy for distributed genome-wide analysis against identity tracing attacks

2022

Journal Article

An exploratory study of organizational cyber resilience, its precursors and outcomes

Tsen, Elinor, Ko, Ryan K. L. and Slapnicar, Sergeja (2022). An exploratory study of organizational cyber resilience, its precursors and outcomes. Journal of Organizational Computing and Electronic Commerce, 32 (2), 1-22. doi: 10.1080/10919392.2022.2068906

An exploratory study of organizational cyber resilience, its precursors and outcomes

2022

Journal Article

Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review

Ho, Heemeng, Ko, Ryan and Mazerolle, Lorraine (2022). Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review. Computers & Security, 115 102611, 1-24. doi: 10.1016/j.cose.2022.102611

Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review

2021

Conference Publication

On random editing in LZ-end

Roodt, Daniel, Speidel, Ulrich, Kumar, Vimal and Ko, Ryan K. L. (2021). On random editing in LZ-end. 2021 Data Compression Conference (DCC), Snowbird, UT United States, 23 - 26 March 2021. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dcc50243.2021.00074

On random editing in LZ-end

2021

Conference Publication

It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts

Wang, Kailong, Zhang, Junzhe, Bai, Guangdong, Ko, Ryan and Dong, Jin Song (2021). It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW '21: The Web Conference 2021, Ljubljana, Slovenia, 19-23 April 2021. New York, NY United States: ACM. doi: 10.1145/3442381.3450008

It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts

Featured

2021

Journal Article

Source authentication of distribution synchrophasors for cybersecurity of microgrids

Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041

Source authentication of distribution synchrophasors for cybersecurity of microgrids

2020

Journal Article

Differentially private collaborative coupling learning for recommender systems

Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930

Differentially private collaborative coupling learning for recommender systems

2020

Conference Publication

PrivColl: practical privacy-preserving collaborative machine learning

Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20

PrivColl: practical privacy-preserving collaborative machine learning

2018

Other Outputs

ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers

Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO.

ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers

2017

Journal Article

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

2017

Conference Publication

The full provenance stack: five layers for complete and meaningful provenance

Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, 12-15 December 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72395-2_18

The full provenance stack: five layers for complete and meaningful provenance

2025

Journal Article

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

Han, Kun, Koay, Abigail M. Y., Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2025). Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data. Frontiers of Computer Science, 19 (8) 198340. doi: 10.1007/s11704-024-40449-z

Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data

2025

Journal Article

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

Joshi, Chaitanya, Slapničar, Sergeja, Yang, Jinming and Ko, Ryan (2025). Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory. Computers and Security, 154 104450, 1-14. doi: 10.1016/j.cose.2025.104450

Contrasting the optimal resource allocation to cybersecurity and cyber insurance using prospect theory versus expected utility theory

2025

Journal Article

A container security survey: exploits, attacks, and defenses

Jarkas, Omar, Ko, Ryan, Dong, Naipeng and Mahmud, Redowan (2025). A container security survey: exploits, attacks, and defenses. ACM Computing Surveys, 57 (7) 170, 1-36. doi: 10.1145/3715001

A container security survey: exploits, attacks, and defenses

2024

Book Chapter

Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach

Han, Kun, Koay, Abigail, Ko, Ryan K. L., Chen, Weitong and Xu, Miao (2024). Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach. Lecture Notes in Computer Science. (pp. 293-307) Singapore: Springer Nature Singapore. doi: 10.1007/978-981-96-1242-0_22

Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach

2024

Other Outputs

The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030

Ko, Ryan (2024). The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030. Seoul, Republic of Korea: Korea on Point.

The Australia-Korea cyber cooperation in the context of the Australian Cyber Security Strategy 2023-2030

2024

Conference Publication

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

Zhang, Yanjun, Sun, Ruoxi, Shen, Liyue, Bai, Guangdong, Xue, Minhui, Meng, Mark Huasong, Li, Xue, Ko, Ryan and Nepal, Surya (2024). Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience. WWW '24: ACM Web Conference 2024, Singapore, Singapore, 13-17 May 2024. New York, NY, United States: ACM. doi: 10.1145/3589334.3645545

Privacy-preserving and fairness-aware federated learning for critical infrastructure protection and resilience

2024

Journal Article

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes

Ho, Heemeng, Ko, Ryan, Mazerolle, Lorraine, Gilmour, John and Miao, Cheng (2024). Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. Journal of Cybersecurity, 10 (1) tyae020. doi: 10.1093/cybsec/tyae020

Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes