2022 Journal Article Editorial: Human-centric security and privacyNepal, Surya, Ko, Ryan K. L., Grobler, Marthie and Camp, L. Jean (2022). Editorial: Human-centric security and privacy. Frontiers in Big Data, 5 848058, 848058. doi: 10.3389/fdata.2022.848058 |
2022 Journal Article PrefaceKo, Ryan K. L., Xu, Yang and Crispo, Bruno (2022). Preface. Communications in Computer and Information Science, 1557 CCIS, v-vi. |
2022 Other Outputs Dataset for SCP Survey Paper published in the journal Computers & Security.Ho, Hee Meng and Ko, Ryan (2022). Dataset for SCP Survey Paper published in the journal Computers & Security.. The University of Queensland. (Dataset) doi: 10.48610/213f95d |
2022 Conference Publication SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasetsKoay, Abigail M. Y., Xie, Miao, Ko, Ryan K. L., Sterner, Charles, Choi, Taejun and Dong, Naipeng (2022). SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets. 1st International Conference on Ubiquitous Security (UbiSec), Guangzhou, Peoples Republic of China, 28-31 December 2021. Singapore, Singapore: Springer Singapore. doi: 10.1007/978-981-19-0468-4_8 |
2022 Conference Publication FDGATII: Fast Dynamic Graph Attention with Initial Residual and IdentityKulatilleke, Gayan K., Portmann, Marius, Ko, Ryan and Chandra, Shekhar S. (2022). FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity. 35th Australasian Joint Conference on Artificial Intelligence: AI 2022, Perth, WA Australia, 5–8 December 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-031-22695-3_6 |
2022 Edited Outputs Ubiquitous Security : First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected PapersWang, Guojun, Choo, Kim-Kwang Raymond, Ko, Ryan K. L., Xu, Yang and Crispo, Bruno eds. (2022). Ubiquitous Security : First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers. UbiSec: First International Conference on Ubiquitous Security, Guangzhou, China, 28–31 December 2021. Singapore: Springer. |
2021 Conference Publication Plan2Defend: AI planning for cybersecurity in smart gridsChoi, Taejun, Ko, Ryan K. L., Saha, Tapan, Scarsbrook, Joshua, Koay, Abigail M. Y., Wang, Shunyao, Zhang, Wenlu and St Clair, Connor (2021). Plan2Defend: AI planning for cybersecurity in smart grids. 2021 IEEE PES Innovative Smart Grid Technologies - Asia (ISGT Asia), Brisbane, QLD, Australia, 5-8 December 2021. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/isgtasia49270.2021.9715679 |
2021 Conference Publication Privacy-preserving gradient descent for distributed genome-wide analysisZhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2021). Privacy-preserving gradient descent for distributed genome-wide analysis. ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4–8 October, 2021. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-88428-4_20 |
2021 Journal Article Security and privacy in smart citiesVorakulpipat, Chalee, Ko, Ryan K. L., Li, Qi and Meddahi, Ahmed (2021). Security and privacy in smart cities. Security and Communication Networks, 2021 9830547, 1-2. doi: 10.1155/2021/9830547 |
2021 Other Outputs Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the PacificNabbs-Keller, G., Ko, R., Mackay, T., Salmawan, N. A., Widodo, W. N. and Reksoprodjo, A. H. S. (2021). Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific. Policy Futures Brisbane, Australia: The University of Queensland. doi: 10.14264/4364b42 |
2021 Conference Publication An analytics framework for heuristic inference attacks against industrial control systemsChoi, Taejun, Bai, Guangdong, Ko, Ryan K. L., Dong, Naipeng, Zhang, Wenlu and Wang, Shunyao (2021). An analytics framework for heuristic inference attacks against industrial control systems. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 202, Guangzhou, China, 29 December 2020-1 January 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom50675.2020.00112 |
2021 Other Outputs Systems and methods for enhancing data provenance by logging kernel-level eventsKo, Ryan Kok Leong, Choi, Taejun and Anderson-Scott, Christian (2021). Systems and methods for enhancing data provenance by logging kernel-level events. WO2021038527A1. |
2021 Journal Article PrefaceThampi, Sabu M., Wang, Guojun, Rawat, Danda B., Ko, Ryan and Fan, Chun-I (2021). Preface. Communications in Computer and Information Science, 1364. |
2021 Conference Publication Pandora: a cyber range environment for the safe testing and deployment of autonomous cyber attack toolsJiang, Hetong, Choi, Taejun and Ko, Ryan K. L. (2021). Pandora: a cyber range environment for the safe testing and deployment of autonomous cyber attack tools. 8th International Symposium, SSCC 2020, Chennai, India, 15-17 October 2020. Singapore, Singapore: Springer Singapore. doi: 10.1007/978-981-16-0422-5_1 |
2021 Journal Article Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart gridsCui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu (2021). Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids. IEEE Transactions on Smart Grid, 13 (2), 1658-1661. doi: 10.1109/tsg.2021.3132536 |
2020 Journal Article Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offendersO’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9 |
2020 Journal Article Welcome Messages from IEEE TrustCom 2020 Program ChairsKo, Ryan, Alam Bhuiyan, Md Zakirul and Pan, Yi (2020). Welcome Messages from IEEE TrustCom 2020 Program Chairs. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 9343234. doi: 10.1109/TrustCom50675.2020.00006 |
2020 Book Chapter Cyber autonomy: automating the hacker – self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national securityKo, Ryan K. L. (2020). Cyber autonomy: automating the hacker – self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national security. Emerging technologies and international security: machines, the state, and war. (pp. 173-191) edited by Reuben Steff, Joe Burton and Simona R. Soare. London, United Kingdom: Routledge. |
2020 Other Outputs PrivColl: Practical Privacy-Preserving Collaborative Machine LearningZhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan KL (2020). PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. |
2020 Conference Publication General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research FrontsFatehi, Farhad, Hassandoust, Farkhondeh, Ko, Ryan K. L. and Akhlaghpour, Saeed (2020). General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts. 30th Medical Informatics Europe (MIE) Conference, Geneva Switzerland, Apr, 2020. Amsterdam, Netherlands: IOS Press. doi: 10.3233/SHTI200336 |