|
2021 Journal Article PrefaceThampi, Sabu M., Wang, Guojun, Rawat, Danda B., Ko, Ryan and Fan, Chun-I (2021). Preface. Communications in Computer and Information Science, 1364. |
|
2021 Journal Article Source authentication of distribution synchrophasors for cybersecurity of microgridsCui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041 |
|
2021 Conference Publication Pandora: a cyber range environment for the safe testing and deployment of autonomous cyber attack toolsJiang, Hetong, Choi, Taejun and Ko, Ryan K. L. (2021). Pandora: a cyber range environment for the safe testing and deployment of autonomous cyber attack tools. 8th International Symposium, SSCC 2020, Chennai, India, 15-17 October 2020. Singapore, Singapore: Springer Singapore. doi: 10.1007/978-981-16-0422-5_1 |
|
2020 Journal Article Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offendersO’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9 |
|
2020 Journal Article Welcome Messages from IEEE TrustCom 2020 Program ChairsKo, Ryan, Alam Bhuiyan, Md Zakirul and Pan, Yi (2020). Welcome Messages from IEEE TrustCom 2020 Program Chairs. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 9343234. doi: 10.1109/TrustCom50675.2020.00006 |
|
2020 Book Chapter Cyber autonomy: automating the hacker – self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national securityKo, Ryan K. L. (2020). Cyber autonomy: automating the hacker – self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national security. Emerging technologies and international security: machines, the state, and war. (pp. 173-191) edited by Reuben Steff, Joe Burton and Simona R. Soare. London, United Kingdom: Routledge. |
|
2020 Other Outputs PrivColl: Practical Privacy-Preserving Collaborative Machine LearningZhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan KL (2020). PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. |
|
2020 Journal Article Differentially private collaborative coupling learning for recommender systemsZhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930 |
|
2020 Conference Publication General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research FrontsFatehi, Farhad, Hassandoust, Farkhondeh, Ko, Ryan K. L. and Akhlaghpour, Saeed (2020). General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts. 30th Medical Informatics Europe (MIE) Conference, Geneva Switzerland, Apr, 2020. Amsterdam, Netherlands: IOS Press. doi: 10.3233/SHTI200336 |
|
2020 Other Outputs Submission to Department of Foreign Affairs and Trade’s Cyber and Critical Technology Engagement StrategyNabbs-Keller, Greta, Ko, Ryan, Axelsen, Michael, Bongiovanni, Ivano, Dowsett, Dallas, Liivoja, Rain, Maher, Ray, Massingham, Eve, McEwan, Chris, McKenzie, Simon, O’Quinn, Richard, Radke, Amelia and Williams, John (2020). Submission to Department of Foreign Affairs and Trade’s Cyber and Critical Technology Engagement Strategy. Brisbane, QLD, Australia: The University of Queensland. |
|
2020 Conference Publication PrivColl: practical privacy-preserving collaborative machine learningZhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20 |
|
2020 Book Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected PapersSabu M. Thampi, Gregorio Martinez Perez, Ryan Ko and Danda B. Rawat eds. (2020). Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers. Communications in Computer and Information Science, Singapore: Springer Singapore. doi: 10.1007/978-981-15-4825-3 |
|
2020 Other Outputs Dataset of data breaches and ransomware attacks over 15 years from 2004Tsen, Elinor, Ko, Ryan and Slapnicar, Sergeja (2020). Dataset of data breaches and ransomware attacks over 15 years from 2004. The University of Queensland. (Dataset) doi: 10.14264/dfe5027 |
|
2020 Conference Publication PrefaceThampi, Sabu M., Martinez Perez, Gregorio, Ko, Ryan and Rawat, Danda B. (2020). Preface. 7th International Symposium on Security in Computing and Communications, SSCC 2019, Trivandrum, India, 18 - 21 December 2019. Heidelberg, Germany: Springer. |
|
2019 Other Outputs A matter of security, privacy and trust: a study of the principles and values of encryption in New ZealandDizon, Michael, Ko, Ryan, Rumbles, Wayne, Gonzalez, Patricia, McHugh, Philip and Meehan, Anthony (2019). A matter of security, privacy and trust: a study of the principles and values of encryption in New Zealand. NZ Law Foundation: NZ Law Foundation. |
|
2019 Journal Article Message from the guest editorsTakahashi, Takeshi, Roman Castro, Rodrigo, Silverajan, Bilhanan, Ko, Ryan K. L. and Tabet, Said (2019). Message from the guest editors. International Journal of Information Security, 19 (1), 1-2. doi: 10.1007/s10207-019-00472-9 |
|
2019 Other Outputs Security systems, methods and devicesKo, Ryan Kok Leong , Choi, Taejun and Anderson-Scott, Christian (2019). Security systems, methods and devices. 756876. |
|
2019 Book Chapter Data provenance for big data security and accountabilityPhua, Thye Way and Ko, Ryan K. L. (2019). Data provenance for big data security and accountability. Encyclopedia of big data technologies. (pp. 568-573) edited by Sherif Sakr and Albert Y. Zomaya. Cham, Switzerland: Springer Cham. doi: 10.1007/978-3-319-77525-8_237 |
|
2019 Conference Publication Message from IEEE TrustCom 2019 General ChairsKo, Ryan, Chen, Liqun and Zhu, Liming (2019). Message from IEEE TrustCom 2019 General Chairs. 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5-8 August 2019. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/trustcom/bigdatase.2019.00005 |
|
2018 Other Outputs ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized serversKo, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO. |