|
2018 Other Outputs Towards one global privacy lawRyan Ko, Mark Rodrigues, Aleksey Ladur and Craig Scoon (2018, 01 04). Towards one global privacy law AsiaGlobal Online |
|
2018 Book Chapter Data Provenance for Big Data Security and AccountabilityPhua, Thye Way and Ko, Ryan K. L. (2018). Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies. (pp. 1-6) Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-63962-8_237-1 |
|
2018 Conference Publication A full-scale security visualization effectiveness measurement and presentation approachGarae, Jeffery, Ko, Ryan K. L. and Apperley, Mark (2018). A full-scale security visualization effectiveness measurement and presentation approach. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, 31 July - 3 August 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/TrustCom/BigDataSE.2018.00095 |
|
2018 Conference Publication MetropolJS: Visualizing and debugging large-scale javascript program structure with treemapsScarsbrook, Joshua D., Ko, Ryan K. L., Rogers, Bill and Bainbridge, David (2018). MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps. 26th Conference on Program Comprehension ICPC '18, Gothenburg, Sweden, 28-29 May 2018. New York, United States: ACM. doi: 10.1145/3196321.3196368 |
|
2018 Conference Publication Security visualization intelligence model for law enforcement investigationsGarae, Jeffery, Ko, Ryan K. L ., Apperley, Mark and Schlickmann, Silvino J. (2018). Security visualization intelligence model for law enforcement investigations. 2018 Cyber Forensic & Security International Conference (2018 CFSIC), Nuku'alofa, Tonga, 21-23 August 2018. Nuku'alofa, Tonga: |
|
2017 Book Chapter Security visualization for cloud computing: an overviewGarae, Jeffery, Ko, Ryan K. and Apperley, Mark (2017). Security visualization for cloud computing: an overview. Data security in cloud computing. (pp. 277-295) edited by Vimal Kumar , Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch13 |
|
2017 Book Chapter Data provenance in cloudYu Shyang Tan, Alan, Chaisiri, Sivadon, Leong, Ryan Ko, Holmes, Geoff and Rogers, Bill (2017). Data provenance in cloud. Data security in cloud computing. (pp. 261-275) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch12 |
|
2017 Other Outputs Turning the tide with cyber toolmakersKo, Ryan (2017, 09 01). Turning the tide with cyber toolmakers The National Business Review (NZ) 101-127. |
|
2017 Other Outputs Opinion: ransomware attack needs global solutionBurton, Joe and Ko, Ryan (2017, 05 22). Opinion: ransomware attack needs global solution Waikato Times 1-1. |
|
2017 Conference Publication Returning control of data to users with a personal information crunch - a position paperWill, Mark A., Garae, Jeffery, Tan, Yu Shyang, Scoon, Craig and Ko, Ryan K. L. (2017). Returning control of data to users with a personal information crunch - a position paper. 5th International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, 11-12 April 2017. Piscataway, NJ, United States: IEEE. doi: 10.1109/ICCCRI.2017.12 |
|
2017 Conference Publication Anonymous Data Sharing Between Organisations with Elliptic Curve CryptographyWill, Mark A., Ko, Ryan K. L. and Schlickmann, Silvino J. (2017). Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW Australia, 1-4 August 2017. Piscataway, NJ United States: IEEE. doi: 10.1109/trustcom/bigdatase/icess.2017.347 |
|
2017 Conference Publication Visualizing the New Zealand cyber security challenge for attack behaviorsGarae, Jeffery, Ko, Ryan K. L., Kho, Janice, Suwadi, Saidah, Will, Mark A. and Apperley, Mark (2017). Visualizing the New Zealand cyber security challenge for attack behaviors. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 -4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.362 |
|
2017 Conference Publication Attribution using keyboard row based behavioural biometrics for handedness recognitionShute, Sam, Ko, Ryan K. L. and Chaisiri, Sivadon (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.363 |
|
2017 Conference Publication User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detectionKo, Ryan K. L. and Garae, Jeffery (2017). User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection. 3rd INTERPOL Digital Security Research Seminar, Singapore, 12-13 September 2017. Singapore: INTERPOL. |
|
2017 Book Chapter A data-centric view of cloud securityKumar, Vimal, Chaisiri, Sivadon and Ko, Ryan (2017). A data-centric view of cloud security. Data security in cloud computing. (pp. 1-17) Hertfordshire, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch1 |
|
2017 Book Data Security in Cloud ComputingVimal Kumar, Sivadon Chaisiri and Ryan Ko eds. (2017). Data Security in Cloud Computing. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e |
|
2017 Book Chapter The Waikato Data Privacy MatrixScoon, Craig and Ko, Ryan K. L. (2017). The Waikato Data Privacy Matrix. Data security in cloud computing. (pp. 243-259) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch11 |
|
2017 Book Chapter Distributing encoded data for private processing in the cloudWill, Mark A. and Ko, Ryan K. L. (2017). Distributing encoded data for private processing in the cloud. Data security in cloud computing. (pp. 89-115) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch5 |
|
2017 Journal Article A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computingChase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626 |
|
2017 Conference Publication Secure FPGA as a service - towards secure data processing by physicalizing the cloudWill, Mark A. and Ko, Ryan K. L. (2017). Secure FPGA as a service - towards secure data processing by physicalizing the cloud. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, Australia, 1-4 August 2017. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.270 |