Skip to menu Skip to content Skip to footer

2018

Other Outputs

Towards one global privacy law

Ryan Ko, Mark Rodrigues, Aleksey Ladur and Craig Scoon (2018, 01 04). Towards one global privacy law AsiaGlobal Online

Towards one global privacy law

2018

Book Chapter

Data Provenance for Big Data Security and Accountability

Phua, Thye Way and Ko, Ryan K. L. (2018). Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies. (pp. 1-6) Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-63962-8_237-1

Data Provenance for Big Data Security and Accountability

2018

Conference Publication

A full-scale security visualization effectiveness measurement and presentation approach

Garae, Jeffery, Ko, Ryan K. L. and Apperley, Mark (2018). A full-scale security visualization effectiveness measurement and presentation approach. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, 31 July - 3 August 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/TrustCom/BigDataSE.2018.00095

A full-scale security visualization effectiveness measurement and presentation approach

2018

Conference Publication

MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps

Scarsbrook, Joshua D., Ko, Ryan K. L., Rogers, Bill and Bainbridge, David (2018). MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps. 26th Conference on Program Comprehension ICPC '18, Gothenburg, Sweden, 28-29 May 2018. New York, United States: ACM. doi: 10.1145/3196321.3196368

MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps

2018

Conference Publication

Security visualization intelligence model for law enforcement investigations

Garae, Jeffery, Ko, Ryan K. L ., Apperley, Mark and Schlickmann, Silvino J. (2018). Security visualization intelligence model for law enforcement investigations. 2018 Cyber Forensic & Security International Conference (2018 CFSIC), Nuku'alofa, Tonga, 21-23 August 2018. Nuku'alofa, Tonga:

Security visualization intelligence model for law enforcement investigations

2017

Book Chapter

Security visualization for cloud computing: an overview

Garae, Jeffery, Ko, Ryan K. and Apperley, Mark (2017). Security visualization for cloud computing: an overview. Data security in cloud computing. (pp. 277-295) edited by Vimal Kumar , Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch13

Security visualization for cloud computing: an overview

2017

Book Chapter

Data provenance in cloud

Yu Shyang Tan, Alan, Chaisiri, Sivadon, Leong, Ryan Ko, Holmes, Geoff and Rogers, Bill (2017). Data provenance in cloud. Data security in cloud computing. (pp. 261-275) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch12

Data provenance in cloud

2017

Other Outputs

Turning the tide with cyber toolmakers

Ko, Ryan (2017, 09 01). Turning the tide with cyber toolmakers The National Business Review (NZ) 101-127.

Turning the tide with cyber toolmakers

2017

Other Outputs

Opinion: ransomware attack needs global solution

Burton, Joe and Ko, Ryan (2017, 05 22). Opinion: ransomware attack needs global solution Waikato Times 1-1.

Opinion: ransomware attack needs global solution

2017

Conference Publication

Returning control of data to users with a personal information crunch - a position paper

Will, Mark A., Garae, Jeffery, Tan, Yu Shyang, Scoon, Craig and Ko, Ryan K. L. (2017). Returning control of data to users with a personal information crunch - a position paper. 5th International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, 11-12 April 2017. Piscataway, NJ, United States: IEEE. doi: 10.1109/ICCCRI.2017.12

Returning control of data to users with a personal information crunch - a position paper

2017

Conference Publication

Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

Will, Mark A., Ko, Ryan K. L. and Schlickmann, Silvino J. (2017). Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW Australia, 1-4 August 2017. Piscataway, NJ United States: IEEE. doi: 10.1109/trustcom/bigdatase/icess.2017.347

Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

2017

Conference Publication

Visualizing the New Zealand cyber security challenge for attack behaviors

Garae, Jeffery, Ko, Ryan K. L., Kho, Janice, Suwadi, Saidah, Will, Mark A. and Apperley, Mark (2017). Visualizing the New Zealand cyber security challenge for attack behaviors. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 -4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.362

Visualizing the New Zealand cyber security challenge for attack behaviors

2017

Conference Publication

Attribution using keyboard row based behavioural biometrics for handedness recognition

Shute, Sam, Ko, Ryan K. L. and Chaisiri, Sivadon (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.363

Attribution using keyboard row based behavioural biometrics for handedness recognition

2017

Conference Publication

User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection

Ko, Ryan K. L. and Garae, Jeffery (2017). User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection. 3rd INTERPOL Digital Security Research Seminar, Singapore, 12-13 September 2017. Singapore: INTERPOL.

User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection

2017

Book Chapter

A data-centric view of cloud security

Kumar, Vimal, Chaisiri, Sivadon and Ko, Ryan (2017). A data-centric view of cloud security. Data security in cloud computing. (pp. 1-17) Hertfordshire, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch1

A data-centric view of cloud security

2017

Book

Data Security in Cloud Computing

Vimal Kumar, Sivadon Chaisiri and Ryan Ko eds. (2017). Data Security in Cloud Computing. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e

Data Security in Cloud Computing

2017

Book Chapter

The Waikato Data Privacy Matrix

Scoon, Craig and Ko, Ryan K. L. (2017). The Waikato Data Privacy Matrix. Data security in cloud computing. (pp. 243-259) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch11

The Waikato Data Privacy Matrix

2017

Book Chapter

Distributing encoded data for private processing in the cloud

Will, Mark A. and Ko, Ryan K. L. (2017). Distributing encoded data for private processing in the cloud. Data security in cloud computing. (pp. 89-115) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch5

Distributing encoded data for private processing in the cloud

2017

Journal Article

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626

A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing

2017

Conference Publication

Secure FPGA as a service - towards secure data processing by physicalizing the cloud

Will, Mark A. and Ko, Ryan K. L. (2017). Secure FPGA as a service - towards secure data processing by physicalizing the cloud. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, Australia, 1-4 August 2017. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.270

Secure FPGA as a service - towards secure data processing by physicalizing the cloud