
Overview
Background
Professor Ryan Ko is Chair and Director of UQ Cyber Research Centre, Director of Research at the School of Electrical Engineering and Computer Science, and an elected member of the Academic Board at the University of Queensland, Australia. He holds a Bachelor of Engineering (Computer Engineering)(Hons.) (2005), and PhD (2011) from Nanyang Technological University, Singapore.
Ko has held senior scientific leadership, executive, and directorship roles across industry and academia, and has more than a decade of board, governance and advisory experience across government, industry and NGOs across Australia, New Zealand, Singapore, and USA.
He currently serves on the Audit and Risk Committee for the board of the global not-for-profit ORCID, and has served on boards and advisory groups for AustCyber, Queensland Government, Meat and Livestock Australia (MLA), and the NZX-listed (NZE:LIC) Livestock Improvement Cooperation (LIC).
He has also served as expert advisor to INTERPOL, the government of Tonga, NZDF, NZ Minister for Communications' Cyber Security Skills Taskforce, and one of four nationally-appointed Technical Adviser for the Harmful Digital Communications Act 2015, Ministry of Justice. He has also served as independent technical expert for court cases.
He is also Adjunct Professor at the Singapore Institute of Technology, and Affiliate Faculty Member at NIATEC at the Idaho State University, USA.
He is co-founder of Dynamic Standards International (DSI), CyberCert, and First Watch Ltd (NZ) – an industrial cybersecurity spin-off based on his patented OT security and provenance research at the University of Waikato.
Since joining UQ in 2019, he has served as:
- Deputy Head of School (External Engagement) (2021-2022)
- Founding Discipline Leader of the Cyber Security and Software Engineering discipline (2020-2021)
- Group Leader - Cyber Security (2019)
Ko has successfully established several university-wide, multi-disciplinary academic research and education programmes, including establishing and leading:
- UQ Cyber - interdisciplinary cyber scurity research centre involving 60+ academics and their respective teams from the 6 Schools (EECS, Business, Economics, Law, Social Science, Mathematics & Physics), the Centre for Policy Futures, and 4 Faculties since 2019.
- UQ's interdisciplinary postgraduate programme (MCyber, PGDipCyber, GCertCyber) involving four UQ faculties in 2019,
- NZ's first cyber security graduate research programme and lab (Cybersecurity Researchers of Waikato (CROW)) in 2012,
- NZ's first Master of Cyber Security (encompassing technical and law courses), the NZ Cyber Security Challenge since 2014, and
- NZ Institute for Security and Crime Science – Te Puna Haumaru as its founding director, the Evidence Based Policing Centre (at Wellington with NZ Police and ESR), and Master of Security and Crime Science in 2017 with the University of Waikato, NZ.
Over his academic career, Ko has been awarded A$20+million in competitive grants as lead Chief Investigator, and ~A$40+million as co-investigator. Prior to UQ, he was the highest funded computer scientist in New Zealand, as Principal Investigator and Science Leader of the largest MBIE-awarded cloud security research funding for STRATUS (NZ$12.2 million; 2014-2018). STRATUS' research was awarded 'Gold' by MBIE (i.e. top performing project, 2017), adopted by INTERPOL and featured in NZ's Department of Prime Minister and Cabinet's NZ Cyber Security Strategy 2016 annual report.
Ko has a track record developing international and national cyber security curricula, including:
- Co-creation of the gold-standard (ISC)2 Certified Cloud Security Professional (CCSP) curriculum (2014-2015)
- Authoring the draft of the NZQA's Level 6 Cybersecurity Diploma qualification as part of the NZ Cyber Security Skills Taskforce on behalf of the Department of Prime Minister and Cabinet.
Ko has also experience developing competitions and coaching competitive cyber security teams, including:
- Co-founding the NZ Cyber Security Challenge in 2014, and leading the NZCSC from 2014 to 2018. NZCSC is now the premier national cyber security competition in NZ.
- Co-founding the Oceania Cybersecurity Challenge (OCC) in 2020, and leading the competition from 2022 to present. OCC is now the regional qualifiers for the International Cybersecurity Challenge
- Co-founding the International Cybersecurity Challenge (ICC) as part of the Steering Committee in 2022. ICC has been held in Athens (2022) and San Diego (2023). It is aiming to be the world cup of cyber competitions.
- Head Coach of Team Oceania for the ICC. 2022 Results: Overall 4th; 2023 Results: Overall 2nd in the world.
He contributed to the establishment of the Government of Tonga CERT and CERT NZ, and has spoken regularly on cyber and cloud security research across the globe, including the OECD, Republic of Korea National Assembly (2018), INTERPOL (2017), TEDx Ruakura (2017), and the NZ Members of Parliament (2016).
Within the ISO/IEC JTC 1/SC 27, Prof Ko was Head of Delegation for the Singapore national body, served as Editor, ISO/IEC 21878 “Security guidelines for design and implementation of virtualized servers”, and hosted the ISO/IEC JTC 1/SC 27 meetings at Hamilton, NZ, in 2017. He is currently one of the editors of the ISO/IEC PWI 5181 Data Provenance Reference Model. In 2022, Ko co-chaired the development of the Singapore standard TR 106:2022 Tiered cybersecurity standards for enterprises in collaboration with the SPSTC and Singapore Cyber Security Agency.
Ko serves as an assessor for the Australian Research Council (ARC), Irish Research Council, Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO), and NZ MBIE College of Assessors (since 2015).
He is also an external expert for the Tertiary Education Quality and Standards Agency (TEQSA), and a member of the Australian Computer Society (ACS) Accreditation Committee. He has experience reviewing course proposals and served in governance roles for higher education institutes.
Ko has externally examined 11 PhD and 3 Masters theses for universities in Australia, New Zealand, Canada, Hong Kong and Singapore.
For his contributions to the field, he was elected Fellow of the Australian Computer Society, Fellow of the Queensland Academy of Arts and Sciences, and Fellow of Cloud Security Alliance (CSA) (2016). He was awarded the Singapore Government (Enterprise Singapore)’s Young Professional Award (2018) for his leadership at ISO, and awarded the inaugural CSA Ron Knode Service Award 2012 for the establishment of Cloud Data Governance and Cloud Vulnerabilities Research Working Groups. He is also recipient of the 2015 (ISC)2 Information Security Leadership Award.
For his research and teaching excellence, he was awarded the University of Queensland Awards for Excellence - Leadership (Commendation) (2023), EAIT Nominations for Most Effective Teacher (both semesters of 2020, 2021, 2022, 2023), University of Waikato's Early Career Excellence Award (2014), Faculty Teaching Excellence Awards (2014, 2015, 2018), and the Nola Campbell eLearning Excellence Award (2014). During his PhD, he was also awarded A*STAR SIMTech's Best Student Award (2009), and clinched the 1st Prize of the IEEE Services Cup 2009 at IEEE ICWS (CORE A*) in Los Angeles, CA.
Earlier in his career, Ko was a systems engineer, and subsequently founded two start-ups (one was a social enterprise which became an events/conventions management contractor with IMG at mega-events in Singapore, including the inaugural Youth Olympics in 2010).
He is an active science communicator and is regularly interviewed and featured by Australian (ABC News, SBS News, 7 News, 9 News, Courier Mail, Network 10, AFR), Singaporean (Channel NewsAsia, CNA Radio938), NZ (NZ Herald, Dominion Post, Stuff.co.nz, Waikato Times, TVNZ, Central TV) and international media on topics of cyber security, cybercrime and data privacy.
Availability
- Professor Ryan Ko is:
- Available for supervision
- Media expert
Fields of research
Qualifications
- Bachelor (Honours) of Computer Engineering, Nanyang Technological University
- Doctor of Philosophy, Nanyang Technological University
- Certificate of Management, Harvard University
- Fellow, Australian Computer Society, Australian Computer Society
- Fellow, Cloud Security Alliance, Cloud Security Alliance
- Fellow, Queensland Academy of Arts and Sciences, Queensland Academy of Arts and Sciences
Research interests
-
Automating Cyber Security for Critical Infrastructure
Designing cyber autonomy to empower all end-users.
-
Operational Technology (OT) Security
Focusing on Industrial Control Systems (ICS) and related protocols.
-
Provenance and Traceability
Applications into AgTech, IoT, Edge, Cloud Computing and OT environments.
-
Trusted Computing Applications
Applications into agriculture, regulatory, auditing and media.
-
Data Privacy and Privacy Enhancing Technologies
Enabling secure and private multi-party computation.
-
AI Planning/ Automated Planning
Adapting classical AI planning approaches into cyber security.
-
Applying Situation Crime Prevention to Cybercrime Prevention
Applying SCP techniques into processes and controls to prevent cybercrime.
-
Board and Organisational Structures for Cyber Resilience
Understanding how factors and pressures (e.g. board composition and organisational structures, external pressures) affect an organisation's cyber resilience.
-
Creating Measurable Indicators of Cyber Resilience
Developing a framework to quantify factors allowing senior executives to understand and make decisions about cyber resilience.
Research impacts
Ko's research in cyber security focuses on returning control of data to users. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. His research is adopted internationally (e.g. CERN, INTERPOL, and HP clients such as Apple, Nasa, US Treasury/IRS). His papers have received conference Best Paper Awards (2011, 2015, 2017), and resulted in several technology transfers (e.g. HP), open source contributions (e.g. Kali Linux THC) and spin-offs (e.g. First Watch). He has published in top venues including WWW (The Web), NeurIPS, DCC, ESORICS, IEEE TrustCom, IEEE Comms Surveys and Tutorials, IEEE ICWS, IEEE TDSC, IEEE TSC, Computers & Security, IEEE Trans on Smart Grid, and more than 100 publications including books, refereed conference papers, journal papers, book chapters, encyclopaedia entries, technical reports and international patents (PCT).
Recently, he is researching information integrity and cyber autonomy in critical infrastructure sectors such as energy, manufacturing, regulatory and agriculture sectors. He has served in technical programme committees for more than 30 IEEE conferences/workshops, associate editor for 6 journals, and as series editor for Elsevier's security books.
Works
Search Professor Ryan Ko’s works on UQ eSpace
2014
Book Chapter
Data accountability in cloud systems
Ko, Ryan K. L. (2014). Data accountability in cloud systems. Security, privacy and trust in cloud systems. (pp. 211-238) edited by Surya Nepal and Mukaddim Pathan. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-38586-5_7
2014
Conference Publication
Consumer-centric protection for online social networks
Akram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, 13-15 August 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/IRI.2014.7051872
2014
Book
Recent trends in computer networks and distributed systems security
Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko and Lei Shu eds. (2014). Recent trends in computer networks and distributed systems security. Communications in Computer and Information Science, Berlin, Heidelberg: Springer, Berlin, Heidelberg. doi: 10.1007/978-3-642-54525-2
2014
Conference Publication
'Time' for cloud? Design and implementation of a time-based cloud resource management system
Ko, Ryan K. L., Tan, Alan Y. S. and Ng, Grace P. Y. (2014). 'Time' for cloud? Design and implementation of a time-based cloud resource management system. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CLOUD.2014.77
2014
Journal Article
Computing Mod Without Mod
Will, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod.
2014
Conference Publication
A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach
Ko, Ryan K. L., Tan, Alan Y. S. and Gao, Ting (2014). A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Singapore Singapore, 15-18 December 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2014.23
2014
Conference Publication
End-to-end secure and privacy preserving mobile chat application
Akram, Raja Naeem and Ko, Ryan K. L. (2014). End-to-end secure and privacy preserving mobile chat application. International Workshop on Information Security Theory and Practice, Heraklion, Greece, 2 July 2014. New York, NY, United States: Springer . doi: 10.1007/978-3-662-43826-8_9
2014
Book
Trends and Applications of Serious Gaming and Social Media
Youngkyun Baek , Ryan Ko and Tim Marsh eds. (2014). Trends and Applications of Serious Gaming and Social Media. Gaming Media and Social Effects, Singapore: Springer. doi: 10.1007/978-981-4560-26-9
2014
Conference Publication
Unified Model for Data Security - A Position Paper
Akram, Raja Naeem and Ko, Ryan K. L. (2014). Unified Model for Data Security - A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.110
2014
Conference Publication
Virtual Numbers for Virtual Machines?
Tan, Alan Y. S., Ko, Ryan K. L. and Mendiratta, Veena (2014). Virtual Numbers for Virtual Machines?. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK United States, 27 June - 2 July 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CLOUD.2014.147
2014
Journal Article
A toolkit for automating compliance in cloud computing services
Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830
2014
Conference Publication
Escrow: A Large-Scale Web Vulnerability Assessment Tool
Delamore, Baden and Ko, Ryan K. L. (2014). Escrow: A Large-Scale Web Vulnerability Assessment Tool. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.130
2014
Conference Publication
Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking
Ko, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, 27 June - 2 July 2014. Piscataway, NJ, United States: IEEE. doi: 10.1109/CLOUD.2014.121
2014
Conference Publication
OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud
Tan, Alan Y. S., Ko, Ryan K. L. and Ng, Grace P. Y. (2014). OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud. 3rd IEEE International Congress on Big Data, Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData.Congress.2014.68
2014
Journal Article
TSP 2013: message from workshop chairs
Min, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350
2014
Conference Publication
Digital Trust - Trusted Computing and Beyond A Position Paper
Akram, Raja Naeem and Ko, Ryan K. L. (2014). Digital Trust - Trusted Computing and Beyond A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.116
2013
Other Outputs
Determining file allocation based on file operations
Tan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2.
2013
Other Outputs
Cloud computing vulnerability incidents: a statistical overview
Ko, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance.
2013
Other Outputs
Tracing data block operations
Suen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1.
2013
Other Outputs
Tracing operations in a cloud system
Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.
Funding
Current funding
Past funding
Supervision
Availability
- Professor Ryan Ko is:
- Available for supervision
Before you email them, read our advice on how to contact a supervisor.
Supervision history
Current supervision
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Principal Advisor
Other advisors: Associate Professor Guangdong Bai, Dr Naipeng Dong
-
Doctor Philosophy
Secure, Accountable and Provenance-Centric File System
Principal Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
Efficient Methods for Automating Reconstruction of Provenance and Cryptocurrency Networks for Crime Attribution
Principal Advisor
Other advisors: Dr Miao Xu
-
Doctor Philosophy
A Distributed Data Collection Infrastructure For Automating Industrial Control Systems Security
Principal Advisor
Other advisors: Associate Professor Guangdong Bai, Dr Naipeng Dong
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Principal Advisor
Other advisors: Associate Professor Guangdong Bai, Dr Naipeng Dong
-
Doctor Philosophy
Evaluating and Enhancing the Resilience of Regression-Based Anomaly Detectors Against Gradient-Free Evasion Attacks in Industrial Control Systems
Principal Advisor
Other advisors: Associate Professor Guangdong Bai, Dr Naipeng Dong
-
Doctor Philosophy
Virtualized Root of Trust in Cloud Computing
Principal Advisor
Other advisors: Dr Naipeng Dong
-
Doctor Philosophy
Applying Situational Crime Prevention to Business Processes to Prevent Cybercrime
Principal Advisor
-
Doctor Philosophy
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Principal Advisor
Other advisors: Associate Professor Guangdong Bai, Dr Naipeng Dong
-
Doctor Philosophy
Evaluating and Improving Type Inference Models for Web Application Reverse Engineering
Principal Advisor
Other advisors: Associate Professor Mark Utting, Professor Michael Bruenig
-
Doctor Philosophy
Adaptive, secure and resilient programmable logic controllers (PLCs) and data transfer protocols
Principal Advisor
Other advisors: Professor Tapan Saha, Associate Professor Guangdong Bai
-
Doctor Philosophy
IoT security analytics
Associate Advisor
Other advisors: Dr Naipeng Dong, Associate Professor Guangdong Bai
-
-
Doctor Philosophy
Informal and formal justice for rape: Digital "court" and court trials in Australia
Associate Advisor
Other advisors: Associate Professor Allison Fish, Dr Jonah Rimer
-
Doctor Philosophy
Advancing cyberworthiness via integration of AI and Model-Based Systems Engineering (MBSE)
Associate Advisor
Other advisors: Dr Priyanka Singh
-
Doctor Philosophy
Examining Changes in Conspiracy Discourse on Reddit from 2019 - 2023
Associate Advisor
Other advisors: Dr Martin Schweinberger
-
Doctor Philosophy
A corpus-based analysis of conspiracy theory discourse on Reddit: Understanding conspiracy-fuelled anomie and moral panics during COVID-19
Associate Advisor
Other advisors: Dr Martin Schweinberger
-
Doctor Philosophy
The nexus between data breaches, cyber safety and employee productivity in the hybrid work context
Associate Advisor
Other advisors: Associate Professor Remi Ayoko
-
-
Doctor Philosophy
Unified Cyber Security Framework for Distributed Learning
Associate Advisor
Other advisors: Associate Professor Guangdong Bai
-
Doctor Philosophy
Security of Internet of Things (IoT) Integration
Associate Advisor
Other advisors: Associate Professor Guangdong Bai
Completed supervision
-
2024
Doctor Philosophy
Using Situational Crime Prevention (SCP) to Prevent Cybercrimes
Principal Advisor
Other advisors: Professor Lorraine Mazerolle
-
2023
Doctor Philosophy
Security and Performance Evaluation of Software Defined Networking adopting Moving Target Defenses
Associate Advisor
Other advisors: Associate Professor Dan Kim
-
2023
Doctor Philosophy
Investigating the components of a contextual cyber resilience for organisations
Associate Advisor
Other advisors: Associate Professor Sergeja Slapnicar
-
2021
Doctor Philosophy
Privacy-preserving Sharing for Genome-wide Analysis
Associate Advisor
Other advisors: Dr Caitlin Curtis, Associate Professor Guangdong Bai, Professor Xue Li
Media
Enquiries
Contact Professor Ryan Ko directly for media enquiries about:
- AI for Cyber Security
- Cloud Computing Security
- Critical infrastructure security
- Cyber Attack Attribution
- Cyber Crime
- Cyber Security
- Cybersecurity
- Data Accountability
- Data Control
- Data Privacy
- Data Provenance
- Data Tracking
- ICS Security
- Industrial control systems security
- Information Security
- Privacy enhancing technologies
Need help?
For help with finding experts, story ideas and media enquiries, contact our Media team: