View the list of publications created by our research teams or download a full list by clicking below.
-
Michael Bewong, John Wondoh, Selasi Kwashie, Jixue Liu, Lin Liu, Jiuyong Li, Md. Islam, David Kernot
2023
DATM: A Novel Data Agnostic Topic Modeling Technique With Improved Effectiveness for Both Short and Long Text
Journal Article -
Ashish Nanda, Syed Shah, Jongkil Jeong, Robin Doss, Jeb Webb
2023
Towards Higher Levels of Assurance in Remote Identity Proofing
Journal Article -
Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge
2023
Secure Replication-Based Outsourced Computation Using Smart Contracts
Journal Article -
Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, Eugene Wang
2023
A review of multi-factor authentication in the Internet of Healthcare Things
Journal Article -
Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Babar
2023
A Review on C3I Systems Security: Vulnerabilities, Attacks, and Countermeasures
Journal Article -
Nathan Beu, Asangi Jayatilaka, Manssoreh Zahedi, Muhammad Babar, Laura Hartley, Winston Lewinsmith, Irina Baetu
2023
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation
Journal Article -
Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal
2023
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children s Apps
Journal Article -
Ahmed Musleh, Guo Chen, Zhao Dong, Chen Wang, Shiping Chen
2023
Spatio-temporal data-driven detection of false data injection attacks in power distribution systems
Journal Article -
Luke Kane, Vicky Liu, Matthew McKague, Geoffrey Walker
2023
Security Challenges and Wireless Technology Choices in IoT-Based Smart Grids
Journal Article -
Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere
2023
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models
Journal Article -
Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Raja Jurdak
2023
The Role of Cyber Threat Intelligence Sharing in the Metaverse
Journal Article -
Zarrin Sworna, Muhammad Babar, Anjitha Sreekumar
2023
IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools APIs
Journal Article -
Chadni Islam, Victor Prokhorenko, Ali Babar
2023
Runtime software patching: Taxonomy, survey and future directions
Journal Article -
Zahra Jadidi, Shantanu Pal, Mukhtar Hussain, Kien Thanh
2023
Correlation-Based Anomaly Detection in Industrial Control Systems
Journal Article -
Cassandra Cross, Thomas Holt
2023
More than Money: Examining the Potential Exposure of Romance Fraud Victims to Identity Crime
Journal Article -
Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay Jha
2023
Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification
Journal Article -
Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong
2023
On the Development of a Protection Profile Module for Encryption Key Management Components
Journal Article -
Russell Brewer, Tyson Whitten, Katie Logos, Morgan Sayer, Colette Langos, Thomas Holt, Jesse Cale, Andrew Goldsmith
2023
Examining the Psychosocial and Behavioral Factors Associated with Adolescent Engagement in Multiple Types of Cyberdeviance: Results from an Australian Study
Journal Article -
Masumi Arafune, Sidharth Rajalakshmi, Luigi Jaldon, Zahra Jadidi, Shantanu Pal, Ernest Foo, Nagarajan Venkatachalam
2022
Design and Development of Automated Threat Hunting in Industrial Control Systems
Journal Article -
Michael Zipperle, Florian Gottwalt, Elizabeth Chang, Tharam Dillon
2022
Provenance-based Intrusion Detection Systems: A Survey
Journal Article -
Warren Cabral, Leslie Sikos, Craig Valli
2022
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Journal Article -
Cassandra Cross
2022
Using artificial intelligence (AI) and deepfakes to deceive victims: the need to rethink current romance fraud prevention messaging
Journal Article -
Zahra Jadidi, Joshua Hagemann, Daniel Quevedo
2022
Multi-step attack detection in industrial control systems using causal analysis
Journal Article -
Nickson Karie, Leslie Sikos
2022
Cybersecurity Incident Response in the Enterprise
Miscellaneous -
Nan Sun, Chang-Tsun Li, Hin Chan, Ba Le, Md Islam, Leo Zhang, Md Islam, Warren Armstrong
2022
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
Journal Article -
Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen, Zike An
2022
Defending Adversarial Attacks via Semantic Feature Manipulation
Journal Article -
Leonardo Iwaya, Ali Babar, Awais Rashid, Chamila Wijayarathna
2022
On the privacy of mental health apps
Journal Article -
Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone
2022
RAIDER: Reinforcement-Aided Spear Phishing Detector
Journal Article -
Zarrin Sworna, Chadni Islam, Muhammad Babar
2022
APIRO: A Framework for Automated Security Tools API Recommendation
Journal Article -
Luke Kane, Vicky Liu, Matthew McKague, Geoffrey Walker
2022
Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
Journal Article -
Roshan Rajapakse, Mansooreh Zahedi, Ali Babar, Haifeng Shen
2022
Challenges and Solutions when Adopting DevSecOps: A Systematic Review
Journal Article -
Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Guntur Putra, Raja Jurdak
2022
A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain
Miscellaneous -
Nadeem Ahmed, Regio Michelin, Wanli Xue, Guntur Putra, Sushmita Ruj, Salil Kanhere, Sanjay Jha
2022
DIMY: Enabling privacy-preserving contact tracing
Journal Article -
Cassandra Cross
2022
Meeting the Challenges of Fraud in a Digital World
Journal Article -
Wencheng Yang, Song Wang, Jiankun HuHu, Nickson Karie
2022
Multimedia security and privacy protection in the internet of things: research developments and challenges
Journal Article -
Vishal Venkatraman, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei
2022
A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks
Miscellaneous -
Guntur Putra, Changhoon Kang, Salil Kanhere, James Hong
2022
DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains
Miscellaneous -
Mubin Haque, Ali Babar
2022
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities
Miscellaneous -
Kristen Moore, Cody Christopher, David Liebowitz, Surya Nepal, Renee Selvey
2022
Modelling direct messaging networks with multiple recipients for cyber deception
Miscellaneous -
H. Le, Huaming Chen, Ali Babar
2022
A survey on data-driven software vulnerability assessment and prioritization
Journal Article -
Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, Jiankun Hu
2022
A Review on Security Issues and Solutions of the Internet of Drones
Journal Article -
Liuyue Jiang, Nguyen Tran, Muhammad Babar
2022
Mod2Dash: A Framework for Model-Driven Dashboards Generation
Journal Article -
Jongkil Jeong, Yevhen Zolotavkin, Robin Doss
2022
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
Journal Article -
Xuelei Wang, Colin Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li
2022
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
Journal Article -
Josephine Dwan, Tamsin Paige, Rob McLaughlin
2022
Pirates of the cyber seas: Are state-sponsored hackers modern-day privateers?
Journal Article -
Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang
2022
Can differential privacy practically protect collaborative deep learning inference for IoT?
Journal Article -
Wencheng Yang, Michael Johnstone, Song Wang, Nickson Karie, Nor bin Sahri, James Kang
2022
Network Forensics in the Era of Artificial Intelligence
Miscellaneous -
Weitao Xu, Wanli Xue, Qi Lin, Guohao Lan, Xingyu Feng, Bo Wei, Chengwen Luo, Wei Li, Albert Zomaya
2022
PrivGait: An Energy-Harvesting-Based Privacy-Preserving User-Identification System by Gait Analysis
Journal Article -
Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha
2022
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool
Journal Article -
Hong-Yen Tran, Jiankun Hu, Hemanshu Pota
2022
A Privacy-preserving State Estimation Scheme for Smart Grids
Journal Article -
Kealan Dunnett, Shantanu Pal, Guntur Putra, Zahra Jadidi, Raja Jurdak
2022
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
Journal Article -
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Kanhere
2022
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
Journal Article -
Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong
2022
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
Journal Article -
Aryan Sharma, Wenqi Jiang, Deepak Mishra, Sanjay Jha, Aruna Seneviratne
2022
Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI
Journal Article -
Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang
2022
Towards Improving the Adoption and Usage of National Digital Identity Systems
Journal Article -
Pathum Arachchige, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertok, Ibrahim Khalil
2022
Local Differential Privacy for Federated Learning
Journal Article -
Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang
2022
Users Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review
Journal Article -
Adam Tonkin, William Kosasih, Marthie Grobler, Mehwish Nasim
2022
Simulating cyber security management: A gamified approach to executive decision making
Journal Article -
Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu
2022
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems
Journal Article -
Liam Riddell, Mohiuddin Ahmed, Paul Haskell-Dowland
2022
Establishment and mapping of heterogeneous anomalies in network intrusion datasets
Journal Article -
Cody Christopher, Kristen Moore, David Liebowitz
2022
SchemaDB: A Dataset for Structures in Relational Data
Journal Article -
Guntur Putra, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak
2022
Blockchain for Trust and Reputation Management in Cyber-Physical Systems
Journal Article -
Wencheng Yang, Song Wang, James Kang, Michael Johnstone, Aseel Bedari
2022
A linear convolution-based cancelable fingerprint biometric authentication system
Journal Article -
Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss
2022
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
Journal Article -
Roland Croft, Ali Babar, Li Li
2022
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources
Journal Article -
David Hin, Andrey Kan, Huaming Chen, Ali Babar
2022
LineVD Statement-level Vulnerability Detection using Graph Neural Networks
Journal Article -
Jongkil Jeong, Marthie Grobler, M. Chamikara
2022
Simplifying Cyber Security Maturity Models through National Culture: A Fuzzy Logic Approach.
Miscellaneous -
Guntur Putra, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak
2022
Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks
Journal Article -
Roland Croft, Ali Babar, Huaming Chen
2022
Noisy label learning for security defects
Journal Article -
Chuka Oham, Regio Michelin, Raja Jurdak, Salil Kanhere, Sanjay Jha
2022
WIDE: A witness-based data priority mechanism for vehicular forensics
Journal Article -
Mohammad Nosouhi, Syed Shah, Lei Pan, Robin Doss
2022
DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems
Journal Article -
Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-young Paik, Surya Nepal
2022
Profiler: Distributed Model to Detect Phishing
Journal Article -
Roland Croft, Yongzheng Xie, Muhammad Babar
2022
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review
Journal Article -
Kevin Saric, Gowri Ramachandran, Shantanu Pal, Raja Jurdak, Surya Nepal
2022
A Universal Deduplication Architecture for Secure and Efficient Cloud Storage
Journal Article -
Zahra Jadidi, Ernest Foo, Mukhtar Hussain, Colin Fidge
2022
Automated Detection-in-depth in Industrial Control Systems
Journal Article -
Zahra Jadidi, Shantanu Pal, Nithesh Nayak, Arawinkumaar Selvakkumar, Chih-Chia Chang, Maedeh Beheshti, Alireza Jolfaei
2022
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems
Journal Article -
Ba Le, Tanveer Zia
2021
Discrete Distribution Estimation with Local Differential Privacy: A Comparative Analysis
Journal Article -
Anna Griffin, Nicola Johnson, Craig Valli, Lyn Vernon
2021
The Impact of Twenty-first Century Skills and Computing Cognition Cyber Skills on Graduates Work Readiness in Cyber Security
Journal Article -
Alexa Palassis, Craig Speelman, Julie Pooley
2021
An Exploration of the Psychological Impact of Hacking Victimization
Journal Article -
Cassandra Cross
2021
Personal Reflections on Researching Fraud: Challenges Surrounding the Ethics of 'Doing'
Journal Article -
Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay Jha
2021
De-Anonymisation Attacks on Tor: A Survey
Journal Article -
Warren Cabral, Craig Valli, Leslie Sikos, Samuel Wakeling
2021
Analysis of Conpot and Its BACnet Features for Cyber-Deception
Journal Article -
Wencheng Yang, Song Wang, Michael Johnstone
2021
A Comparative Study of ML-ELM and DNN for Intrusion Detection
Journal Article -
Nikola Pijovic
2021
The Cyberspace Great Game . The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms
Journal Article -
Warren Cabral, Craig Valli, Leslie Sikos, Samuel Wakeling
2021
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
Journal Article -
Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ahmed, Surya Nepal, Hyoungshick Kim
2021
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN
Journal Article -
Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong
2021
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing
Journal Article -
Shiri Krebs
2021
Predictive Technologies and Opaque Epistemology in Counterterrorism Decision-Making
Journal Article -
Stella Ho, Youyang Qu, Bruce Gu, Longxiang Gao, Jianxin Li, Yong Xiang
2021
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets
Journal Article -
Cheng Shen, Wanli Xue
2021
An Experiment Study on Federated Learning Testbed
Journal Article -
Nadeem Ahmed, Regio Michelin, Wanli Xue, Guntur Putra, Wei Song, Sushmita Ruj, Salil Kanhere, Sanjay Jha
2021
Towards Privacy-preserving Digital Contact Tracing
Journal Article -
Gordon Haylett, Zahra Jadidi, Kien Thanh
2021
System-Wide Anomaly Detection of Industrial Control Systems via Deep Learning and Correlation Analysis
Journal Article -
Guntur Putra, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak, Aleksandar Ignjatovic
2021
Trust-Based Blockchain Authorization for IoT
Journal Article -
Wencheng Yang, Song Wang
2021
A Privacy-Preserving ECG-Based Authentication System for Securing Wireless Body Sensor Networks
Journal Article -
Wencheng Yang, Song Wang, Nor Sahri, Nickson Karie, Mohiuddin Ahmed, Craig Valli
2021
Biometrics for Internet-of-Things Security: A Review
Journal Article -
Roland Croft, Dominic Newlands, Ziyu Chen, Ali Babar
2021
An Empirical Study of Rule-based and Learning-based Approaches for Static Application Security Testing
Miscellaneous -
Triet Le, David Hin, Roland Croft, Ali Babar
2021
Deepcva: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Miscellaneous -
Nickolaos Koroniotis, Nour Moustafa, Benjamin Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke
2021
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments
Miscellaneous -
Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Camtepe, Hyoungshick Kim, Surya Nepal
2021
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Journal Article -
Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke
2021
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports
Journal Article -
Maksym Slavnenko, Yevhen Zolotavkin, Jay Jeong, Veronika Kuchta, Robin Doss
2021
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication
Miscellaneous -
Xuelei Wang, Colin Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li
2021
Feature Selection for Precise Anomaly Detection in Substation Automation Systems
Miscellaneous -
Zahra Jadidi, Yi Lu
2021
A Threat Hunting Framework for Industrial Control Systems
Journal Article -
Shantanu Pal, Zahra Jadidi
2021
Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities
Journal Article -
David Liebowitz, Surya Nepal, Kristen Moore, Cody Christopher, Salil Kanhere, David Nguyen, Roelien Timmer, Michael Longland, Keerth Rathakumar
2021
Deception for Cyber Defence: Challenges and Opportunities
Miscellaneous -
David Holmes, Maria Papathanasaki, Leandros Maglaras, Mohamed Ferrag, Surya Nepal, Helge Janicke
2021
Digital Twins and Cyber Security: Solution or Challenge?
Miscellaneous -
Mingyu Guo, Guanhua Wang, Hideaki Hata, Muhammad Babar
2021
Revenue Maximizing Markets for Zero-day Exploits
Journal Article -
Xuanyu Duan, Mengmeng Ge, Triet Le, Faheem Ullah, Shang Gao, Xuequan Lu, Ali Babar
2021
Automated Security Assessment for the Internet of Things
Miscellaneous -
Zaiwen Feng, Wolfgang Mayer, Markus Stumptner, Georg Grossmann, Selasi Kwashie, Da Ning, Keqing He
2021
ASMaaS: Automatic Semantic Modeling as a Service
Miscellaneous -
Ayman Ibaida, Alsharif Abuadbba, Naveen Chilamkurti
2021
Privacy-preserving compression model for efficient IoMT ECG sharing
Journal Article -
Roelien Timmer, David Liebowitz, Surya Nepal, Salil Kanhere
2021
Can pre-trained Transformers be used in Detecting Complex Sensitive Sentences? A Monsanto case study
Miscellaneous -
Roshan Rajapakse, Mansooreh Zahedi, Muhammad Babar
2021
An Empirical Analysis of Practitioners Perspectives on Security Tool Integration into DevOps
Miscellaneous -
Nikesh Lalchandani, Frank Jiang, Jongkil Jeong, Yevhen Zolotavkin, Robin Doss
2021
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
Miscellaneous -
Cassandra Cross, Rebecca Layt
2021
I Suspect That the Pictures Are Stolen: Romance Fraud, Identity Crime, and Responding to Suspicions of Inauthentic Identities
Journal Article -
Yashothara Shanmugarasa, Hye-young Paik, Salil Kanhere, Liming Zhu
2021
Towards Automated Data Sharing in Personal Data Stores
Journal Article -
Nickson Karie, Nor Sahri, Wencheng Yang, Craig Valli, Victor Kebande
2021
A Review of Security Standards and Frameworks for IoT-based Smart Environments
Journal Article -
Cassandra Cross, Thomas Holt
2021
The Use of Military Profiles in Romance Fraud Schemes
Journal Article -
Guntur Putra, Volkan Dedeoglu, Abhinav Pathak, Salil Kanhere, Raja Jurdak
2021
Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
Miscellaneous -
Yashothara Shanmugarasa, Hye-young Paik, Salil Kanhere, Liming Zhu
2021
Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores
Journal Article -
Shantanu Pal, Zahra Jadidi
2021
Analysis of Security Issues and Countermeasures for the Industrial Internet of Things
Journal Article -
N. Karie, N. Sahri, P. Haskell-Dowland
2020
IoT Threat Detection Advances, Challenges and Future Directions
Miscellaneous -
Jamal Hachem, Vanea Chiprianov, Muhammad Babar, Tarek Khalil, Philippe Aniorte
2020
Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems
Journal Article -
V. Prokhorenko, Ali Babar
2020
Architectural Resilience in Cloud, Fog and Edge Systems: A Survey
Journal Article -
W. Xue, D. Vatsalan, W. Hu, A. Seneviratne
2020
Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters
Journal Article -
Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco Aparicio-Navarro, Antonios Argyriou, Helge Janicke
2020
A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles
Journal Article -
S. Ghorashi, T. Zia, Y. Jiang
2020
Optimisation of Lightweight Klein Encryption Algorithm With 3 S-box
Miscellaneous -
R. Michelin, N. Ahmed, S. Kanhere, A. Seneviratne, S. Jha
2020
Leveraging lightweight blockchain to establish data integrity for surveillance cameras
Miscellaneous -
B. Ahmed, N. Ahmed, A. Malik, M. Jafri, T. Hafeez
2020
Fingerprinting SDN Policy Parameters: An Empirical Study
Journal Article -
Stella Ho, Youyang Qu, Longxing Gao, Jianxin Li, Yong Xiang
2020
Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy
Miscellaneous -
W. Xue, W. Hu, P. Gauranvaram, A. Seneviratne, S. Jha
2020
An Efficient Privacy-preserving IoT System for Face Recognition
Miscellaneous -
Y. Gao, M. Kim, S. Abuadbba, Y. Kim, C. Thapa, K. Kim, S. Camtep, H. Kim, S. Nepal
2020
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Miscellaneous -
W. Yang, M. Johnstone, L. Sikos, S. Wang
2020
Security and Forensics in the Internet of Things: Research Advances and Challenges
Miscellaneous -
Jagriti Jalal, Mayank Singh, Arindam Pal, Lipika Dey, Animesh Mukherjee
2020
Identification, Tracking and Impact: Understanding the Trade Secret of Catchphrases
Miscellaneous -
R. Purwanto, A. Pal, A. Blair, S. Jha
2020
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites
Miscellaneous -
Cross Cassandra
2020
Exploiting trust for financial gain: an overview of business email compromise (BEC) fraud
Journal Article -
Jing Yao., Yifeng Zheng., Cong Wang., Surya Nepal.
2020
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness
Conference Paper -
Shamaila Hayat, Aimal Rextin, Adnan Idris, Mehwish Nasim
2020
Text and phone calls: user behaviour and dual-channel communication prediction
Journal Article -
N. Tran, M. Babar
2020
Anatomy, Concept, and Design Space of Blockchain Networks
Miscellaneous -
Md Islam, Jixue Liu, Jiuyong Li, Lin Liu, Wei Kang
2020
Evidence Weighted Tree Ensembles for Text Classification
Miscellaneous -
Marthie Grobler, M. Chamikara, Jacob Abbott, Jongkil Jeong, Surya Nepal, Cecile Paris
2020
The importance of social identity on password formulations
Journal Article -
W. Xue, C. Luo, Y. Shen, R. Rana, G. Lan, S. Jha, A. Seneviratne, W. Hu
2020
Towards A Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things
Journal Article -
L. Kane, J. Chen, R. Thomas, V. Liu, M. Mckague
2020
Security and Performance in IoT: A Balancing Act
Journal Article -
S. Mazumdar, S. Ruj, R. Singh, A. Pal
2020
HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments
Miscellaneous -
Mark Nerwich, Praveen Gauravaram, Hye-young Paik, Surya Nepal
2020
Vulnerability Database as a Service for IoT
Journal Article -
Roberto Musotto, David Wall
2020
More Amazon than Mafia: analysing a DDoS stresser service as organised cybercrime
Journal Article -
Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva Pokhrel, Surya Nepal, Helge Janicke
2020
Towards IoT Security Automation and Orchestration
Journal Article -
Mansooreh Zahedi, Roshan Rajapakse, Muhammad Babar
2020
Mining Questions Asked about Continuous Software Engineering
Journal Article -
Derek Weber, Mehwish Nasim, Lucia Falzon, Lewis Mitchell
2020
Arson Emergency and Australia s Black Summer: Polarisation and Misinformation on Social Media
Journal Article -
Triet Le, David Hin, Roland Croft, Ali Babar
2020
PUMiner Mining Security Posts from Developer Question and Answer Websites with PU Learning
Journal Article -
Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim
2020
DeepCapture:Image Spam Detection Using Deep Learning and Data Augmentation
Journal Article -
Aryan Sharma, Deepak Mishra, Tanveer Zia, Aruna Seneviratne
2020
A Novel Approach to Channel Profiling Using the Frequency Selectiveness of WiFi CSI Samples
Journal Article -
Nadeem Ahmed, Regio Michelin, Wanli Xue, Sushmita Ruj, Robert Malaney, Salil Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay Jha
2020
A Survey of COVID-19 Contact Tracing Apps
Journal Article -
Wencheng Yang, Song Wang, Kan Yu, James Kang, Michael Johnstone
2020
Secure Fingerprint Authentication with Homomorphic Encryption
Journal Article -
Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Camtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal
2020
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Miscellaneous -
Lianyang Yu, Jiangshan Yu, Yevhen Zolotavkin
2020
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack
Miscellaneous -
X. Han, R. Zhang, X. Liu, F. Jiang
2020
Biologically Inspired Smart Contract: A Blockchain-Based DDoS Detection System
Miscellaneous -
Y. Zheng, H. Duan, C. Wang, R. Wang, S. Nepal
2020
Securely and Efficiently Outsourcing Decision Tree Inference
Journal Article -
Jing Yao, Yifeng Zheng, Yu Guo, Cong Wang
2020
SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search
Miscellaneous -
X. Liu, Y. Zheng, X. Yi, S. Nepal
2020
Privacy-Preserving Collaborative Analytics on Medical Time Series Data
Journal Article -
Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin Fidge
2020
Securing Manufacturing Using Blockchain
Miscellaneous -
Cross Cassandra
2020
Theorising the impact of COVID-19 on the fraud victimisation of older persons
Journal Article -
N. Koroniotis, N. Moustafa, F. Schiliro, P. Gauravaram, H. Janicke
2020
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports
Journal Article -
Roben Lunardi, Regio Michelin, Charles Neu, Henry Nunes, Avelino Zorzo, Salil Kanhere
2019
Impact of Consensus on Appendable-Block Blockchain for IoT
Miscellaneous -
Warren Cabral, Craig Valli, Leslie Sikos, Samuel Wakeling
2019
Review and Analysis of Cowrie Artefacts and Their Potential to be Used Deceptively
Journal Article -
Uzma Maroof, Arash Shaghaghi, Sanjay Jha
2019
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices
Miscellaneous -
B. Le, G. Wang, M. Nasim, M. Babar
2019
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification
Miscellaneous -
A. Uzunov, S. Nepal, Baruwal Chhetri
2019
Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge
Miscellaneous
Acknowledgement of Country
We acknowledge the many Traditional Custodians of Country throughout Australia and honour their Elders past and present.
We respect their deep enduring connection to their lands, waterways and surrounding clan groups since time immemorial. We cherish the richness of First Nations Peoples’ artistic and cultural expressions.
We are privileged to gather on this Country and through this website to share knowledge with future generations.