Browse by ANZSRC Socio-Economic Objective codes

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: C | H | J | K | L | M | Y | Z
Number of items at this level: 11.

C

Cianciullo, Louis, and Ghodosi, Hossein (2022) Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results. Journal of computer science and technology, 37 (2). pp. 443-458.

H

Huang, Tao, Yan, Shihao, Zhang, Guanglin, Sun, Li, Yuen, Tsz Hon, Park, YoHan, and Lee, Changhoon (2023) Security and Privacy for Modern Wireless Communication Systems. MDPI, Basel, Switzerland.

J

Jusak, Jusak, Mahmoud, Seedahmed S., Laurens, Roy, Alsulami, Musleh, and Fang, Qiang (2022) A new approach for secure cloud-based Electronic Health Record and its experimental testbed. IEEE Access, 10. pp. 1082-1095.

K

Kerrison, Steve, Jusak, Jusak, and Huang, Tao (2023) Blockchain-Enabled IoT for Rural Healthcare: Hybrid-Channel Communication with Digital Twinning. Electronics, 12 (9).

Kerrison, Steve (2022) IoT Droplocks: Wireless Fingerprint Theft Using Hacked Smart Locks. In: Proceedings of the IEEE Conference on Cybermatics/2022 IEEE International Conferences on Internet of Things. From: IEEE iThings-2022: 15th IEEE International Conference on Internet of Things, 22-25 August 2022, Espoo, Finland.

L

Li, Ruide, Cui, Jinglu, Huang, Tao, Yang, Lei, and Shihao, Yan (2022) Optimal pulse-position modulation order and transmit power in covert communications. IEEE Transactions on Vehicular Technology, 71 (5). pp. 5570-5575.

Laurens, Roy, Rezaeighaleh, Hossein, Zou, Cliff C., and Jusak, Jusak (2019) Using Disposable Domain Names to Detect Online Card Transaction Fraud. In: Proceedings of the IEEE International Conference on Communications. From: ICC 2019: IEEE International Conference on Communications, 20-24 May 2019, Shanghai, China.

M

Meng, Wei, Gu, Yidong, Bao, Jianjun, Gan, Li, Huang, Tao, and Kong, Zhengmin (2023) Cooperative Jamming with AF Relay in Power Monitoring and Communication Systems for Mining. Electronics, 12 (4). 1057.

Y

Yusif, Salifu, and Hafeez-Baig, Abdul (2023) Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework. Journal of Applied Security Research, 18 (2). pp. 267-288.

Yusif, Salifu, and Hafeez-Baig, Abdul (2021) A Conceptual Model for Cybersecurity Governance. Journal of Applied Security Research, 16 (4). pp. 490-513.

Z

Zhang, Bonan, Li, Jingjin, Ward, Lindsay, Zhang, Ying, Chen, Chao, Zhang, Jun, and Wang, Ding (2023) Deep Graph Embedding for IoT Botnet Traffic Detection. Security and Communication Networks, 2023. 9796912.

This list was generated on Sat Dec 21 22:52:40 2024 AEST.