Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460403 Data security and protection"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: J | L | M | T | Z
Number of items at this level: 8.

J

Jusak, Jusak, Mahmoud, Seedahmed S., Laurens, Roy, Alsulami, Musleh, and Fang, Qiang (2022) A new approach for secure cloud-based Electronic Health Record and its experimental testbed. IEEE Access, 10. pp. 1082-1095.

Jusak, Jusak, and Mahmoud, Seedahmed S. (2018) A novel and low processing time ECG security method suitable for sensor node platforms. International Journal of Communication Networks and Information Security, 10 (1). 24. pp. 213-222.

L

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2020) Doc2vec-based insider threat detection through behaviour analysis of multi-source security logs. In: Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing. pp. 301-309. From: TrustCom 2020: IEEE 19th International Conference on Trust, Security and Privacy in Computing, 29 December 2020 - 1 January 2021, Guangzhou, China.

Liu, Zian, Chen, Chao, Liu, Shigang, Liu, Dongxi, and Wang, Yu (2019) Exploit in smart devices: a case study. In: Communications in Computer and Information Science (1095) pp. 152-164. From: SocialSec 2019: 5th International Symposium on Security and Privacy in Social Networks and Big Data, 14-17 July 2019, Copenhagen, Denmark.

Laurens, Roy, Jusak, Jusak, and Zou, Cliff (2018) Invariant diversity as a proactive fraud detection mechanism for online merchants. In: Proceedings of the IEEE Global Communications Conference. From: GLOBECOM 2017: IEEE Global Communications Conference, 4-8 December 2017, Singapore.

M

Miao, Yuantian, Chen, Chao, Pan, Lei, Han, Qing-Long, Zhang, Jun, and Xiang, Yang (2021) Machine learning–based cyber attacks targeting on controlled information: a survey. ACM Computing Surveys, 54 (7). 139. pp. 1-36.

T

Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awarness on information technology professionals’ behavior. Computers & Security, 79. pp. 68-79.

Z

Zhang, Bonan, Li, Jingjin, Chen, Chao, Lee, Kymungi, and Lee, Ickjai (2022) A Practical Botnet Traffic Detection System using GNN. In: Lecture Notes in Computer Science (13172) pp. 66-78. From: CSS 2021: Cyberspace Safety and Security, 9-11 November 2021, Virtual. (In Press)

This list was generated on Thu Sep 29 22:53:24 2022 AEST.