Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460407 System and network security"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | H | K | L | S | T | Y | Z
Number of items at this level: 16.

B

Banaeian Far, Saeed, Chalak Qazani, Mohamadreza, and Imani Rad, Azadeh (2025) Exploring blockchain-based open finance: The role of advanced cryptographic tools, state-of-the-art achievements, and background challenges. Peer-to-Peer Networking and Applications, 18. 157.

H

Huang, Tao, and Jusak, Jusak (2025) Security and Privacy for Modern Wireless Communication Systems, 2nd Edition. Electronics, 14 (12). 2379.

Huang, Tao, Yan, Shihao, Zhang, Guanglin, Sun, Li, Yuen, Tsz Hon, Park, YoHan, and Lee, Changhoon (2023) Security and Privacy for Modern Wireless Communication Systems. MDPI, Basel, Switzerland.

K

Kerrison, Steve, Jusak, Jusak, and Huang, Tao (2023) Blockchain-Enabled IoT for Rural Healthcare: Hybrid-Channel Communication with Digital Twinning. Electronics, 12 (9).

L

Li, Xiaonan, Ghodosi, Hossein, Chen, Chao, Sankupellay, Mangalam, and Lee, Ickjai (2022) Improving Network-Based Anomaly Detection in Smart Home Environment. Sensors, 22 (15). 5626.

Liu, Zhengyang, Zhang, Xiaoyu, Chen, Chenyang, Lin, Shen, and Li, Jingjin (2022) Membership Inference Attacks Against Robust Graph Neural Network. In: Cyberspace Safety and Security, CSS 2022 (13547) pp. 259-273. From: Cyberspace Safety and Security: 14th International Symposium, CSS 2022, 16–18 October 2022, Xi’an, China.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Insider threat identification using the simultaneous neural learning of multi-source logs. IEEE Access, 7. pp. 183162-183176.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Unsupervised insider detection through neural feature learning and model optimisation. In: Lecture Notes in Computer Science (11928) pp. 18-36. From: NSS 2019: 13th International Conference on Network and System Security, 15-18 December 2019, Sapporo, Japan.

Laurens, Roy, Rezaeighaleh, Hossein, Zou, Cliff C., and Jusak, Jusak (2019) Using Disposable Domain Names to Detect Online Card Transaction Fraud. In: Proceedings of the IEEE International Conference on Communications. From: ICC 2019: IEEE International Conference on Communications, 20-24 May 2019, Shanghai, China.

S

Subash, Aditya, Song, Insu, Lee, Ickjai, and Lee, Joanne (2025) Adaptability of current keystroke and mouse behavioral biometric systems: A survey. Computers & Security, 160. 104731.

Subash, Aditya, Song, Insu, Lee, Ickjai, and Lee, Kyungmi (2025) AgeGen Bio Track: Continuous Mouse Behavioral Biometrics-Based Age and Gender Profiling in Online Education Platforms. In: Proceedings of the 17th International Conference on Agents and Artificial Intelligence (3) pp. 383-393. From: ICAART 2025: 17th International Conference on Agents and Artificial Intelligence, 23-25 February 2025, Porto, Portugal.

Subash, Aditya, Song, Insu, Lee, Ickjai, and Lee, Kyungmi (2025) Integrating user demographic parameters for mouse behavioral biometric-based assessment fraud detection in online education platforms. Eurasip Journal on Information Security, 2025. 21.

T

Torten, Ron, Reaiche, Carmen, and Boyle, Stephen (2018) The impact of security awarness on information technology professionals’ behavior. Computers & Security, 79. pp. 68-79.

Y

Yapa, Kanishka, Jayakody, Anuradha, Wijayasekara, Sanika K, Kerrison, Steve, and Primal, Dinith (2025) AI and SDN Based Framework to Mitigate Threats and Vulnerabilities in Internet of Medical Things. International Journal on Communications Antenna and Propagation, 15 (2). pp. 112-121.

Z

Zhang, Bonan, Li, Jingjin, Ward, Lindsay, Zhang, Ying, Chen, Chao, Zhang, Jun, and Wang, Ding (2023) Deep Graph Embedding for IoT Botnet Traffic Detection. Security and Communication Networks, 2023. 9796912.

Zhang, Xiaoyu, Chen, Chao, Xie, Yi, Chen, Xiaofeng, Zhang, Jun, and Xiang, Yang (2022) A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Computer Standards and Interfaces, 83. 103672.

This list was generated on Fri Oct 31 22:36:28 2025 AEST.