Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | C | D | F | H | K | L | R | S | W | X | Y
Number of items at this level: 23.

B

Banaeian Far, Saeed, Chalak Qazani, Mohamad Reza, Bamakan, Seyed Mojtaba Hosseini, Imani Rad, Azadeh, and Zareravasan, Ahad (2025) A novel Layer 2 framework for breaking the blockchain trilemma problem using MPC-in-the-Head. Computer Networks, 261. 111148.

Ban, Xinbo, Chen, Chao, Liu, Shigang, Wang, Yu, and Zhang, Jun (2019) Deep-learnt features for Twitter spam detection. In: Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data. pp. 208-212. From: SocialSec 2018: International Symposium on Security and Privacy in Social Networks and Big Data, 10-11 December 2018, Santa Clara, CA, USA.

C

Chen, Chao, Wen, Sheng, Zhang, Jun, Xiang, Yang, Oliver, Jonathan, Alelaiwi, Abdulhameed, and Hassan, Mohammad Mehedi (2017) Investigating the deceptive information in twitter spam. Future Generation Computer Systems, 72. pp. 319-326.

Chen, Chao, Wang, Yu, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Min, Geyong (2017) Statistical features-based real-tme detection of drifted Twitter spam. IEEE Transactions on Information Forensics and Security, 12 (4). pp. 914-925.

Chen, Chao, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Oliver, Jonathan (2016) Spammers are becoming "smarter" on Twitter. IT Professional, 18 (2). pp. 66-70.

D

Dillon, Roberto, Lothian, Paul, Grewal, Simran, and Pereira, Daryl (2021) Cyber security: evolving threats in an ever-changing world. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 131-155.

Dillon, Roberto, and Vagal, Vihangi (2021) Reducing cyber risk in remote working. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 157-171.

F

Fei, Gaolei, Cheng, Yong, Ma, Wanlun, Chen, Chao, Wen, Sheng, and Hu, Guangmin (2022) Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method. IEEE Transactions on Computational Social Systems, 10 (2). pp. 656-672.

H

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. In: Lecture Notes in Computer Science (13809) pp. 117-132. From: SecITC 2022: 15th International Conference on Innovative Security Solutions for Information Technology and Communications, 8-9 December 2022, Virtual.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. In: Lecture Notes in Computer Science (14324) pp. 73-86. From: NordSEC 2023: Nordic Conference on Secure IT Systems, 16-17 November 2023, Oslo, Norway.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography. In: Lecture Notes in Computer Science (14252) pp. 235-246. From: ICICS 2023: 25th International Conference on Information and Communications Security, 18-20 November 2023, Tianjin, China.

Hamidi, Amirreza (2023) Pre-distributed information in secure multi-party computation. PhD thesis, James Cook University.

K

Kong, Zhengmin, Cui, Jiaxing, Ding, Li, Huang, Tao, and Yan, Shihao (2024) Jamming precoding in AF relay-aided PLC systems with multiple eavessdroppers. Scientific Reports, 14. 8335.

Kango, Rizwan Ahmed, Qureshi, Mehak Fatima, Keung, Wai Yiu, Qureshi, Umair Mujtaba, Umair, Zuneera, and Kam, Ho Chuen (2024) Predicting User Activities and Device Interactions Using Adversarial Sensor Data: A Machine Learning Approach. In: Proceedings of the IEEE Cyber Security in Networking Conference. pp. 123-127. From: CSNet 2024: IEEE 8th Cyber Security in Networking Conference, 4-6 December 2024, Paris, France.

L

Liu, Liu, De Vel, Olivier, Chen, Chao, Zhang, Jun, and Xiang, Yang (2018) Anomaly-based insider threat detection using deep autoencoders. In: Proceedings of the IEEE International Conference on Data Mining Workshops. pp. 39-48. From: ICDMW 2018: IEEE International Conference on Data Mining Workshops, 17-20 November 2018, Singapore.

Liu, Shigang, Wang, Yu, Zhang, Jun, Chen, Chao, and Xiang, Yang (2017) Addressing the class imbalance problem in twitter spam detection using ensemble learning. Computers & Security, 69. pp. 35-49.

Liu, Shigang, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) An ensemble learning approach for addressing the class imbalance problem in twitter spam detection. In: Lecture Notes in Computer Science (9722) pp. 215-228. From: ACISP 2016: 21st Australasian Conference on Information Security and Privacy, 4-6 July 2016, Melbourne, VIC, Australia.

R

Rajesh, Harsha Mittemari, and Song, Insu (2016) E-commerce websites/blogs - hassles and predicaments. In: Proceedings of the 6th International Conference on Communication and Network Security. pp. 56-61. From: ICCNS 2016: 6th International Conference on Communication and Network Security, 26-29 November 2016, Singapore.

S

Subash, Aditya, Song, Insu, and Tao, Kexin (2023) Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection. In: Lecture Notes in Networks and Systems (693) pp. 879-891. From: ICICT 2023: International Conference on Information and Computer Technologies, 24-26 March 2023, London, UK.

W

Wong, William, Alomari, Zakaria, Shao, Yunlong, and Satti, Muhammad (2024) Knowledge Graph to Facilitate Cloud Security Compliance with NIST Cybersecurity Framework. In: Proceedings of the International Conference on Computer Vision and Intelligent Technology. From: ICCVIT 2024: 2nd International Conference on Computer, Vision and Intelligent Technology, 24-27 November 2024, Huaibei, China.

X

Xie, Bailin, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) Gatekeeping behavior analysis for information credibility assessment on Weibo. In: Lecture Notes in Computer Science (9955) pp. 483-496. From: NSS 2016: 10th International Conference on Network and System Security, 28-30 September 2016, Taipei, Taiwan.

Y

Yusif, Salifu, and Hafeez-Baig, Abdul (2023) Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework. Journal of Applied Security Research, 18 (2). pp. 267-288.

Yusif, Salifu, and Hafeez-Baig, Abdul (2021) A Conceptual Model for Cybersecurity Governance. Journal of Applied Security Research, 16 (4). pp. 490-513.

This list was generated on Fri Dec 12 22:37:08 2025 AEST.