eCite Digital Repository

Items where Subject is Field of Research, Information and Computing Sciences, Cybersecurity and privacy, Cybersecurity and privacy not elsewhere classified

Journal Article
He, Z and Turner, P, Blockchain applications in forestry: a systematic literature review, Applied Sciences, 12, (8) Article 3723. ISSN 2076-3417 (2022) [Refereed Article]
Aghasian, E and Garg, S and Gao, L and Yu, S and Montgomery, J, Scoring users' privacy disclosure across multiple online social networks, IEEE Access, 5 pp. 13118-13130. ISSN 2169-3536 (2017) [Refereed Article]
Wang, L and Wombacher, A and Pires, LF and Van Sinderen, MJ and Chi, C, Robust collaborative process interactions under system crash and network failures, International Journal of Business Process Integration and Management, 6, (4) pp. 326-340. ISSN 1741-8763 (2013) [Refereed Article] 
Kim, T-H and Mohammed, S, Toward designing a secure biosurveillance cloud, Journal of Supercomputing, 65, (1) pp. 61-70. ISSN 0920-8542 (2013) [Refereed Article] 
Hamid, IRA and Abawajy, J and Kim, T-H, Using feature selection and classification scheme for automating phishing email detection, Studies in Informatics and Control, 22, (1) pp. 61-70. ISSN 1220-1766 (2013) [Refereed Article]
Mirowski, LT and Hartnett, JS and Williams, RN, An RFID attacker behaviour taxonomy, IEEE Pervasive Computing, 8, (4) pp. 79-84. ISSN 1536-1268 (2009) [Refereed Article]
Kang, BH and Balintanas, MO, Vulnerabilities of VPN using IPSec and Defensive Measures, International Journal of Advanced Science and Technology, 8, (July 2009) pp. 9-17. ISSN 2005-4238 (2009) [Refereed Article] 
Scanlan, JD and Hartnett, JS, A context aware scan detection system, International Journal of Computer Science and Network Security, 8, (No1, January 2008) EJ ISSN 1738-7906 (2008) [Refereed Article]
de la Motte, L and Hartnett, JS, Using a client-task based approach to achieve a privacy compliant access control system, electronic Journal of Health Informatics (eJHI), 3, (1) EJ ISSN 1446-4381 (2008) [Refereed Article] 
Chapter in Book
Aghasian, E and Garg, S and Montgomery, J, User's Privacy in Recommendation Systems Applying Online Social Network Data: A Survey and Taxonomy, Big Data Recommender Systems - Volume 1: Algorithms, Architectures, Big Data, Security and Trus, Institution of Engineering and Technology, O Khalid, SU Khan, and AY Zomaya (ed), Stevenage, United Kingdom, pp. 259-282. ISBN 978-1-78561-501-6 (2019) [Research Book Chapter] 
Conference Publication
Pham, VY and Yeom, SJ and Seop Na, I, Security and Privacy in Big Data: A review of current issues and preserving techniques, KSII The 12th International Conference on Internet (ICONI) 2020, 13-16 December 2020, Jeju Island, Korea, pp. 1-6. (2020) [Refereed Conference Paper]
Scanlan, JD and Styles, JM and Lyneham, D and Lutzhoft, MH, New Internet Satellite Constellations to Increase Cyber Risk in Ill-Prepared Industries, Proceedings of the 70th International Astronautical Congress (IAC), 21-25 October, Washington D.C, pp. 1-12. (2019) [Non Refereed Conference Paper]
Berner, G and Hopcraft, R and Scanlan, J and Lutzhoft, MH and Earthy, J, A vrtual teams model for supporting maritime technology management, Proceedings of the 2018 Human Factors Conference , 26-27 September 2018, London, UK, pp. 1-6. (2018) [Non Refereed Conference Paper]
Berner, G and Lutzhoft, M and Scanlan, J, Maritime Cyber Security - Hacking on the High Seas, Proceedings of the 2017 Marine Electrical and Control Systems Safety Conference, 22-23 November 2017, Glasgow, Scotland, pp. 1-7. (2017) [Refereed Conference Paper]
Ahmad, M and Pervez, Z and Kang, BH and Lee, S, O-Bin: oblivious binning for encrypted data over cloud, Proceedings of the 29th International Conference on Advanced Information Networking and Applications, 25-27 March 2015, Gwangju, Korea, pp. 352-357. ISBN 9781479979042 (2015) [Refereed Conference Paper]
Ahmad, M and Pervez, Z and Lee, S and Kang, BH, Task-oriented access model for secure data sharing over cloud, Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication (IMCOM 2015), 8-10 January 2015, Bali, Indonesia, pp. 1-7. ISBN 9781450333771 (2015) [Refereed Conference Paper]
Acuna, M and Ghaffariyan, MR and Mirowski, L and Brown, M, A simulated annealing algorithm to solve the log-truck scheduling problem, Proceedings of the 2014 Precision Forestry Symposium, 3-5 March 2014, Stellenbosch, South Africa, pp. 44-46. ISBN 978-0-7972-1472-9 (2014) [Refereed Conference Paper]
Broucek, V and Turner, P, Technical, legal and ethical dilemmas: distinguishing risks from malware and cyber-attack tools in the age of 'cloud computing', Proceedings of the 21st Annual EICAR Conference , 5-8 May 2012, Lisbon, Portugal, pp. 72-79. (2012) [Refereed Conference Paper]
Palaniappan, G and Chambers, B and Bonney, L and Simeon, L and Hope, S and Birch, C, Building social resilience through understandng capacities of smallholder farming in Papua New Guinea, Proceedings of the 5th World Congress of Conservation Agriculture incorporating 3rd Farming Sytems Design Conference, September 2011, Brisbane, Queensland, pp. 1-4. (2011) [Conference Extract]
Bai, Q and Su, X and Liu, Q and Terhorst, A and Zhang, M and Mu, Y, Case-based trust evaluation from provenance information, Proceedings of the 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 16-18 November 2016, Changsha, China, pp. 336-343. ISBN 978-076954600-1 (2011) [Refereed Conference Paper] 
Balitanas, MO and Robles, R and Kim, N and Kim, TH, Crossed crypto-scheme in WPA PSK mode, Symposium on Bio-Inspried Learning and Intelligent Systems for Security (BLISS 2009), 20-22 August , Edinburgh, UK, pp. 102-106. ISBN 978-0-7695-3754-2 (2009) [Refereed Conference Paper]
Scanlan, JD and Hartnett, JS and Williams, RN, Machine Learning in a Changing World, AISAT 2009 The 3rd International Workshop on Artificial Intelligence in Science and Technology, 23-24 November 2009, Hobart, Australia EJ ISBN 978-1-86295-550-9 (2009) [Refereed Conference Paper]
Scanlan, JD and Hartnett, JS and Williams, RN, DynamicWEB: A method for reconnaissance activity profiling, Proceedings 2008 International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 December 2008, Sydney Australia EJ ISBN 978-0-7695-3471-8 (2008) [Refereed Conference Paper] 
Mirowski, LT, A Whole System Approach to Analysis of Security in RFID Systems Using an Integrated Layered and Partitioned Reference Model (2011) [PhD] 
Other Public Output
Scanlan, J, Digital safety law changes: interview with Isabel Bird, The Examiner, Fairfax Regional Media, Launceston, 18 July 2018 (2018) [Media Interview]
Scanlan, J, Cadbury's Tasmania factory returning to normal after cyber attack, union says: interview with Selina Ross, ABC News, Australian Broadcasting Corporation, Australia, 29 June 2017 (2017) [Media Interview]
Scanlan, J, Chocolate factory's cyber meltdown: interview with Helen Kempton, The Mercury, News Corporation Australia, Hobart, Tasmania, 29 June 2017 (2017) [Media Interview]

This list was generated on Sat Mar 25 18:42:18 2023.