Conference Publication |
Pham, VY and Yeom, SJ and Seop Na, I, Security and Privacy in Big Data: A review of current issues and preserving techniques, KSII The 12th International Conference on Internet (ICONI) 2020, 13-16 December 2020, Jeju Island, Korea, pp. 1-6. (2020) [Refereed Conference Paper] |  |
Scanlan, JD and Styles, JM and Lyneham, D and Lutzhoft, MH, New Internet Satellite Constellations to Increase Cyber Risk in Ill-Prepared Industries, Proceedings of the 70th International Astronautical Congress (IAC), 21-25 October, Washington D.C, pp. 1-12. (2019) [Non Refereed Conference Paper] |  |
Berner, G and Hopcraft, R and Scanlan, J and Lutzhoft, MH and Earthy, J, A vrtual teams model for supporting maritime technology management, Proceedings of the 2018 Human Factors Conference , 26-27 September 2018, London, UK, pp. 1-6. (2018) [Non Refereed Conference Paper] |  |
Berner, G and Lutzhoft, M and Scanlan, J, Maritime Cyber Security - Hacking on the High Seas, Proceedings of the 2017 Marine Electrical and Control Systems Safety Conference, 22-23 November 2017, Glasgow, Scotland, pp. 1-7. (2017) [Refereed Conference Paper] |  |
Ahmad, M and Pervez, Z and Kang, BH and Lee, S, O-Bin: oblivious binning for encrypted data over cloud, Proceedings of the 29th International Conference on Advanced Information Networking and Applications, 25-27 March 2015, Gwangju, Korea, pp. 352-357. ISBN 9781479979042 (2015) [Refereed Conference Paper] |  |
Ahmad, M and Pervez, Z and Lee, S and Kang, BH, Task-oriented access model for secure data sharing over cloud, Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication (IMCOM 2015), 8-10 January 2015, Bali, Indonesia, pp. 1-7. ISBN 9781450333771 (2015) [Refereed Conference Paper] |  |
Acuna, M and Ghaffariyan, MR and Mirowski, L and Brown, M, A simulated annealing algorithm to solve the log-truck scheduling problem, Proceedings of the 2014 Precision Forestry Symposium, 3-5 March 2014, Stellenbosch, South Africa, pp. 44-46. ISBN 978-0-7972-1472-9 (2014) [Refereed Conference Paper] |  |
Broucek, V and Turner, P, Technical, legal and ethical dilemmas: distinguishing risks from malware and cyber-attack tools in the age of 'cloud computing', Proceedings of the 21st Annual EICAR Conference , 5-8 May 2012, Lisbon, Portugal, pp. 72-79. (2012) [Refereed Conference Paper] |  |
Palaniappan, G and Chambers, B and Bonney, L and Simeon, L and Hope, S and Birch, C, Building social resilience through understandng capacities of smallholder farming in Papua New Guinea, Proceedings of the 5th World Congress of Conservation Agriculture incorporating 3rd Farming Sytems Design Conference, September 2011, Brisbane, Queensland, pp. 1-4. (2011) [Conference Extract] |  |
Bai, Q and Su, X and Liu, Q and Terhorst, A and Zhang, M and Mu, Y, Case-based trust evaluation from provenance information, Proceedings of the 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 16-18 November 2016, Changsha, China, pp. 336-343. ISBN 978-076954600-1 (2011) [Refereed Conference Paper] | |
Balitanas, MO and Robles, R and Kim, N and Kim, TH, Crossed crypto-scheme in WPA PSK mode, Symposium on Bio-Inspried Learning and Intelligent Systems for Security (BLISS 2009), 20-22 August , Edinburgh, UK, pp. 102-106. ISBN 978-0-7695-3754-2 (2009) [Refereed Conference Paper] |  |
Scanlan, JD and Hartnett, JS and Williams, RN, Machine Learning in a Changing World, AISAT 2009 The 3rd International Workshop on Artificial Intelligence in Science and Technology, 23-24 November 2009, Hobart, Australia EJ ISBN 978-1-86295-550-9 (2009) [Refereed Conference Paper] |  |
Scanlan, JD and Hartnett, JS and Williams, RN, DynamicWEB: A method for reconnaissance activity profiling, Proceedings 2008 International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), 10-12 December 2008, Sydney Australia EJ ISBN 978-0-7695-3471-8 (2008) [Refereed Conference Paper] | |