Asha Rao

Orcid: 0000-0001-6222-282X

According to our database1, Asha Rao authored at least 42 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Gender of Recruiter Makes a Difference: A study into Cybersecurity Graduate Recruitment.
CoRR, 2024

Structuring the Chaos: Enabling Small Business Cyber-Security Risks & Assets Modelling with a UML Class Model.
CoRR, 2024

2023
Comparative study of post-impact motion control of a flexible arm space robot.
Eur. J. Control, January, 2023

Detecting inner-LAN anomalies using hierarchical forecasting.
CoRR, 2023

QC-LDPC Codes From Difference Matrices and Difference Covering Arrays.
IEEE Access, 2023

Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Cell Tour: Learning About the Cellular Membrane Using Virtual Reality.
Proceedings of the IEEE Frontiers in Education Conference, 2023

2022
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection.
Expert Syst. Appl., 2022

2021
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey.
IEEE Internet Things J., 2021

The Invisible COVID-19 Small Business Risks: Dealing with the Cyber-Security Aftermath.
Digit. Gov. Res. Pract., 2021

The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses.
Comput. Secur., 2021

2020
Non-Technical skills needed by cyber security graduates.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

2017
High Rate LDPC Codes from Difference Covering Arrays.
CoRR, 2017

Diagram versus bundle equivalence for ℤ<sub>t</sub> × ℤ<sub>2</sub><sup>2</sup>-cocyclic Hadamard matrices.
Bull. ICA, 2017

2016
Difference Covering Arrays and Pseudo-Orthogonal Latin Squares.
Graphs Comb., 2016

Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study.
CoRR, 2016

Online election campaigning: Identifying political parties using likes and comments.
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016

The spread of ideas in a weighted threshold network.
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016

2015
Using shortest path to discover criminal community.
Digit. Investig., 2015

Ranking the Importance Level of Intermediaries to a Criminal using a Reliance Measure.
CoRR, 2015

A fast and simple method of extracting the backbone of one-mode projections: An aid in the detection of communities.
CoRR, 2015

Predicting Item Popularity: Analysing Local Clustering Behaviour of Users.
CoRR, 2015

A system for tracking and visualizing social interactions in a collaborative work environment.
Proceedings of the Symposium on Simulation for Architecture & Urban Design, 2015

Graph mining indoor tracking data for social interaction analysis.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

2014
A Clustering Coefficient to Identify Important Nodes in Bipartite Networks.
CoRR, 2014

Identifying a Criminal's Network of Trust.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014

Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014

2013
A Family of Alltop Functions that are EA-Inequivalent to the Cubic Function.
IEEE Trans. Commun., 2013

Kathy Horadam: sixty.
Australas. J Comb., 2013

Influence Neighbourhoods in CiteSeer: A Case Study.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

2012
Planar difference functions.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2010
A family of two-weight irreducible cyclic codes.
IEEE Trans. Inf. Theory, 2010

Mutually orthogonal Latin squares and mutually unbiased bases in dimensions of odd prime power - MOLS and MUBs in odd prime power dimensions.
Cryptogr. Commun., 2010

2007
Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over <i>GF</i> ( <i>p</i> , 2).
Proceedings of the Applied Algebra, 2007

A Path to Hadamard Matrices.
Proceedings of the Applied Algebra, 2007

2006
Fourier Transforms from a Weighted Trace Map.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Traitor Tracing Against Powerful Attacks Using Combinatorial Designs.
Proceedings of the Applied Algebra, 2006

2005
New linear codes over Z<sub>ps</sub> via the trace map.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Traitor tracing against powerful attacks.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Cocyclic Simplex Codes of Type alpha Over mmb Z<sub>4</sub> and mmb Z<sub>2</sub><sup>s</sup>.
IEEE Trans. Inf. Theory, 2004

An Image-Guided Heuristic for Planning an Exhaustive Enumeration.
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004

2003
An Information Security Management Model.
Proceedings of the International Conference on Security and Management, 2003


  Loading...