Asha Rao
Orcid: 0000-0001-6222-282X
According to our database1,
Asha Rao
authored at least 42 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Gender of Recruiter Makes a Difference: A study into Cybersecurity Graduate Recruitment.
CoRR, 2024
Structuring the Chaos: Enabling Small Business Cyber-Security Risks & Assets Modelling with a UML Class Model.
CoRR, 2024
2023
Eur. J. Control, January, 2023
IEEE Access, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the IEEE Frontiers in Education Conference, 2023
2022
Expert Syst. Appl., 2022
2021
IEEE Internet Things J., 2021
The Invisible COVID-19 Small Business Risks: Dealing with the Cyber-Security Aftermath.
Digit. Gov. Res. Pract., 2021
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses.
Comput. Secur., 2021
2020
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020
2017
Diagram versus bundle equivalence for ℤ<sub>t</sub> × ℤ<sub>2</sub><sup>2</sup>-cocyclic Hadamard matrices.
Bull. ICA, 2017
2016
Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study.
CoRR, 2016
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016
2015
Ranking the Importance Level of Intermediaries to a Criminal using a Reliance Measure.
CoRR, 2015
A fast and simple method of extracting the backbone of one-mode projections: An aid in the detection of communities.
CoRR, 2015
CoRR, 2015
A system for tracking and visualizing social interactions in a collaborative work environment.
Proceedings of the Symposium on Simulation for Architecture & Urban Design, 2015
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015
2014
CoRR, 2014
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014
Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014
2013
IEEE Trans. Commun., 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2010
Mutually orthogonal Latin squares and mutually unbiased bases in dimensions of odd prime power - MOLS and MUBs in odd prime power dimensions.
Cryptogr. Commun., 2010
2007
Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over <i>GF</i> ( <i>p</i> , 2).
Proceedings of the Applied Algebra, 2007
2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Applied Algebra, 2006
2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
Cocyclic Simplex Codes of Type alpha Over mmb Z<sub>4</sub> and mmb Z<sub>2</sub><sup>s</sup>.
IEEE Trans. Inf. Theory, 2004
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004
2003
An Information Security Management Model.
Proceedings of the International Conference on Security and Management, 2003