Ernest Foo
Orcid: 0000-0002-3971-6415
According to our database1,
Ernest Foo
authored at least 116 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
IEEE Wirel. Commun., April, 2024
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles.
IEEE Trans. Dependable Secur. Comput., 2024
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey.
J. Inf. Secur. Appl., 2024
2023
Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
Expert Syst. Appl., November, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Access, 2023
The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence.
Proceedings of the 16th International Conference on Sensing Technology, 2023
Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust.
Proceedings of the 16th International Conference on Sensing Technology, 2023
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning.
Proceedings of the Formal Methods and Software Engineering, 2023
A two-pass approach for minimising error in synthetically generated network traffic data sets.
Proceedings of the 2023 Australasian Computer Science Week, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
IEEE Trans. Ind. Informatics, 2022
An unsupervised method for social network spammer detection based on user information interests.
J. Big Data, 2022
A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection.
CoRR, 2022
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems.
IEEE Access, 2022
Machine Learning to Optimize TCP Communications Over High Frequency Communications Links.
IEEE Access, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022
Proceedings of the Australasian Conference on Information Systems, 2022
2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021
Theor. Comput. Sci., 2021
EURASIP J. Wirel. Commun. Netw., 2021
A Drift Aware Hierarchical Test Based Approach for Combating Social Spammers in Online Social Networks.
Proceedings of the Data Mining, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
Proceedings of the Australasian Conference on Information Systems, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market.
IEEE Access, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
On the enhancement of TCP/IP protocol for use in High Frequency Communication Systems.
Proceedings of the 2020 Military Communications and Information Systems Conference, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
Proceedings of the Australasian Computer Science Week, 2020
2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2.
IEEE Trans. Veh. Technol., 2019
Int. J. Crit. Infrastructure Prot., 2019
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection.
Proceedings of the International Conference on Frontiers of Information Technology, 2019
Proceedings of the Australasian Computer Science Week Multiconference, 2019
2018
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols.
Int. J. Crit. Infrastructure Prot., 2018
Comput. Secur., 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the 26th International Conference on Software, 2018
Proceedings of the 2018 Military Communications and Information Systems Conference, 2018
Improving performance of intrusion detection system using ensemble methods and feature selection.
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Modeling for performance and security balanced trading communication systems in the cloud.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IEEE Trans. Ind. Informatics, 2016
J. Netw. Comput. Appl., 2016
ACM Comput. Surv., 2016
Comput. Secur., 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Australasian Computer Science Week Multiconference, 2016
2015
Int. J. Inf. Sec., 2015
Proceedings of the 13th Australasian Information Security Conference, 2015
Proceedings of the 13th Australasian Information Security Conference, 2015
Proceedings of the 38th Australasian Computer Science Conference, 2015
2014
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
2013
IEEE Netw., 2013
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI.
Comput. Secur., 2013
Proceedings of the Information Assurance and Security Education and Training, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the 19th Americas Conference on Information Systems, 2013
2012
Trans. Petri Nets Other Model. Concurr., 2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012
Int. J. Commun. Networks Distributed Syst., 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
Proceedings of the Australasian Conference on Information Systems, 2012
2011
Proceedings of the Australasian Conference on Information Systems, 2011
2010
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response.
Proceedings of the 2010 IEEE International Symposium on Technology and Society, 2010
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009
Proceedings of the Formal Methods and Software Engineering, 2009
2008
Proceedings of the Trust, 2008
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007
2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
Proceedings of the Computer Science 2004, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the Advances in Cryptology, 1998
1997
A taxonomy of electronic cash schemes.
Proceedings of the Information Security in Research and Business, 1997