Ernest Foo

Orcid: 0000-0002-3971-6415

According to our database1, Ernest Foo authored at least 116 papers between 1997 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A graph representation framework for encrypted network traffic classification.
Comput. Secur., 2025

2024
Federated Zero Trust Architecture using Artificial Intelligence.
IEEE Wirel. Commun., April, 2024

A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles.
IEEE Trans. Dependable Secur. Comput., 2024

Current approaches and future directions for Cyber Threat Intelligence sharing: A survey.
J. Inf. Secur. Appl., 2024

2023
Discovering a data interpreted petri net model of industrial control systems for anomaly detection.
Expert Syst. Appl., November, 2023

ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Software Vulnerability Detection Using Informed Code Graph Pruning.
IEEE Access, 2023

The Role of Artificial Intelligence and Blockchain for Future Cyber Threat Intelligence.
Proceedings of the 16th International Conference on Sensing Technology, 2023

Cyber Security Resilience in Industrial Control Systems using Defence-in-Depth and Zero Trust.
Proceedings of the 16th International Conference on Sensing Technology, 2023

A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning.
Proceedings of the Formal Methods and Software Engineering, 2023

A two-pass approach for minimising error in synthetically generated network traffic data sets.
Proceedings of the 2023 Australasian Computer Science Week, 2023

Encrypted Network Traffic Classification with Higher Order Graph Neural Network.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control.
IEEE Trans. Ind. Informatics, 2022

An unsupervised method for social network spammer detection based on user information interests.
J. Big Data, 2022

A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection.
CoRR, 2022

A Digital Twin Framework for Cyber Security in Cyber-Physical Systems.
CoRR, 2022

Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems.
IEEE Access, 2022

Machine Learning to Optimize TCP Communications Over High Frequency Communications Links.
IEEE Access, 2022

SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery.
Proceedings of the IEEE International Conference on Trust, 2022

Design and Development of Automated Threat Hunting in Industrial Control Systems.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

A CNN Based Encrypted Network Traffic Classifier.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

Cybersecurity Maturity Model Capability in Aviation and Railway Industry.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021

On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021

CCA-security from adaptive all-but-one lossy trapdoor functions.
Theor. Comput. Sci., 2021

Authentication strategies in vehicular communications: a taxonomy and framework.
EURASIP J. Wirel. Commun. Netw., 2021

A Drift Aware Hierarchical Test Based Approach for Combating Social Spammers in Online Social Networks.
Proceedings of the Data Mining, 2021

Anonymous Lattice Identity-Based Encryption with Traceable Identities.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Cyber Security Maturity Model Capability at The Airports.
Proceedings of the Australasian Conference on Information Systems, 2021

2020
Continuous authentication for VANET.
Veh. Commun., 2020

An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network.
IEEE Trans. Inf. Forensics Secur., 2020

A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market.
IEEE Access, 2020

Two-stage Unsupervised Approach for Combating Social Spammers.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

On the enhancement of TCP/IP protocol for use in High Frequency Communication Systems.
Proceedings of the 2020 Military Communications and Information Systems Conference, 2020

Compact Multi-Party Confidential Transactions.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

Spam Detection in Social Networks based on Peer Acceptance.
Proceedings of the Australasian Computer Science Week, 2020

2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2.
IEEE Trans. Veh. Technol., 2019

Extending the cyber-attack landscape for SCADA-based critical infrastructure.
Int. J. Crit. Infrastructure Prot., 2019

An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

QoE Estimation Model for a Secure Real-Time Voice Communication System in the Cloud.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2018
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols.
Int. J. Crit. Infrastructure Prot., 2018

Anomaly detection for industrial control systems using process mining.
Comput. Secur., 2018

Assessing Industrial Control System Attack Datasets for Intrusion Detection.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Modeling for a QoS-Efficient Real-Time Video Conferencing System in the Cloud.
Proceedings of the 26th International Conference on Software, 2018

Characterizing TCP/IP for High Frequency Communication Systems.
Proceedings of the 2018 Military Communications and Information Systems Conference, 2018

Improving performance of intrusion detection system using ensemble methods and feature selection.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Reed Solomon Codes for the Reconciliation of Wireless PHY Layer Based Secret Keys.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Process Discovery for Industrial Control System Cyber Attack Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Modeling for performance and security balanced trading communication systems in the cloud.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Framework for SCADA cyber-attack dataset creation.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Securing DNP3 Broadcast Communications in SCADA Systems.
IEEE Trans. Ind. Informatics, 2016

Formal modelling and analysis of DNP3 secure authentication.
J. Netw. Comput. Appl., 2016

A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures.
ACM Comput. Surv., 2016

Revocation and update of trust in autonomous delay tolerant networks.
Comput. Secur., 2016

Automated feature engineering for HTTP tunnel detection.
Comput. Secur., 2016

Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.
Proceedings of the Network and System Security - 10th International Conference, 2016

DNP3 network scanning and reconnaissance for critical infrastructure.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2015
Analysis of two authorization protocols using Colored Petri Nets.
Int. J. Inf. Sec., 2015

Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy.
Proceedings of the 13th Australasian Information Security Conference, 2015

Internet-wide Scanning Taxonomy and Framework.
Proceedings of the 13th Australasian Information Security Conference, 2015

Component Modeling for SCADA Network Mapping.
Proceedings of the 38th Australasian Computer Science Conference, 2015

2014
Security properties analysis in a TPM-based protocol.
Int. J. Secur. Networks, 2014

Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model.
Proceedings of the IEEE International Conference on Communications, 2014

Poisoned GOOSE: Exploiting the GOOSE Protocol.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

Practical Modbus Flooding Attack and Detection.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Cyber security of networked critical infrastructures [Guest Editorial].
IEEE Netw., 2013

Integrity verification of user space code.
Digit. Investig., 2013

Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI.
Comput. Secur., 2013

The Power of Hands-On Exercises in SCADA Cyber Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2013

A Proposed Australian Industrial Control System Security Curriculum.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Typology of phishing email victims based on their behavioural response.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Privacy Compliance Verification in Cryptographic Protocols.
Trans. Petri Nets Other Model. Concurr., 2012

Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012

A taxonomy of secure data aggregation in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2012

Surveying the user space through user allocations.
Digit. Investig., 2012

Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets.
Proceedings of the Tenth Australasian Information Security Conference, 2012

Who is more susceptible to phishing emails?: A Saudi Arabian study.
Proceedings of the Australasian Conference on Information Systems, 2012

2011
IT Governance Adoption in Malaysia: A Preliminary Investigation.
Proceedings of the Australasian Conference on Information Systems, 2011

2010
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response.
Proceedings of the 2010 IEEE International Symposium on Technology and Society, 2010

Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A user-centric federated single sign-on system.
J. Netw. Comput. Appl., 2009

A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009

Modeling and Verification of Privacy Enhancing Protocols.
Proceedings of the Formal Methods and Software Engineering, 2009

2008
Designing a secure e-tender submission protocol.
Electron. Commer. Res., 2008

A User-Centric Protocol for Conditional Anonymity Revocation.
Proceedings of the Trust, 2008

RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

Conditional Privacy Using Re-encryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Strengthening SMS-Based Authentication through Usability.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Layered Identity Infrastructure Model for Identity Meta Systems.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Secure Data Aggregation in Wireless Sensor Network: a survey.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Denial-of-service resistance in key establishment.
Int. J. Wirel. Mob. Comput., 2007

Toward Non-parallelizable Client Puzzles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007

2006
Towards Secure and Legal E-Tendering.
J. Inf. Technol. Constr., 2006

A Secure E-Tender Submission Protocol.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Examining the DoS Resistance of HIP.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Ubiquitous Authorization Scheme Based on Device Profile.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Formal analysis of secure contracting protocol for e-tendering.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
Designing Secure E-Tendering Systems.
Proceedings of the Trust, 2005

2004
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004

An Implementation of the Yao Forward Integrity Protocol for Mobile Agents.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Defining Security Services for Electronic Tendering.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

Visually Sealed and Digitally Signed Documents.
Proceedings of the Computer Science 2004, 2004

A Mobile Agent System Providing Offer Privacy.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An Improved Forward Integrity Protocol for Mobile Agents.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

2000
Linkability in Practical Electronic Cash Design.
Proceedings of the Information Security, Third International Workshop, 2000

Passive Entities: A Strategy for Electronic Payment Design.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Detachable Electronic Coins.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Efficient Electronic Cash Using Batch Signatures.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
A Payment Scheme Using Vouchers.
Proceedings of the Financial Cryptography, 1998

Off-Line Fair Payment Protocols Using Convertible Signatures.
Proceedings of the Advances in Cryptology, 1998

1997
A taxonomy of electronic cash schemes.
Proceedings of the Information Security in Research and Business, 1997


  Loading...