Jarrod Trevathan

Orcid: 0000-0002-7328-8741

According to our database1, Jarrod Trevathan authored at least 57 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hierarchical Decentralized Edge Interoperability.
IEEE Internet Things J., April, 2024

2022
Implementation and Calibration of an IoT Light Attenuation Turbidity Sensor.
Internet Things, 2022

Embedded fog models for remote aquatic environmental monitoring.
Internet Things, 2022

Long range multi-step water quality forecasting using iterative ensembling.
Eng. Appl. Artif. Intell., 2022

Designing an Evaluation Framework for IoT Environmental Monitoring Systems.
Proceedings of the CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist, 2022

2021
An IoT General-Purpose Sensor Board for Enabling Remote Aquatic Environmental Monitoring.
Internet Things, 2021

Detecting multiple seller collusive shill bidding.
Electron. Commer. Res. Appl., 2021

2020
Towards the Development of an Affordable and Practical Light Attenuation Turbidity Sensor for Remote Near Real-Time Aquatic Monitoring.
Sensors, 2020

Up-cycling e-Waste into Innovative Products through Social Enterprise.
Proceedings of the 9th International Conference on Smart Cities and Green ICT Systems, 2020

The Virtual Sensor Concept : Separating Sensor Software from the Hardware.
Proceedings of the 2020 IEEE Sensors, Rotterdam, The Netherlands, October 25-28, 2020, 2020

2019
Collusive shill bidding detection in online auctions using Markov Random Field.
Electron. Commer. Res. Appl., 2019

2018
Smart Environmental Monitoring and Assessment Technologies (SEMAT) - A New Paradigm for Low-Cost, Remote Aquatic Environmental Monitoring.
Sensors, 2018

A Run-Time Algorithm for Detecting Shill Bidding in Online Auctions.
J. Theor. Appl. Electron. Commer. Res., 2018

An intelligent agent system for managing heterogeneous sensors in dispersed and disparate wireless sensor network.
Int. J. Sens. Networks, 2018

Getting into the mind of an "in-auction" fraud perpetrator.
Comput. Sci. Rev., 2018

Detecting Multiple Seller Collusive Shill Bidding.
CoRR, 2018

A Real-Time Detection Algorithm for Identifying Shill Bidders in Multiple Online Auctions.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Real-Time Collusive Shill Bidding Detection in Online Auctions.
Proceedings of the AI 2018: Advances in Artificial Intelligence, 2018

2017
Real-time detection of shill bidding in online auctions: A literature review.
Comput. Sci. Rev., 2017

2016
Allocating Sensor Network Resources Using an Auction-Based Protocol.
J. Theor. Appl. Electron. Commer. Res., 2016

uAuction: Analysis, Design, and Implementation of a Secure Online Auction System.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Analysis on Bidding Behaviours for Detecting Shill Bidders in Online Auctions.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Riskr: a web 2.0 platform to monitor and share disaster information.
Int. J. Grid Util. Comput., 2015

2013
Linked Data for Cross-disciplinary Collaboration Cohort Discovery.
Proceedings of the First International Workshop on Linked Data for Information Extraction (LD4IE 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), 2013

Wireless underwater power and data transfer.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

2012
SEMAT - The Next Generation of Inexpensive Marine Environmental Monitoring and Measurement Systems.
Sensors, 2012

Geological Visualisation with Augmented Reality.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Riskr: A Low-Technological Web2.0 Disaster Service to Monitor and Share Information.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

2011
Targeting the Strategies of a Bid Sniper.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Privacy and Anonymity in Untrusted Data Stores.
Proceedings of the Twenty-Second Australasian Database Conference, 2011

A System for Managing Data Provenance in In Silico Experiments.
Proceedings of the Twenty-Second Australasian Database Conference, 2011

2010
A Private and Anonymous Data Repository Service.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Establishing Low Cost Aquatic Monitoring Networks for Developing Countries.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

2009
Handwritten Signature Verification Using Complementary Statistical Models.
J. Comput., 2009

Online Payments Using Handwritten Signature Verification.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Proactive Approach to Preventing Phishing Attacks Using Pshark.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Analysing Bidding Trends in Online Auctions.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Software Tool for Collecting Data from Online Auctions.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Neural Network-based Hwritten Signature Verification.
J. Comput., 2008

Artificial Intelligence in Sports Prediction.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Markov Model-Based Handwritten Signature Verification.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Investigating Shill Bidding Behaviour Involving Colluding Bidders.
J. Comput., 2007

Implementation and Analysis of a Handwritten Signature Verification Technique.
Proceedings of the SECRYPT 2007, 2007

Detecting Collusive Shill Bidding.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

A Simple Shill Bidding Agent.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Pre-processing of On-line Signals in Noisy Environments.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Bidding Agents That Perpetrate Auction Fraud.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

An Adaptive Shill Bidding Agent.
Proceedings of the ICE-B 2007, 2007

2006
RAS: a system for supporting research in online auctions.
ACM Crossroads, 2006

Randomised Dynamic Traitor Tracing.
Proceedings of the SIGMAP 2006, 2006

Undesirable and Fraudulent Behaviour in Online Auctions.
Proceedings of the SECRYPT 2006, 2006

Secure Online English Auctions.
Proceedings of the E-Business and Telecommunication Networks, 2006

Variable Quantity Market Clearing Algorithms.
Proceedings of the E-Business and Telecommunication Networks, 2006

An Anonymous and Secure Continuous Double Auction Scheme.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Security, anonymity and trust in electronic auctions.
ACM Crossroads, 2005

Design issues for electronic auctions.
Proceedings of the ICETE 2005, 2005

Remote handwritten signature authentication.
Proceedings of the ICETE 2005, 2005


  Loading...