Kimberly Tam

Orcid: 0000-0003-2840-5715

According to our database1, Kimberly Tam authored at least 13 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Red Teaming Framework for Securing AI in Maritime Autonomous Systems.
CoRR, 2023

Security Implications of a Satellite Communication Device on Wireless Networks Using Pentesting.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

2022
Quantifying the econometric loss of a cyber-physical attack on a seaport.
Frontiers Comput. Sci., 2022

Towards a Digital Twin of a Complex Maritime Site for Multi-Objective Optimization.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

2020
Smart Security Audit: Reinforcement Learning with a Deep Neural Network Approximator.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

2019
Situational Awareness: Examining Factors that Affect Cyber-Risks in the Maritime Sector.
Int. J. Cyber Situational Aware., 2019

Factors Affecting Cyber Risk in Maritime.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

Forensic Readiness within the Maritime Sector.
Proceedings of the International Conference on Cyber Situational Awareness, 2019

2018
Cyber-Risk Assessment for Autonomous Ships.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
The Evolution of Android Malware and Android Analysis Techniques.
ACM Comput. Surv., 2017

2016
Analysis and classification of Android malware.
PhD thesis, 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

2015
CopperDroid: Automatic Reconstruction of Android Malware Behaviors.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015


  Loading...