Michael N. Johnstone

Orcid: 0000-0001-7192-7098

According to our database1, Michael N. Johnstone authored at least 25 papers between 2001 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
BGP anomaly detection as a group dynamics problem.
Comput. Networks, 2025

2024
A Survey of Advanced Border Gateway Protocol Attack Detection Techniques.
Sensors, October, 2024

Voice Synthesis Improvement by Machine Learning of Natural Prosody.
Sensors, March, 2024

Examination of Traditional Botnet Detection on IoT-Based Bots.
Sensors, February, 2024

Matrix Profile data mining for BGP anomaly detection.
Comput. Networks, 2024

2022
A linear convolution-based cancelable fingerprint biometric authentication system.
Comput. Secur., 2022

A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation.
CoRR, 2021

Towards Evaluating the Effectiveness of Botnet Detection Techniques.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Detection of Induced False Negatives in Malware Samples.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms.
Proceedings of the 31st International Telecommunication Networks and Applications Conference, 2021

A Comparative Study of ML-ELM and DNN for Intrusion Detection.
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021

2020
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Secure Fingerprint Authentication with Homomorphic Encryption.
Proceedings of the Digital Image Computing: Techniques and Applications, 2020

2019
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
Sensors, 2019

2017
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One.
IEEE Trans. Inf. Forensics Secur., 2017

The effectiveness of classification algorithms on IPv6 IID construction.
Int. J. Auton. Adapt. Commun. Syst., 2017

An Exploration of Some Security Issues Within the BACnet Protocol.
Proceedings of the Information Systems Security and Privacy, 2017

Security Issues with BACnet Value Handling.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2015
Controlled Android Application Execution for the IoT Infrastructure.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

2013
Security Aspects of Military Sensor-Based Defence Systems.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Towards Effective Algorithms for Intelligent Defense Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2003
Extending the Business Rules Diagram Method to Web Based System Design.
Proceedings of the Australasian Conference on Information Systems, 2003

2002
Shared Use of Diagrams in Requirements Elicitation: roles, expectations and behaviours.
Proceedings of the Australasian Conference on Information Systems, 2002

2001
Using Ontological Ideas to Facilitate the Comparison of Requirements Elicitation Methods.
Proceedings of the Australasian Conference on Information Systems, 2001


  Loading...