Robin Doss
Orcid: 0000-0001-6143-6850Affiliations:
- Deakin University, Burwood, Victoria, Australia
According to our database1,
Robin Doss
authored at least 171 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices.
IEEE Trans. Hum. Mach. Syst., October, 2024
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges.
Mach. Intell. Res., April, 2024
A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review.
ACM Comput. Surv., January, 2024
A hybrid cyber defense framework for reconnaissance attack in industrial control systems.
Comput. Secur., January, 2024
IEEE Consumer Electron. Mag., January, 2024
Veh. Commun., 2024
IEEE Trans. Smart Grid, 2024
Examining usable security features and user perceptions of Physical Authentication Devices.
Comput. Secur., 2024
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning.
Comput. Secur., 2024
Comput. Networks, 2024
Provably secure optimal homomorphic signcryption for satellite-based internet of things.
Comput. Networks, 2024
DEMO: Adaptive Fuzz Testing for Automotive ECUs: A Modular Testbed Approach for Enhanced Vulnerability Detection.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
Towards Large Language Model (LLM) Forensics Using LLM-based Invocation Log Analysis.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and Trust.
Proceedings of the IEEE World AI IoT Congress, 2024
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023
Comput. Networks, July, 2023
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Future Gener. Comput. Syst., 2023
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis.
ACM Comput. Surv., 2023
FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination.
CoRR, 2023
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination.
Proceedings of the IEEE INFOCOM 2023, 2023
Misbehaviour Detection for Smart Grids using a Privacy-centric and Computationally Efficient Federated Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2023
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023
Towards Robust Misbehavior Detection in Power Control Systems: A Gradient Quantization Approach.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
ACM Trans. Priv. Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
CoRR, 2022
Proceedings of the IEEE International Conference on Software Analysis, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
BurST-ADMA: Towards an Australian Dataset for Misbehaviour Detection in the Internet of Vehicles.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
The First International Workshop on Cryptographic Security and Information Hiding Technology for IoT System (CSIHTIS 2022): Preface.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission.
Proceedings of the IEEE International Conference on Communications, 2022
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
2021
Data congestion in VANETs: research directions and new trends through a bibliometric analysis.
J. Supercomput., 2021
SN Comput. Sci., 2021
PeerJ Comput. Sci., 2021
J. Sens. Actuator Networks, 2021
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems.
Inf. Sci., 2021
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT.
IEEE Internet Things J., 2021
IEEE Intell. Syst., 2021
Comput. Sci. Rev., 2021
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021
Comput. Secur., 2021
EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models.
CCF Trans. Pervasive Comput. Interact., 2021
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey.
IEEE Access, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment.
Proceedings of the 29th Conference of Open Innovations Association, 2021
Proceedings of the Broadband Communications, Networks, and Systems, 2021
2020
J. Sens. Actuator Networks, 2020
Decis. Support Syst., 2020
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks.
Digit. Commun. Networks, 2020
Problems and Solutions of Service Architecture in Small and Medium Enterprise Communities.
CoRR, 2020
A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
2019
J. Sens. Actuator Networks, 2019
CoRR, 2019
Comput. Secur., 2019
An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology.
IEEE Access, 2019
Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments.
IEEE Access, 2019
Proceedings of the Smart Grid and Internet of Things - Third EAI International Conference, 2019
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019
An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019
Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019
Proceedings of the Applications and Techniques in Information Security, 2019
2018
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network.
J. Parallel Distributed Comput., 2018
J. Netw. Syst. Manag., 2018
IEEE Access, 2018
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018
2017
Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives.
J. Netw. Comput. Appl., 2017
Decis. Support Syst., 2017
Comput. Secur., 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the Future Network Systems and Security - Third International Conference, 2017
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
Int. J. Parallel Emergent Distributed Syst., 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Trans. Computers, 2015
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy.
Comput. Commun., 2015
Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks.
Comput. Commun., 2015
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015
Proceedings of the Future Network Systems and Security - First International Conference, 2015
An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks.
Proceedings of the Future Network Systems and Security - First International Conference, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.
Ad Hoc Networks, 2013
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013
An adaptive approach to information discovery in multi-dimensional wireless sensor networks.
Proceedings of the Seventh International Conference on Sensing Technology, 2013
Proceedings of the Seventh International Conference on Sensing Technology, 2013
Proceedings of the International Conference on Information Networking 2013, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Comput. Networks, 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
Prevention of Information Harvesting in a Cloud Services Environment.
Proceedings of the CLOSER 2011, 2011
2010
J. Inf. Sci. Eng., 2010
Comput. Networks, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
2009
Proceedings of the Guide to Wireless Sensor Networks, 2009
Proceedings of the Guide to Wireless Sensor Networks, 2009
Pervasive Mob. Comput., 2009
Proceedings of the NTMS 2009, 2009
Proceedings of the MSN 2009, 2009
2008
IEEE Commun. Lett., 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Exploiting Affinity Propagation for Energy-Efficient Information Discovery in Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Geographic Routing with Cooperative Relaying and Leapfrogging in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
2006
Int. J. Pervasive Comput. Commun., 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
Reliable Event Transfer in Wireless Sensor Networks Deployed for Emergency Response.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
2004
Mobility Prediction Based Routing for Minimizing Control Overhead in Mobile Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004
2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
A comparative study of mobility prediction in fixed wireless networks and mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2003