Robin Doss

Orcid: 0000-0001-6143-6850

Affiliations:
  • Deakin University, Burwood, Victoria, Australia


According to our database1, Robin Doss authored at least 171 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices.
IEEE Trans. Hum. Mach. Syst., October, 2024

Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges.
Mach. Intell. Res., April, 2024

Ransomware early detection: A survey.
Comput. Networks, February, 2024

A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review.
ACM Comput. Surv., January, 2024

A hybrid cyber defense framework for reconnaissance attack in industrial control systems.
Comput. Secur., January, 2024

Toward Higher Levels of Assurance in Remote Identity Proofing.
IEEE Consumer Electron. Mag., January, 2024

State-of-the-art authentication and verification schemes in VANETs: A survey.
Veh. Commun., 2024

A Secure Federated Learning Framework for Residential Short-Term Load Forecasting.
IEEE Trans. Smart Grid, 2024

Examining usable security features and user perceptions of Physical Authentication Devices.
Comput. Secur., 2024

Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning.
Comput. Secur., 2024

CGAN-based cyber deception framework against reconnaissance attacks in ICS.
Comput. Networks, 2024

Provably secure optimal homomorphic signcryption for satellite-based internet of things.
Comput. Networks, 2024

DEMO: Adaptive Fuzz Testing for Automotive ECUs: A Modular Testbed Approach for Enhanced Vulnerability Detection.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

Data-Driven Scalable Mechanisms and Architectures for Secure IoT Connectivity.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

Towards Large Language Model (LLM) Forensics Using LLM-based Invocation Log Analysis.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

TrustMIS: Trust-Enhanced Inference Framework for Medical Image Segmentation.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Advancing NDN Security for IoT: Harnessing Machine Learning to Detect Attacks.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Secure Data Provenance in Internet of Vehicles with Data Plausibility for Security and Trust.
Proceedings of the IEEE World AI IoT Congress, 2024

Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023

Hybrid cyber defense strategies using Honey-X: A survey.
Comput. Networks, July, 2023

Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism.
IEEE Trans. Inf. Forensics Secur., 2023

False data injection threats in active distribution systems: A comprehensive survey.
Future Gener. Comput. Syst., 2023

Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis.
ACM Comput. Surv., 2023

FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination.
CoRR, 2023

Digital Privacy Under Attack: Challenges and Enablers.
CoRR, 2023

Bit Flipping Key Encapsulation for the Post-Quantum Era.
IEEE Access, 2023

Secure Data Provenance for Internet of Vehicles with Verifiable Credentials.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination.
Proceedings of the IEEE INFOCOM 2023, 2023

Misbehaviour Detection for Smart Grids using a Privacy-centric and Computationally Efficient Federated Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2023

ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023

Towards Robust Misbehavior Detection in Power Control Systems: A Gradient Quantization Approach.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023

WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Improving Unlinkability of Attribute-based Authentication through Game Theory.
ACM Trans. Priv. Secur., 2022

Towards Spoofing Resistant Next Generation IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2022

GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids.
Sensors, 2022

FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers.
CoRR, 2022

Traceability in supply chains: A Cyber security analysis.
Comput. Secur., 2022

Zero Trust Architecture (ZTA): A Comprehensive Survey.
IEEE Access, 2022

A Bytecode-based Approach for Smart Contract Classification.
Proceedings of the IEEE International Conference on Software Analysis, 2022

A New Zero-Trust Aided Smart Key Authentication Scheme in IoV.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

BurST-ADMA: Towards an Australian Dataset for Misbehaviour Detection in the Internet of Vehicles.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

Forward Traceability for Product Authenticity Using Ethereum Smart Contracts.
Proceedings of the Network and System Security - 16th International Conference, 2022

The First International Workshop on Cryptographic Security and Information Hiding Technology for IoT System (CSIHTIS 2022): Preface.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Towards Privacy-Preserving Neural Architecture Search.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

A Generic Enhancer for Backdoor Attacks on Deep Neural Networks.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission.
Proceedings of the IEEE International Conference on Communications, 2022

Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

2021
Data congestion in VANETs: research directions and new trends through a bibliometric analysis.
J. Supercomput., 2021

Private and Trustworthy Distributed Lending Model Using Hyperledger Besu.
SN Comput. Sci., 2021

A novel multi-stage distributed authentication scheme for smart meter communication.
PeerJ Comput. Sci., 2021

An Extended Reselling Protocol for Existing Anti-Counterfeiting Schemes.
J. Sens. Actuator Networks, 2021

SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems.
Inf. Sci., 2021

Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT.
IEEE Internet Things J., 2021

SEPN: A Sequential Engagement Based Academic Performance Prediction Model.
IEEE Intell. Syst., 2021

The importance of selecting clustering parameters in VANETs: A survey.
Comput. Sci. Rev., 2021

X-Driven Methodologies for SOA System Development - A Survey.
CoRR, 2021

LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021

Secure and privacy-preserving structure in opportunistic networks.
Comput. Secur., 2021

EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models.
CCF Trans. Pervasive Comput. Interact., 2021

Detecting Internet of Things Bots: A Comparative Study.
IEEE Access, 2021

Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey.
IEEE Access, 2021

Enhancing Privacy Through DMMA: Decision-Making Method for Authentication.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Systematic evaluation of abnormal detection methods on gas well sensor data.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Federated Learning with Extreme Label Skew: A Data Extension Approach.
Proceedings of the International Joint Conference on Neural Networks, 2021

Identifying DNS Exfiltration based on Lexical Attributes of Query Name.
Proceedings of the International Joint Conference on Neural Networks, 2021

Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Digital Twin for Cybersecurity: Towards Enhancing Cyber Resilience.
Proceedings of the Broadband Communications, Networks, and Systems, 2021

2020
A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise.
J. Sens. Actuator Networks, 2020

Secure attribute-based search in RFID-based inventory control systems.
Decis. Support Syst., 2020

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks.
Digit. Commun. Networks, 2020

Problems and Solutions of Service Architecture in Small and Medium Enterprise Communities.
CoRR, 2020

A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology.
IEEE Access, 2020

Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals.
IEEE Access, 2020

A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments.
IEEE Access, 2020

Smart Parking with Computer Vision and IoT Technology.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Avoiding Geographic Regions in Tor.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Opportunistic Tracking in Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Feedback-Driven Lightweight Reputation Scheme for IoV.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets.
Proceedings of the Network and System Security - 14th International Conference, 2020

Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

2019
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems.
J. Sens. Actuator Networks, 2019

Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey.
CoRR, 2019

Privacy-preserving history-based routing in Opportunistic Networks.
Comput. Secur., 2019

An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology.
IEEE Access, 2019

Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments.
IEEE Access, 2019

IoT Insider Attack - Survey.
Proceedings of the Smart Grid and Internet of Things - Third EAI International Conference, 2019

Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic Analysis.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Quorum Chain-Based Malware Detection in Android Smart Devices.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network.
J. Parallel Distributed Comput., 2018

A Novel Approach for Information Discovery in Wireless Sensor Grids.
J. Netw. Syst. Manag., 2018

Trust strategy implementation in OppNets.
Computing, 2018

Packet integrity defense mechanism in OppNets.
Comput. Secur., 2018

Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches.
IEEE Access, 2018

A Scalable and Efficient PKI Based Authentication Protocol for VANETs.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

A New Method for Sharing the Public Keys in Opportunistic Networks.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

Identifying Drawbacks in Malicious PDF Detectors.
Proceedings of the Future Network Systems and Security - 4th International Conference, 2018

2017
Attacks on and Countermeasures for Two RFID Protocols.
Wirel. Pers. Commun., 2017

Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives.
J. Netw. Comput. Appl., 2017

On sensor-based solutions for simultaneous presence of multiple RFID tags.
Decis. Support Syst., 2017

Defense against packet collusion attacks in opportunistic networks.
Comput. Secur., 2017

A secure search protocol for low cost passive RFID tags.
Comput. Networks, 2017

Portguard - an authentication tool for securing ports in an IoT gateway.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

Securing OppNets from Packet Integrity Attacks Using Trust and Reputation.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Query verification schemes for cloud-hosted databases: a brief survey.
Int. J. Parallel Emergent Distributed Syst., 2016

RFID ownership transfer protocol based on cloud.
Comput. Networks, 2016

String matching query verification on cloud-hosted databases.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

Establishing trust relationships in OppNets using Merkle trees.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
Secure Tag Search in RFID Systems Using Mobile Readers.
IEEE Trans. Dependable Secur. Comput., 2015

Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Computers, 2015

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy.
Comput. Commun., 2015

Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks.
Comput. Commun., 2015

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

Malicious Node Traceback in Opportunistic Networks Using Merkle Trees.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

2014
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Inf. Forensics Secur., 2014

Secure yoking proof protocol for RFID systems.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Defense against packet dropping attacks in opportunistic networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
IEEE Trans. Inf. Forensics Secur., 2013

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.
Ad Hoc Networks, 2013

Offline grouping proof protocol for RFID systems.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

RFID tags - Grouping proof with forward security.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

An adaptive approach to information discovery in multi-dimensional wireless sensor networks.
Proceedings of the Seventh International Conference on Sensing Technology, 2013

Comparative study of routing protocols for opportunistic networks.
Proceedings of the Seventh International Conference on Sensing Technology, 2013

Information discovery in multidimensional wireless sensor networks.
Proceedings of the International Conference on Information Networking 2013, 2013

A general cloud firewall framework with dynamic resource allocation.
Proceedings of IEEE International Conference on Communications, 2013

Secure ownership transfer in multi-tag/multi-owner passive RFID systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A minimum disclosure approach to authentication and privacy in RFID systems.
Comput. Networks, 2012

A secure tag ownership transfer scheme in a closed loop RFID system.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012

A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

2011
Traceback of DDoS Attacks Using Entropy Variations.
IEEE Trans. Parallel Distributed Syst., 2011

Prevention of Information Harvesting in a Cloud Services Environment.
Proceedings of the CLOSER 2011, 2011

2010
Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010

Information discovery in mission-critical wireless sensor networks.
Comput. Networks, 2010

Network Resilience in Low-Resource Mobile Wireless Sensor Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

2009
Energy-Efficient Medium Access Control in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Cooperative Relaying in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Improving the QoS for information discovery in autonomic wireless sensor networks.
Pervasive Mob. Comput., 2009

Fast Recovery from Node Compromise in Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

Lightweight Authentication for Recovery in Wireless Sensor Networks.
Proceedings of the MSN 2009, 2009

2008
Information theory based detection against network behavior mimicking DDoS attacks.
IEEE Commun. Lett., 2008

The Crossroads Approach to Information Discovery in Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

A Transformation Model for Heterogeneous Servers.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Exploiting Affinity Propagation for Energy-Efficient Information Discovery in Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Geographic Routing with Cooperative Relaying and Leapfrogging in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Location-Based Cooperative Relaying in Wireless Sensor Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs).
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Prediction based location aided routing for mobile ad hoc networks.
Int. J. Pervasive Comput. Commun., 2006

Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Reliable Event Transfer in Wireless Sensor Networks Deployed for Emergency Response.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Route maintenance using mobility prediction for mobile ad hoc networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

2004
Mobility Prediction Based Routing for Minimizing Control Overhead in Mobile Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

2003
Route discovery and reconstruction in mobile ad hoe networks.
Proceedings of the 11th IEEE International Conference on Networks, 2003

A comparative study of mobility prediction in fixed wireless networks and mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2003


  Loading...