Ryan Kok Leong Ko
Orcid: 0000-0003-0804-1176Affiliations:
- The University of Queensland, Brisbane, QLD, Australia
- University of Waikato, New Zealand (former)
According to our database1,
Ryan Kok Leong Ko
authored at least 100 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey.
IEEE Commun. Surv. Tutorials, 2024
Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience.
Proceedings of the ACM on Web Conference 2024, 2024
Scp-bp Framework: Situational Crime Prevention for Managing Data Breaches in Business Processes.
Proceedings of the Business Process Management - 22nd International Conference, 2024
2023
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges.
J. Intell. Inf. Syst., April, 2023
Where is the human in human-centered AI? Insights from developer priorities and user experiences.
Comput. Hum. Behav., April, 2023
J. Cybersecur., January, 2023
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification.
Eng. Appl. Artif. Intell., 2023
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023
2022
Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids.
IEEE Trans. Smart Grid, 2022
Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data.
IEEE Trans. Smart Grid, 2022
Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond.
ACM Trans. Sens. Networks, 2022
An exploratory study of organizational cyber resilience, its precursors and outcomes.
J. Organ. Comput. Electron. Commer., 2022
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review.
Comput. Secur., 2022
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
2021
Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids.
IEEE Trans. Smart Grid, 2021
IEEE Intell. Syst., 2021
CoRR, 2021
CoRR, 2021
CoRR, 2021
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 31st Data Compression Conference, 2021
2020
Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security.
CoRR, 2020
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019
2018
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach.
Proceedings of the 17th IEEE International Conference On Trust, 2018
MetropolJS: visualizing and debugging large-scale javascript program structure with treemaps.
Proceedings of the 26th Conference on Program Comprehension, 2018
2017
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks.
Secur. Commun. Networks, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Cloud Security Ecosystem, 2015
Proceedings of the Cloud Security Ecosystem, 2015
2014
Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks.
Wirel. Pers. Commun., 2014
Secur. Commun. Networks, 2014
Int. J. Cloud Comput., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
OpenStack Café: A Novel Time-Based User-centric Resource Management Framework in the Cloud.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resource Management System.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2012
Business-OWL (BOWL) - A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation.
IEEE Trans. Serv. Comput., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Proceedings of the Formal Concept Analysis - 10th International Conference, 2012
Automating Compliance for Cloud Computing Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
2011
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the World Congress on Services, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
Proceedings of the Advances in Computing and Communications, 2011
2010
2009
ACM Crossroads, 2009
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009
Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning.
Proceedings of the IEEE International Conference on Web Services, 2009