Follow

Submissions from 2021

PDF

A blockchain-based authentication protocol for cooperative vehicular ad hoc network, A. F. M. S. Akhter, Mohiuddin Ahmed, A. F. M. S. Shah, Adnan Anwar, A. S. M. Kayes, and Ahmet Zengin

PDF

A secured privacy-preserving multi-level blockchain framework for cluster based VANET, A. F.M.Suaib Akhter, Mohiuddin Ahmed, A. F.M.Shahen Shah, Adnan Anwar, and Ahmet Zengin

Link

Advanced cowrie configuration to increase honeypot deceptiveness, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling

PDF

Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis, Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, and Lei Shu

PDF

An energy-efficient and secure data inference framework for internet of health things: A pilot study, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, Paul Haskell-Dowland, and Xi Zheng

Link

Reducing attack surface of edge computing IoT networks via hybrid routing using dedicated nodes, James Jin Kang, Leslie F. Sikos, and Wencheng Yang

Link

Digital forensic readiness implementation in SDN: Issues and challenges, Nickson M. Karie and Craig Valli

PDF

Digital forensic readiness intelligence crime repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, and Sadi Alawadi

PDF

Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Sadi Alawadi

Link

A novel two-factor honeytoken authentication mechanism, Vassilis Papaspirou, Leandros Maglaras, Mohamed A. Ferrag, Ioanna Kantzavelou, Helge Janicke, and Christos Douligeris

Link

Alignment-free cancelable fingerprint templates with dual protection, Muhammad Shahzad, Song Wang, Guang Deng, and Wencheng Yang

Submissions from 2020

Link

Averaged dependence estimators for DoS attack detection in IoT networks, Zubair A. Baig, Surasak Sanguanpong, Syed Naeem Firdous, Van Nhan Vo, Tri Gia Nguyen, and Chakchai So-In

Link

Hybrid routing for man-in-the-middle (MITM) attack detection in IoT networks, James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman, Rolando Trujillo-Rasua, and Paul Haskell-Dowland

PDF

No soldiers left behind: An IoT-based low-power military mobile health system design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, and Paul Haskell-Dowland

Link

Hardening SAML by integrating SSO and Multi-Factor Authentication (MFA) in the Cloud, Nickson M. Karie, Victor R. Kebande, Richard A. Ikuesan, Mehdi Sookhak, and H. S. Venter

PDF

Ontology‐driven perspective of CFRaaS, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Hein S. Venter

Link

Proactive forensics: Keystroke logging from the cloud as potential digital evidence for forensic readiness purposes, Sheunesu M. Makura, H. S. Venter, Richard Adeyemi Ikuesan, Victor R. Kebande, and Nickson M. Karie

Link

Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge's resource diffusion, Likhwa Lothar Mlotshwa, Sheunesu M. Makura, Nickson M. Karie, and Victor R. Kebande

Link

A Möbius transformation based model for fingerprint minutiae variations, James Moorfield, James Wang, Wencheng Yang, Aseel Bedari, and Peter Van Der Kamp

PDF

A network perspective of knowledge transfer in tourism, Hossein Raisi, Rodolfo Baggio, Llandis Barratt-Pugh, and Gregory Willson

Link

Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, Md. Mamunur Rashid, Joarder Kamruzzaman, Mohiuddin Ahmed, Nahina Islam, Santoso Wibowo, and Steven Gordon

Link

Concept drift for big data, Raihan Seraj and Mohiuddin Ahmed

Link

Australian attitudes towards privacy of information: Will COVID-19 make a difference?, Leah Shanley, Michael Johnstone, Michael Crowley, and Patryk Szewczyk

PDF

Denial of service attack detection through machine learning for the IoT, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, and Craig Valli

Link

Security and forensics in the Internet of Things: Research advances and challenges, Wencheng Yang, Michael N. Johnstone, Leslie F. Sikos, and Song Wang

Link

Secure fingerprint authentication with homomorphic encryption, Wencheng Yang, Song Wang, Kan Yu, James Jin Kang, and Michael N. Johnstone

Submissions from 2019

Link

Securing cloud storage by transparent biometric cryptography, Leith Abed, Nathan Clarke, Bogdan Ghita, and Abdulrahman Alruban

Link

Parallel query execution over encrypted data in database‑as‑a‑service (DaaS), Awais Ahmad, Mudassar Ahmad, Muhammad Asif Habib, Shahzad Sarwar, Junaid Chaudhry, Muhammad Ahsan Latif, Saadat Hanif Dar, and Muhammad Shahid

PDF

Knowledge management overview of feature selection problem in high-dimensional financial data: Cooperative co-evolution and Map Reduce perspectives, A. N. M. Bazlur Rashid and Tonmoy Choudhury

Link

Review and analysis of Cowrie artefacts and their potential to be used deceptively, Warren Cabral, Craig Valli, Leslie Sikos, and Samuel Wakeling

Link

Healthcare data breaches: Implications for digital forensic readiness, Maxim Chernyshev, Sherali Zeadally, and Zubair Baig

Link

A novel approach to resource starvation attacks on message queuing telemetry transport brokers, Ricardo Da Paz, Aiden Sehovic, David M. Cook, and Leisa Armstrong

Link

Security and privacy based access control model for internet of connected vehicles, Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P.C. Rodrigues, and Muhammad Sayim Khalil

Link

Division polynomial-based elliptic curve scalar multiplication revisited, SrinivasaRao SubramanyaRao, Zhi Hu, and Chang-An Zhao

Link

Securing deep learning based edge finger-vein biometrics with binary decision diagram, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, Jucheng Yang, and Craig Valli

Link

A privacy-preserving lightweight biometric system for internet of things security, Wencheng Yang, Song Wang, Guanglou Zheng, Jucheng Yang, and Craig Valli

Link

Fingerprint access control for wireless insulin pump systems using cancelable Delaunay triangulations, Guanglou Zhang, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, and Li Qiao