Items where Subject is "46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Number of items at this level: 18.

Article

Yusif, Salifu, and Hafeez-Baig, Abdul (2023) Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework. Journal of Applied Security Research, 18 (2). pp. 267-288.

Fei, Gaolei, Cheng, Yong, Ma, Wanlun, Chen, Chao, Wen, Sheng, and Hu, Guangmin (2022) Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method. IEEE Transactions on Computational Social Systems, 10 (2). pp. 656-672.

Yusif, Salifu, and Hafeez-Baig, Abdul (2021) A Conceptual Model for Cybersecurity Governance. Journal of Applied Security Research, 16 (4). pp. 490-513.

Liu, Shigang, Wang, Yu, Zhang, Jun, Chen, Chao, and Xiang, Yang (2017) Addressing the class imbalance problem in twitter spam detection using ensemble learning. Computers & Security, 69. pp. 35-49.

Chen, Chao, Wen, Sheng, Zhang, Jun, Xiang, Yang, Oliver, Jonathan, Alelaiwi, Abdulhameed, and Hassan, Mohammad Mehedi (2017) Investigating the deceptive information in twitter spam. Future Generation Computer Systems, 72. pp. 319-326.

Chen, Chao, Wang, Yu, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Min, Geyong (2017) Statistical features-based real-tme detection of drifted Twitter spam. IEEE Transactions on Information Forensics and Security, 12 (4). pp. 914-925.

Chen, Chao, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Oliver, Jonathan (2016) Spammers are becoming "smarter" on Twitter. IT Professional, 18 (2). pp. 66-70.

Book Chapter

Dillon, Roberto, Lothian, Paul, Grewal, Simran, and Pereira, Daryl (2021) Cyber security: evolving threats in an ever-changing world. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 131-155.

Dillon, Roberto, and Vagal, Vihangi (2021) Reducing cyber risk in remote working. In: Kuah, Adrian T.H., and Dillon, Roberto, (eds.) Digital Transformation in a Post-COVID World: sustainable innovation, disruption, and change. CRC Press, Boca Raton, FL, USA, pp. 157-171.

Conference Item

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem. In: Lecture Notes in Computer Science (13809) pp. 117-132. From: SecITC 2022: 15th International Conference on Innovative Security Solutions for Information Technology and Communications, 8-9 December 2022, Virtual.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service. In: Lecture Notes in Computer Science (14324) pp. 73-86. From: NordSEC 2023: Nordic Conference on Secure IT Systems, 16-17 November 2023, Oslo, Norway.

Hamidi, Amirreza, and Ghodosi, Hossein (2023) Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography. In: Lecture Notes in Computer Science (14252) pp. 235-246. From: ICICS 2023: 25th International Conference on Information and Communications Security, 18-20 November 2023, Tianjin, China.

Subash, Aditya, Song, Insu, and Tao, Kexin (2023) Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection. In: Lecture Notes in Networks and Systems (693) pp. 879-891. From: ICICT 2023: International Conference on Information and Computer Technologies, 24-26 March 2023, London, UK.

Ban, Xinbo, Chen, Chao, Liu, Shigang, Wang, Yu, and Zhang, Jun (2019) Deep-learnt features for Twitter spam detection. In: Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data. pp. 208-212. From: SocialSec 2018: International Symposium on Security and Privacy in Social Networks and Big Data, 10-11 December 2018, Santa Clara, CA, USA.

Liu, Liu, De Vel, Olivier, Chen, Chao, Zhang, Jun, and Xiang, Yang (2018) Anomaly-based insider threat detection using deep autoencoders. In: Proceedings of the IEEE International Conference on Data Mining Workshops. pp. 39-48. From: ICDMW 2018: IEEE International Conference on Data Mining Workshops, 17-20 November 2018, Singapore.

Rajesh, Harsha Mittemari, and Song, Insu (2016) E-commerce websites/blogs - hassles and predicaments. In: Proceedings of the 6th International Conference on Communication and Network Security. pp. 56-61. From: ICCNS 2016: 6th International Conference on Communication and Network Security, 26-29 November 2016, Singapore.

Xie, Bailin, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) Gatekeeping behavior analysis for information credibility assessment on Weibo. In: Lecture Notes in Computer Science (9955) pp. 483-496. From: NSS 2016: 10th International Conference on Network and System Security, 28-30 September 2016, Taipei, Taiwan.

Liu, Shigang, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) An ensemble learning approach for addressing the class imbalance problem in twitter spam detection. In: Lecture Notes in Computer Science (9722) pp. 215-228. From: ACISP 2016: 21st Australasian Conference on Information Security and Privacy, 4-6 July 2016, Melbourne, VIC, Australia.

This list was generated on Tue Nov 12 22:44:31 2024 AEST.