Search Results - "Foo, Ernest"

Refine Results
  1. 1

    An unsupervised method for social network spammer detection based on user information interests by Koggalahewa, Darshika, Xu, Yue, Foo, Ernest

    Published in Journal of big data (10-01-2022)
    “…Online Social Networks (OSNs) are a popular platform for communication and collaboration. Spammers are highly active in OSNs. Uncovering spammers has become…”
    Get full text
    Journal Article
  2. 2

    Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems by Wang, Xuelei, Fidge, Colin, Nourbakhsh, Ghavameddin, Foo, Ernest, Jadidi, Zahra, Li, Calvin

    Published in IEEE access (2022)
    “…In recent decades, cyber security issues in IEC 61850-compliant substation automation systems (SASs) have become growing concerns. Many researchers have…”
    Get full text
    Journal Article
  3. 3

    Machine Learning to Optimise TCP Communications over High Frequency Communications Links by DMello, Alvin, Jayalath, Dhammika, Foo, Ernest, Reid, Jason

    Published in IEEE access (2022)
    “…High Frequency communication is a proven method of beyond line of sight (BLOS) communications for decades. With the advent of Wideband HF (WBHF), the ability…”
    Get full text
    Journal Article
  4. 4

    Authentication strategies in vehicular communications: a taxonomy and framework by Rezazadeh Baee, Mir Ali, Simpson, Leonie, Boyen, Xavier, Foo, Ernest, Pieprzyk, Josef

    “…In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems…”
    Get full text
    Journal Article
  5. 5

    A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market by Tesfamicael, Aklilu Daniel, Liu, Vicky, McKague, Matthew, Caelli, William, Foo, Ernest

    Published in IEEE access (01-01-2020)
    “…Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power…”
    Get full text
    Journal Article
  6. 6

    The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications by Baee, Mir Ali Rezazadeh, Simpson, Leonie, Foo, Ernest, Pieprzyk, Josef

    “…Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred…”
    Get full text
    Journal Article
  7. 7

    Software Vulnerability Detection Using Informed Code Graph Pruning by Gear, Joseph, Xu, Yue, Foo, Ernest, Gauravaram, Praveen, Jadidi, Zahra, Simpson, Leonie

    Published in IEEE access (2023)
    “…pruning methods that can be used to reduce graph size to manageable levels by removing information irrelevant to vulnerabilities, while preserving relevant…”
    Get full text
    Journal Article
  8. 8

    Anomaly detection for industrial control systems using process mining by Myers, David, Suriadi, Suriadi, Radke, Kenneth, Foo, Ernest

    Published in Computers & security (01-09-2018)
    “…Industrial control systems (ICS) are moving from dedicated communications to switched and routed corporate networks, exposing them to the Internet and placing…”
    Get full text
    Journal Article
  9. 9

    Securing DNP3 Broadcast Communications in SCADA Systems by Amoah, Raphael, Camtepe, Seyit, Foo, Ernest

    “…The Distributed Network Protocol version 3 (DNP3) provides Secure Authentication (DNP3-SA) as the mechanism to authenticate unicast messages from a master…”
    Get full text
    Journal Article
  10. 10

    An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network by Palaniswamy, Basker, Camtepe, Seyit, Foo, Ernest, Pieprzyk, Josef

    “…Communication in modern cars is managed by a controller area network (CAN) bus protocol and its extensions for electronic control units (ECUs). The CAN bus is…”
    Get full text
    Journal Article
  11. 11

    Discovering a data interpreted petri net model of industrial control systems for anomaly detection by Hussain, Mukhtar, Fidge, Colin, Foo, Ernest, Jadidi, Zahra

    Published in Expert systems with applications (15-11-2023)
    “…An industrial control system (ICS) can be described as an integration of heterogeneous processes, i.e., a discrete event-driven process at the automatic…”
    Get full text
    Journal Article
  12. 12

    Federated Zero Trust Architecture using Artificial Intelligence by Hussain, Mukhtar, Pal, Shantanu, Jadidi, Zahra, Foo, Ernest, Kanhere, Salil

    Published in IEEE wireless communications (01-04-2024)
    “…Cloud computing services have become ubiquitous, and currently, every organization uses some form of cloud computing service. Furthermore, even if an…”
    Get full text
    Journal Article
  13. 13

    CCA-security from adaptive all-but-one lossy trapdoor functions by Li, Qinyi, Boyen, Xavier, Foo, Ernest

    Published in Theoretical computer science (03-09-2021)
    “…In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a variant of all-but-one lossy trapdoor functions. An…”
    Get full text
    Journal Article
  14. 14

    A graph representation framework for encrypted network traffic classification by Okonkwo, Zulu, Foo, Ernest, Hou, Zhe, Li, Qinyi, Jadidi, Zahra

    Published in Computers & security (01-01-2025)
    “…Network Traffic Classification (NTC) is crucial for ensuring internet security, but encryption presents significant challenges to this task. While Machine…”
    Get full text
    Journal Article
  15. 15

    Extending the cyber-attack landscape for SCADA-based critical infrastructure by Rodofile, Nicholas R., Radke, Kenneth, Foo, Ernest

    “…The move from point-to-point serial communication to traditional information technology (IT) networks has created new challenges in providing cyber-security…”
    Get full text
    Journal Article
  16. 16

    Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control by Hussain, Mukhtar, Fidge, Colin, Foo, Ernest, Jadidi, Zahra

    “…In a multimode industrial control system, mode switching decisions have to follow standard operating procedures which are set for the safety of the system…”
    Get full text
    Journal Article
  17. 17

    Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2 by Baee, Mir Ali Rezazadeh, Simpson, Leonie, Foo, Ernest, Pieprzyk, Josef

    Published in IEEE transactions on vehicular technology (01-12-2019)
    “…Standards such as the American IEEE 1609, European ETSI ITS-G5, and Japanese ARIB STD-T109 aim to establish Cooperative Intelligent Transportation Systems…”
    Get full text
    Journal Article
  18. 18

    Formal modelling and analysis of DNP3 secure authentication by Amoah, Raphael, Camtepe, Seyit, Foo, Ernest

    “…Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a…”
    Get full text
    Journal Article
  19. 19

    A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications by RezazadehBaee, Mir Ali, Simpson, Leonie, Boyen, Xavier, Foo, Ernest, Pieprzyk, Josef

    Published in IEEE transactions on vehicular technology (01-09-2021)
    “…In the near future, Vehicle-to-Vehicle (V2V) transmission will enable wireless broadcast communication among nearby vehicles. Benefits for users include…”
    Get full text
    Journal Article
  20. 20

    Current approaches and future directions for Cyber Threat Intelligence sharing: A survey by Alaeifar, Poopak, Pal, Shantanu, Jadidi, Zahra, Hussain, Mukhtar, Foo, Ernest

    “…Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and physical threats aimed at mitigating potential cyber attacks. The rapid evolution…”
    Get full text
    Journal Article