Search Results - "Foo, Ernest"
-
1
An unsupervised method for social network spammer detection based on user information interests
Published in Journal of big data (10-01-2022)“…Online Social Networks (OSNs) are a popular platform for communication and collaboration. Spammers are highly active in OSNs. Uncovering spammers has become…”
Get full text
Journal Article -
2
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
Published in IEEE access (2022)“…In recent decades, cyber security issues in IEC 61850-compliant substation automation systems (SASs) have become growing concerns. Many researchers have…”
Get full text
Journal Article -
3
Machine Learning to Optimise TCP Communications over High Frequency Communications Links
Published in IEEE access (2022)“…High Frequency communication is a proven method of beyond line of sight (BLOS) communications for decades. With the advent of Wideband HF (WBHF), the ability…”
Get full text
Journal Article -
4
Authentication strategies in vehicular communications: a taxonomy and framework
Published in EURASIP journal on wireless communications and networking (21-05-2021)“…In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems…”
Get full text
Journal Article -
5
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market
Published in IEEE access (01-01-2020)“…Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power…”
Get full text
Journal Article -
6
The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications
Published in IEEE open journal of vehicular technology (2023)“…Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred…”
Get full text
Journal Article -
7
Software Vulnerability Detection Using Informed Code Graph Pruning
Published in IEEE access (2023)“…pruning methods that can be used to reduce graph size to manageable levels by removing information irrelevant to vulnerabilities, while preserving relevant…”
Get full text
Journal Article -
8
Anomaly detection for industrial control systems using process mining
Published in Computers & security (01-09-2018)“…Industrial control systems (ICS) are moving from dedicated communications to switched and routed corporate networks, exposing them to the Internet and placing…”
Get full text
Journal Article -
9
Securing DNP3 Broadcast Communications in SCADA Systems
Published in IEEE transactions on industrial informatics (01-08-2016)“…The Distributed Network Protocol version 3 (DNP3) provides Secure Authentication (DNP3-SA) as the mechanism to authenticate unicast messages from a master…”
Get full text
Journal Article -
10
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network
Published in IEEE transactions on information forensics and security (2020)“…Communication in modern cars is managed by a controller area network (CAN) bus protocol and its extensions for electronic control units (ECUs). The CAN bus is…”
Get full text
Journal Article -
11
Discovering a data interpreted petri net model of industrial control systems for anomaly detection
Published in Expert systems with applications (15-11-2023)“…An industrial control system (ICS) can be described as an integration of heterogeneous processes, i.e., a discrete event-driven process at the automatic…”
Get full text
Journal Article -
12
Federated Zero Trust Architecture using Artificial Intelligence
Published in IEEE wireless communications (01-04-2024)“…Cloud computing services have become ubiquitous, and currently, every organization uses some form of cloud computing service. Furthermore, even if an…”
Get full text
Journal Article -
13
CCA-security from adaptive all-but-one lossy trapdoor functions
Published in Theoretical computer science (03-09-2021)“…In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a variant of all-but-one lossy trapdoor functions. An…”
Get full text
Journal Article -
14
A graph representation framework for encrypted network traffic classification
Published in Computers & security (01-01-2025)“…Network Traffic Classification (NTC) is crucial for ensuring internet security, but encryption presents significant challenges to this task. While Machine…”
Get full text
Journal Article -
15
Extending the cyber-attack landscape for SCADA-based critical infrastructure
Published in International journal of critical infrastructure protection (01-06-2019)“…The move from point-to-point serial communication to traditional information technology (IT) networks has created new challenges in providing cyber-security…”
Get full text
Journal Article -
16
Discovering Data-Aware Mode-Switching Constraints to Monitor Mode-Switching Decisions in Supervisory Control
Published in IEEE transactions on industrial informatics (01-06-2022)“…In a multimode industrial control system, mode switching decisions have to follow standard operating procedures which are set for the safety of the system…”
Get full text
Journal Article -
17
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2
Published in IEEE transactions on vehicular technology (01-12-2019)“…Standards such as the American IEEE 1609, European ETSI ITS-G5, and Japanese ARIB STD-T109 aim to establish Cooperative Intelligent Transportation Systems…”
Get full text
Journal Article -
18
Formal modelling and analysis of DNP3 secure authentication
Published in Journal of network and computer applications (01-01-2016)“…Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a…”
Get full text
Journal Article -
19
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications
Published in IEEE transactions on vehicular technology (01-09-2021)“…In the near future, Vehicle-to-Vehicle (V2V) transmission will enable wireless broadcast communication among nearby vehicles. Benefits for users include…”
Get full text
Journal Article -
20
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey
Published in Journal of information security and applications (01-06-2024)“…Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and physical threats aimed at mitigating potential cyber attacks. The rapid evolution…”
Get full text
Journal Article