Search Results - "Ko, Ryan K L"

Refine Results
  1. 1

    Business process management (BPM) standards: a survey by Ko, Ryan K.L, Lee, Stephen S.G, Wah Lee, Eng

    Published in Business process management journal (11-09-2009)
    “…Purpose - In the last two decades, a proliferation of business process management (BPM) modeling languages, standards and software systems has given rise to…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders by O’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine, Rimer, Jonah R.

    Published in Crime science (02-12-2020)
    “…Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in…”
    Get full text
    Journal Article
  4. 4

    Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey by Wang, Shunyao, Ko, Ryan K. L., Bai, Guangdong, Dong, Naipeng, Choi, Taejun, Zhang, Yanjun

    Published in IEEE Communications surveys and tutorials (01-04-2024)
    “…Cyber-physical systems (CPS) are increasingly relying on machine learning (ML) techniques to reduce labor costs and improve efficiency. However, the adoption…”
    Get full text
    Journal Article
  5. 5

    Differentially Private Collaborative Coupling Learning for Recommender Systems by Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue, Ko, Ryan K. L.

    Published in IEEE intelligent systems (01-01-2021)
    “…Coupling learning is designed to estimate, discover, and extract the interactions and relationships among learning components. It provides insights into…”
    Get full text
    Journal Article
  6. 6

    Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges by Koay, Abigail M. Y., Ko, Ryan K. L, Hettema, Hinne, Radke, Kenneth

    Published in Journal of intelligent information systems (01-04-2023)
    “…The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS)…”
    Get full text
    Journal Article
  7. 7

    Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids by Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L., Liu, Yilu

    Published in IEEE transactions on smart grid (01-03-2022)
    “…"Source ID Mix" spoofing emerged as a new type of cyber-attack on Distribution Synchrophasors (DS) where adversaries have the capability to swap the source…”
    Get full text
    Journal Article
  8. 8

    Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data by Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew, Ko, Ryan K. L.

    Published in IEEE transactions on smart grid (01-11-2022)
    “…As a typical cyber-physical system, dispersed Phasor Measurement Units (PMUs) are networked together with advanced communication infrastructures to record the…”
    Get full text
    Journal Article
  9. 9

    An exploratory study of organizational cyber resilience, its precursors and outcomes by Tsen, Elinor, Ko, Ryan K L, Slapnicar, Sergeja

    “…Evidence shows that it is paramount for stakeholders to understand the cybersecurity of relevant organizations. However, the secrecy surrounding cyber attacks…”
    Get full text
    Journal Article
  10. 10

    Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids by Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K. L., Liu, Yilu

    Published in IEEE transactions on smart grid (01-09-2021)
    “…This letter proposes a hybrid approach combining Self-Adaptive Mathematical Morphology (SAMM) and Time-Frequency (TF) techniques to authenticate the source…”
    Get full text
    Journal Article
  11. 11

    Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks by Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen, Ko, Ryan K L

    “…Genome-wide analysis has demonstrated both health and social benefits. However, large scale sharing of such data may reveal sensitive information about…”
    Get full text
    Journal Article
  12. 12

    Security and Privacy in Smart Cities by Vorakulpipat, Chalee, Ko, Ryan K. L., Li, Qi, Meddahi, Ahmed

    Published in Security and communication networks (04-08-2021)
    “…Technologies adopted in smart cities mostly are state of the art and may not be found outside smart cities. [...]smart cities today have been used as testbeds…”
    Get full text
    Journal Article
  13. 13

    A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing by Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon, Ko, Ryan K. L.

    “…As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures. The Security-as-a-Service (SECaaS) paradigm…”
    Get full text
    Journal Article
  14. 14

    Realizing credible remote agricultural auditing with trusted video technology by Mahmud, Redowan, Scarsbrook, Joshua D, Ko, Ryan K L, Jarkas, Omar, Hall, Josh, Smith, Stuart, Marshall, Jonathan

    Published in Journal of cybersecurity (Oxford) (2023)
    “…Abstract The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get…”
    Get full text
    Journal Article
  15. 15
  16. 16

    Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks by Xu, Xiaoping, Ren, Guangming, Ko, Ryan K. L., Liu, Lan

    Published in Security and communication networks (01-01-2017)
    “…As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several unaddressed limitations. A key network security research area…”
    Get full text
    Journal Article
  17. 17

    MetropolJS: Visualizing and Debugging Large-Scale JavaScript Program Structure with Treemaps by Scarsbrook, Joshua D, Ko, Ryan K L, Rogers, Bill, Bainbridge, David

    “…As a result of the large scale and diverse composition of modern compiled JavaScript applications, comprehending overall program structure for debugging is…”
    Get full text
    Conference Proceeding
  18. 18
  19. 19

    Business-OWL (BOWL)-A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation by Ko, R. K. L., Lee, E. W., Lee, S. G.

    Published in IEEE transactions on services computing (01-04-2012)
    “…Collaborative Business Processes (cBPs) form the backbone of enterprise integration. With the growing reliance on the web as a medium of business…”
    Get full text
    Journal Article
  20. 20

    TypeScript's Evolution: An Analysis of Feature Adoption Over Time by Scarsbrook, Joshua D., Utting, Mark, Ko, Ryan K. L.

    “…TypeScript is a quickly evolving superset of JavaScript with active development of new features. Our paper seeks to understand how quickly these features are…”
    Get full text
    Conference Proceeding