Search Results - "Ko, Ryan K L"
-
1
Business process management (BPM) standards: a survey
Published in Business process management journal (11-09-2009)“…Purpose - In the last two decades, a proliferation of business process management (BPM) modeling languages, standards and software systems has given rise to…”
Get full text
Journal Article -
2
Editorial: Human-Centric Security and Privacy
Published in Frontiers in big data (17-02-2022)Get full text
Journal Article -
3
Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders
Published in Crime science (02-12-2020)“…Objective This research uses crime scripts to understand adult retribution-style image-based sexual abuse (RS-IBSA) offender decision-making and offending in…”
Get full text
Journal Article -
4
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Published in IEEE Communications surveys and tutorials (01-04-2024)“…Cyber-physical systems (CPS) are increasingly relying on machine learning (ML) techniques to reduce labor costs and improve efficiency. However, the adoption…”
Get full text
Journal Article -
5
Differentially Private Collaborative Coupling Learning for Recommender Systems
Published in IEEE intelligent systems (01-01-2021)“…Coupling learning is designed to estimate, discover, and extract the interactions and relationships among learning components. It provides insights into…”
Get full text
Journal Article -
6
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Published in Journal of intelligent information systems (01-04-2023)“…The advent of Industry 4.0 has led to a rapid increase in cyber attacks on industrial systems and processes, particularly on Industrial Control Systems (ICS)…”
Get full text
Journal Article -
7
Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids
Published in IEEE transactions on smart grid (01-03-2022)“…"Source ID Mix" spoofing emerged as a new type of cyber-attack on Distribution Synchrophasors (DS) where adversaries have the capability to swap the source…”
Get full text
Journal Article -
8
Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data
Published in IEEE transactions on smart grid (01-11-2022)“…As a typical cyber-physical system, dispersed Phasor Measurement Units (PMUs) are networked together with advanced communication infrastructures to record the…”
Get full text
Journal Article -
9
An exploratory study of organizational cyber resilience, its precursors and outcomes
Published in Journal of organizational computing and electronic commerce (03-04-2022)“…Evidence shows that it is paramount for stakeholders to understand the cybersecurity of relevant organizations. However, the secrecy surrounding cyber attacks…”
Get full text
Journal Article -
10
Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids
Published in IEEE transactions on smart grid (01-09-2021)“…This letter proposes a hybrid approach combining Self-Adaptive Mathematical Morphology (SAMM) and Time-Frequency (TF) techniques to authenticate the source…”
Get full text
Journal Article -
11
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks
Published in IEEE transactions on dependable and secure computing (01-07-2023)“…Genome-wide analysis has demonstrated both health and social benefits. However, large scale sharing of such data may reveal sensitive information about…”
Get full text
Journal Article -
12
Security and Privacy in Smart Cities
Published in Security and communication networks (04-08-2021)“…Technologies adopted in smart cities mostly are state of the art and may not be found outside smart cities. [...]smart cities today have been used as testbeds…”
Get full text
Journal Article -
13
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
Published in IEEE transactions on dependable and secure computing (01-07-2019)“…As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures. The Security-as-a-Service (SECaaS) paradigm…”
Get full text
Journal Article -
14
Realizing credible remote agricultural auditing with trusted video technology
Published in Journal of cybersecurity (Oxford) (2023)“…Abstract The conventional approaches of auditing agricultural commodities from the production and transportation level to the retailers and consumers often get…”
Get full text
Journal Article -
15
Message from the guest editors
Published in International journal of information security (01-02-2020)Get full text
Journal Article -
16
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks
Published in Security and communication networks (01-01-2017)“…As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several unaddressed limitations. A key network security research area…”
Get full text
Journal Article -
17
MetropolJS: Visualizing and Debugging Large-Scale JavaScript Program Structure with Treemaps
Published in 2018 IEEE/ACM 26th International Conference on Program Comprehension (ICPC) (01-05-2018)“…As a result of the large scale and diverse composition of modern compiled JavaScript applications, comprehending overall program structure for debugging is…”
Get full text
Conference Proceeding -
18
Special issue on trust and security in cloud computing
Published in Security and communication networks (01-11-2014)Get full text
Journal Article -
19
Business-OWL (BOWL)-A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation
Published in IEEE transactions on services computing (01-04-2012)“…Collaborative Business Processes (cBPs) form the backbone of enterprise integration. With the growing reliance on the web as a medium of business…”
Get full text
Journal Article -
20
TypeScript's Evolution: An Analysis of Feature Adoption Over Time
Published in 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR) (01-05-2023)“…TypeScript is a quickly evolving superset of JavaScript with active development of new features. Our paper seeks to understand how quickly these features are…”
Get full text
Conference Proceeding