Παρακολούθηση
Alex Ng
Alex Ng
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα latrobe.edu.au - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Cybersecurity data science: an overview from machine learning perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big data 7, 1-29, 2020
5222020
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
922021
A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues
ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters, A Ng, ...
Sensors 20 (9), 2464, 2020
762020
An evaluation of contemporary commercial SOAP implementations
A Ng, S Chen, P Greenfield
Proceedings of the 5th Australasian Workshop on Software and System …, 2004
642004
Evaluation and modeling of web services performance
S Chen, B Yan, J Zic, R Liu, A Ng
2006 IEEE International Conference on Web Services (ICWS'06), 437-444, 2006
492006
A taxonomy of blockchain threats and vulnerabilities
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, MAPA Watters
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and …, 2020
422020
A study of the impact of compression and binary encoding on SOAP performance
A Ng, P Greenfield, S Chen
Proceedings of the Sixth Australasian Workshop on Software and System …, 2005
292005
Dynamic user-centric access control for detection of ransomware attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
272021
Automated measurement of attitudes towards social distancing using social media: a COVID-19 case study
ASM Kayes, MS Islam, PA Watters, A Ng, H Kayesh
Preprints, 2020
232020
A mechanism to detect and prevent Ethereum blockchain smart contract reentrancy attacks
A Alkhalifah, A Ng, PA Watters, ASM Kayes
Frontiers in Computer Science 3, 598780, 2021
222021
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2021
222021
Forensic characteristics of phishing petty theft or organized crime?
S McCombie, P Watters, A Ng, B Watson
WEBIST 2008-4th International Conference on Web Information Systems and …, 2008
212008
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
162023
An empirical analysis of blockchain cybersecurity incidents
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, M Alazab, PA Watters
IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE …, 2019
162019
An Empirical Analysis of Blockchain Cybersecurity Incidents
A Alkhalifah, A Ng, MJM Chowdhury, ASM Kayes, PA Watters
In 2019 IEEE Asia-Pacific Conference on Computer Science and Data …, 2019
162019
Optimising web services performance with table driven xml
A Ng
Australian Software Engineering Conference (ASWEC'06), 10 pp.-112, 2006
162006
A performance evaluation of distributed database architectures
S Chen, A Ng, P Greenfield
Concurrency and Computation: Practice and Experience 25 (11), 1524-1546, 2013
142013
Trust modeling for blockchain-based wearable data market
MJM Chowdhury, MS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ...
2019 IEEE International Conference on Cloud Computing Technology and Science …, 2019
122019
Inventive approaches for technology integration and information resources management
M Khosrow-Pour
IGI Global, 2014
122014
Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework.
MJM Chowdhury, ASM Kayes, PA Watters, P Scolyer-Gray, A Ng, T Dillon
HICSS, 1-11, 2020
82020
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20