Kim-Kwang Raymond Choo
Kim-Kwang Raymond Choo
Cloud Technology Endowed Professor, University of Texas at San Antonio; Highly Cited Researcher 2020
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα utsa.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
The cyber threat landscape: Challenges and future research directions
KKR Choo
Computers & Security 30 (8), 719–731, 2011
5172011
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
C Esposito, A De Santis, G Tortora, H Chang, KKR Choo
IEEE Cloud Computing 5 (1), 31-37, 2018
3512018
A blockchain future for internet of things security: a position paper
M Banerjee, J Lee, KKR Choo
Digital Communications and Networks 4 (3), 149-160, 2018
2722018
An integrated conceptual digital forensic framework for cloud computing
B Martini, KKR Choo
Digital Investigation 9 (2), 71-80, 2012
2612012
Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework
O Osanaiye, KKR Choo, M Dlodlo
Journal of Network and Computer Applications 67, 147-165, 2016
2592016
From cloud to fog computing: A review and a conceptual live VM migration framework
O Osanaiye, S Chen, Z Yan, R Lu, K Choo, M Dlodlo
IEEE Access 5, 8284-8300, 2017
2382017
A robust and energy efficient authentication protocol for industrial internet of things
X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo
IEEE Internet of Things Journal 5 (3), 1606-1615, 2018
222*2018
A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
HH Pajouh, R Javidan, R Khayami, D Ali, KKR Choo
IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2019
2162019
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo
EURASIP Journal on Wireless Communications and Networking 2016 (1), 1-10, 2016
2132016
Impacts of increasing volume of digital forensic data: A survey and future research challenges
D Quick, KKR Choo
Digital Investigation 11 (4), 273-294, 2014
2092014
A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments
X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo
Journal of Network and Computer Applications 103, 194-204, 2018
1922018
Google Drive: Forensic Analysis of Cloud Storage Data Remnants
D Quick, KKR Choo
Journal of Network and Computer Applications 40, 179--193, 2014
1912014
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo
Computers & Electrical Engineering 61, 266-274, 2017
1902017
Examining indistinguishability-based proof models for key establishment protocols
KKR Choo, C Boyd, Y Hitchcock
Advances in Cryptology-ASIACRYPT 2005, 585-604, 2005
1892005
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges
C Huang, R Lu, KKR Choo
IEEE Communications Magazine 55 (11), 105-111, 2017
1832017
A survey of information security incident handling in the cloud
NH Ab Rahman, KKR Choo
Computers & Security 49, 45–69, 2015
1832015
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
C Lin, D He, X Huang, KKR Choo, AV Vasilakos
Journal of Network and Computer Applications 116, 42-52, 2018
1782018
Anonymous Mutual Authentication and Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129 (2), 429–443, 2017
1772017
Blockchain in healthcare applications: Research challenges and opportunities
T McGhin, KKR Choo, CZ Liu, D He
Journal of Network and Computer Applications 135, 62-75, 2019
1742019
Dropbox analysis: Data remnants on user machines
D Quick, KKR Choo
Digital Investigation 10 (1), 3--18, 2013
1692013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20