Name
Affiliation
Papers
ERNEST FOO
Queensland Univ Technol, Sch Data Commun, Informat Secur Res Ctr, Brisbane, Qld 4001, Australia
59
Collaborators
Citations 
PageRank 
86
276
28.76
Referers 
Referees 
References 
626
930
531
Search Limit
100930
Title
Citations
PageRank
Year
On The Efficiency Of Pairing-Based Authentication For Connected Vehicles: Time Is Not On Our Side!00.342021
Cca-Security From Adaptive All-But-One Lossy Trapdoor Functions00.342021
Anonymous Lattice Identity-Based Encryption with Traceable Identities00.342021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications00.342021
An Efficient Authentication Scheme For Intra-Vehicular Controller Area Network00.342020
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection00.342019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.200.342019
Improving performance of intrusion detection system using ensemble methods and feature selection.00.342018
Anomaly detection for industrial control systems using process mining.60.502018
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols.10.452018
Process Discovery For Industrial Control System Cyber Attack Detection20.382017
Framework for SCADA cyber-attack dataset creation.10.362017
Formal modelling and analysis of DNP3 secure authentication60.502016
Automated feature engineering for HTTP tunnel detection.30.412016
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures.131.152016
Securing DNP3 Broadcast Communications in SCADA Systems.60.472016
DNP3 network scanning and reconnaissance for critical infrastructure.30.452016
Revocation and update of trust in autonomous delay tolerant networks.20.382016
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.20.352016
Internet-wide scanning taxonomy and framework00.342015
Component modeling for SCADA network mapping10.392015
Real-time and interactive attacks on DNP3 critical infrastructure using Scapy10.392015
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model30.432014
Poisoned GOOSE: exploiting the GOOSE protocol10.382014
Security properties analysis in a TPM-based protocol00.342014
Typology of phishing email victims based on their behavioural response.00.342013
Privacy Compliance Verification in Cryptographic Protocols.20.452012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks70.502012
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets10.352012
A taxonomy of secure data aggregation in wireless sensor networks70.482012
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response10.372010
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA30.522010
Modeling and Verification of Privacy Enhancing Protocols40.462009
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.10.352009
Conditional Privacy Using Re-encryption20.452008
Layered identity infrastructure model for identity meta systems10.362008
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks120.642008
Secure data aggregation in wireless sensor network: a survey381.352008
Strengthening SMS-Based Authentication through Usability10.382008
A User-Centric Protocol for Conditional Anonymity Revocation30.412008
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets00.342007
Toward non-parallelizable client puzzles200.872007
Denial-of-service resistance in key establishment40.412007
Towards Secure And Legal E-Tendering20.372006
Ubiquitous authorization scheme based on device profile00.342006
Examining the dos resistance of HIP20.502006
Designing secure e-tendering systems20.412005
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents40.542004
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents00.342004
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures20.402004
  • 1
  • 2