Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Clayton D. Scott
muljowidodo kartidjo
Duzgun, H.Sebnem
Juha Pyrhönen
Jean Jourdan
Roland Zumkeller
Maximilian Dürr
Dan Graur
J. L. Zyskind
Chih-Ching Chang
Home
/
Author
/
ERNEST FOO
Author Info
Open Visualization
Name
Affiliation
Papers
ERNEST FOO
Queensland Univ Technol, Sch Data Commun, Informat Secur Res Ctr, Brisbane, Qld 4001, Australia
59
Collaborators
Citations
PageRank
86
276
28.76
Referers
Referees
References
626
930
531
Search Limit
100
930
Publications (59 rows)
Collaborators (86 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
On The Efficiency Of Pairing-Based Authentication For Connected Vehicles: Time Is Not On Our Side!
0
0.34
2021
Cca-Security From Adaptive All-But-One Lossy Trapdoor Functions
0
0.34
2021
Anonymous Lattice Identity-Based Encryption with Traceable Identities
0
0.34
2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications
0
0.34
2021
An Efficient Authentication Scheme For Intra-Vehicular Controller Area Network
0
0.34
2020
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection
0
0.34
2019
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2
0
0.34
2019
Improving performance of intrusion detection system using ensemble methods and feature selection.
0
0.34
2018
Anomaly detection for industrial control systems using process mining.
6
0.50
2018
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols.
1
0.45
2018
Process Discovery For Industrial Control System Cyber Attack Detection
2
0.38
2017
Framework for SCADA cyber-attack dataset creation.
1
0.36
2017
Formal modelling and analysis of DNP3 secure authentication
6
0.50
2016
Automated feature engineering for HTTP tunnel detection.
3
0.41
2016
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures.
13
1.15
2016
Securing DNP3 Broadcast Communications in SCADA Systems.
6
0.47
2016
DNP3 network scanning and reconnaissance for critical infrastructure.
3
0.45
2016
Revocation and update of trust in autonomous delay tolerant networks.
2
0.38
2016
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.
2
0.35
2016
Internet-wide scanning taxonomy and framework
0
0.34
2015
Component modeling for SCADA network mapping
1
0.39
2015
Real-time and interactive attacks on DNP3 critical infrastructure using Scapy
1
0.39
2015
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model
3
0.43
2014
Poisoned GOOSE: exploiting the GOOSE protocol
1
0.38
2014
Security properties analysis in a TPM-based protocol
0
0.34
2014
Typology of phishing email victims based on their behavioural response.
0
0.34
2013
Privacy Compliance Verification in Cryptographic Protocols.
2
0.45
2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
7
0.50
2012
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets
1
0.35
2012
A taxonomy of secure data aggregation in wireless sensor networks
7
0.48
2012
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response
1
0.37
2010
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA
3
0.52
2010
Modeling and Verification of Privacy Enhancing Protocols
4
0.46
2009
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
1
0.35
2009
Conditional Privacy Using Re-encryption
2
0.45
2008
Layered identity infrastructure model for identity meta systems
1
0.36
2008
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks
12
0.64
2008
Secure data aggregation in wireless sensor network: a survey
38
1.35
2008
Strengthening SMS-Based Authentication through Usability
1
0.38
2008
A User-Centric Protocol for Conditional Anonymity Revocation
3
0.41
2008
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets
0
0.34
2007
Toward non-parallelizable client puzzles
20
0.87
2007
Denial-of-service resistance in key establishment
4
0.41
2007
Towards Secure And Legal E-Tendering
2
0.37
2006
Ubiquitous authorization scheme based on device profile
0
0.34
2006
Examining the dos resistance of HIP
2
0.50
2006
Designing secure e-tendering systems
2
0.41
2005
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents
4
0.54
2004
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents
0
0.34
2004
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures
2
0.40
2004
1
2
50 / page