Published Articles

2020

  • Alex Tudu, David Bainbridge, and Bill Rogers. 2020. Finding a Safe Port: Cyber-Security Analysis for Open Source Digital Library Software. In Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020 (JCDL '20). Association for Computing Machinery, New York, NY, USA, 349–352. {LINK}

  •  ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection. The link to the paper will be uploaded soon. Here is the link to the conference that accepted the paper{LINK}

2019

  • Kumar, V. (2019). A bilinear pairing based secure data aggregation scheme for WSNs. In Proc 15th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 102-107). Tangier, Morocco: IEEE. doi:10.1109/iwcmc.2019.8766759 Open Access version: {LINK}

  • Dekker, M., & Kumar, V. (2019). Using Audio Characteristics for Mobile Device Authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 11928 LNCS (pp. 98-113). doi:10.1007/978-3-030-36938-5_6

  • Chew, C., & Kumar, V. (2019). Behaviour based ransomware detection. In G. Lee, & Y. Jin (Eds.), Proc 34th International Conference on Computers and Their Applications (CATA 2019) Vol. 58 (pp. 127-136). EasyChair. doi:10.29007/t5q7

  • Podolskiy, V., Mayo, M., Koay, A., Gerndt, M., & Patros, P. (2019). Maintaining SLOs of cloud-native applications via self-adaptive resource sharing. In Proc 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2019) (pp. 72-81). Umeå, Sweden: IEEE. doi:10.1109/SASO.2019.00018

  • Koay, A., Welch, I., & Seah, W. K. G. (2019). Effectiveness of entropy-based features in high-and low-intensity DDoS attacks detection. In N. Attrapadung, & T. Yagi (Eds.), Proc 14th International Workshop on Security (IWSEC 2019), Advances in Information and Computer Security, LNCS 11689 (pp. 207-217). Tokyo, Japan: Springer. doi:10.1007/978-3-030-26834-3_12

  • Koay, A. (2019). Detecting high and low intensity Distributed Denial of Service (DDoS) attacks. (PhD Thesis, Victoria University of Wellington). Retrieved from http://hdl.handle.net/10063/8069

2018

  • Ko, R. K. L., Rodrigues, M., Ladur, A., Scoon, C. (2018). Towards One Global Privacy Law. Asia Global Online 2018, {LINK}
     
  • Scarsbrook, J., Ko, R. K. L.,Rogers, b. & Bainbridge, D.,(2018). MetropolJS: Visualizing and Debugging Large-Scale JavaScript Program Structure with Treemaps , in proceedings of 2018 IEEE/ACM 26th International Conference on Program Comprehension (ICPC 2018), co-located with ICSE 2018, 27-28 May 2018, Gothenburg, Sweden, {LINK}

  • Garae,J., Ko, R. K. L., & Apperley, M., (2018). A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach, 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-18), New York, USA, 31 July - 3 August, IEEE Computer Society, IEEE, 2018.{LINK}

  • Takahashi, T., Castro, R. R., Ko, R. K. L.,Silverajan, B. & Tabet, S.,(2018).Special Issue on Internet-of-Things (IoT) Security and Privacy, International Journal of Information Security, 2018,{LINK}

  • Kumar, V., Spanias, A., Sen, A., & Madria, S. (2018). Secure Sensor Cloud. Morgan & Claypool. doi:10.2200/S00886ED1V01Y201811ASE018

  • Mrema, E., & Kumar, V. (2018). Fine grained attribute based access control of healthcare data. In Proc 12th International Symposium on Medical Information and Communication Technology (ISMICT 2018) (pp. 5 pages). Conference held Sydney, Australia: IEEE. doi:10.1109/ISMICT.2018.8573699

  • Shafi, Q., Basit, A., Qaisar, S., Koay, A., & Welch, I. (2018). Fog-Assisted SDN controlled framework for enduring anomaly detection in an IoT network. IEEE Access6, 73713-73723. doi:10.1109/access.2018.2884293

  • Koay, A., Chen, A., Welch, I., & Seah, W. K. G. (2018). A new multi classifier system using entropy-based features in DDoS attack detection. In Proc 2018 International Conference on Information Networking (ICOIN) (pp. 162-167). Boston, USA: IEEE. doi:10.1109/icoin.2018.8343104

2017

  • Ko, R. K. L., Phua, T. W. (2017). The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance. International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 180-193, Springer, Cham. doi:10.1007/978-3-319-72395-2_18, {PDF}
     
  • Garae J., Ko, R. K. L., Apperley, M. (2017). Security visualization for cloud computing: an overview. Data Security in Cloud Computing, Institution of Engineering and Technology, 2017, pp. 277-295 doi:10.1049/PBSE007E_ch13
     
  • Garae J., Ko, R. K. L. (2017). Visualization and Data Provenance Trends in Decision Support for Cybersecurity. Data Analytics and Decision Support for Cybersecurity, Springer, Cham, 2017, pp. 243–270 doi:10.1007/978-3-319-59439-2_9
     
  • Garae J., Ko, R. K. L., Kho, J., Suwadi, S., Will, M. A., Apperley, M. (2017). Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors. Trustcom/BigDataSE/ICESS 2017 {PDF}
     
  • Shute, S., Ko, R. K. L., Chaisiri, S. (2017). Attribution using Keyboard Row Based Behavioural Biometrics for Handedness Recognition. Trustcom/BigDataSE/ICESS 2017 {PDF}
     
  • Will, M. A., Ko, R. K. L., Schlickmann, S. J. (2017). Anonymous Data sharing Between Organisations with Elliptic Curve Cryptography. Trustcom/BigDataSE/ICESS 2017 {PDF}
     
  • Will, M. A., Ko, R. K. L. (2017). Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud. Trustcom/BigDataSE/ICESS 2017 {PDF}
     
  • Chase, J., Niyato, D., Wang, P., Chaisiri, S., Ko, R. K. L. (2017). A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. IEEE Transactions on Dependable and Secure Computing. vol.PP, no.99, pp.1-1 doi:10.1109/TDSC.2017.2703626 {PDF}
     
  • Liu, L., Ko, R. K. L., Ren, G., & Xu, X. (2017). Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. Security and Communication Networks. vol. 2017, Article ID 2910310, 8 pages, 2017. doi:10.1155/2017/2910310 {PDF}
     
  • Will, M. A., Garae, J., Tan, A. Y. S., Scoon, C., & Ko, R. K. L. (2017). Returning Control of Data to Users with a Personal Information Crunch - A Position Paper. International Conference on Cloud Computing Research and Innovation. {PDF}

  • Tang, C., Kumar, V., & Chaisiri, S. (2017). Understanding software-defined perimeter. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 151-169). London: IET. doi:10.1049/PBSE007E_ch7

  • Bowen, J., Hinze, A., Griffiths, C., Kumar, V., & Bainbridge, D. (2017). Personal data collection in the workplace: ethical and technical challenges. In Proc 31st British Human Computer Interaction Conference (HCI 2017) (pp. 10 pages). Conference held Sunderland, UK. doi:10.14236/ewic/HCI2017.57

  • Kumar, V., Chaisiri, S., & Ko, R. (2017). A data-centric view of cloud security. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 1-17). London: IET. doi:10.1049/PBSE007E_ch1

2016

  • Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R., & Alcaraz Calero, J. M. (2016). Preface: Proc 4th International Symposium on Security in Computing and Communications. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625. Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3
     
  • Will, M. A., & Ko, R. K. L. (2016). Computing mod with a variable lookup table. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625 (pp. 3-17). Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3_1, {PDF}
     
  • Garae, J., Ko, R. K. L., & Chaisiri, S. (2016). UVisP: User-centric Visualization of Data Provenance with Gestalt Principles. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0294, {PDF}
     
  • Will, M. A., Ko, R. K. L., & Whitten, I. H. (2016). Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0154, {PDF}
     
  • Stricot-Tarboton, S., Chaisiri, S., & Ko, R. K. L. (2016). Taxonomy of Man-in-the-Middle Attacks on HTTPS. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0106, {PDF}
     
  • Chaisiri, S., & Ko, R. K. L. (2016). From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0107, {PDF}
     
  • Scoon C., & Ko, R. K. L. (2016). The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. In IEEE Trsutcom/BigDataSE/ISPA. 10.1109/TrustCom.2016.0305, {PDF}

2015

  • Will, M. A., Nicholson, B., Tiehuis, M., & Ko, R. K. L. (2015). Secure voting in the cloud using homomorphic encryption and mobile agents. In Proc 2015 International Conference on Cloud Computing Research and Innovation (pp. 173-184). Singapore: IEEE. doi:10.1109/ICCCRI.2015.30, {PDF}
     
  • Ko, R. K. L., & Choo, K. -K. R. (2015). Cloud security ecosystem. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 1-14). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00001-X
     
  • Ko, R. K. L., & Choo, K. -K. R. (2015). The cloud security ecosystem: technical, legal, business and management issues. online: Elsevier Inc. doi:10.1016/B978-0-12-801595-7.09991-2
     
  • Will, M. A., & Ko, R. K. L. (2015). A guide to homomorphic encryption. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 101-127). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00005-7
     
  • Tan, A. Y. S., Ko, R. K. L., Holmes, G., & Rogers, B. (2015). Provenance for cloud data accountability. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 171-185). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00008-2
     
  • Delamore, B., & Ko, R. K. L. (2015). Security as a service (SaaS)—An overview. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 187-203). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00009-4
     
  • Wu, Y., Ko, R., Javadi, B., & Al-Dubai, A. (2015). Message from the ITA 2015 symposium chairs. In Proc 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing (pp. lviii). Liverpool, UK: IEEE. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.389
     
  • Ko, R. K. L., Russello, G., Nelson, R., Pang, S., Cheang, A., Dobbie, G., . . . Holmes, G. (2015). STRATUS: Towards returning data control to cloud users. In G. Wang, A. Zomaya, G. M. Perez, & K. Li (Eds.), Algorithms and Architectures for Parallel Processing: ICA3PP International Workshops and Symposiums Proceedings Vol. LNCS 9532 (pp. 57-70). Zhangjiajie, China: Springer International Publishing. doi:10.1007/978-3-319-27161-3_6, {PDF}
     
  • Akram, R. N., & Ko, R. K. L. (2015). Unified model for data security - A position paper. In Proc 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 831-839). Beijing: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.110, {PDF}
     
  • Delamore, B., & Ko, R. K. L. (2015). Escrow: A large-scale web vulnerability assessment tool. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 983-988). Beijing: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.130, {PDF}
     
  • Akram, R. N., & Ko, R. K. L. (2015). Digital trust - trusted computing and beyond: A position paper. In Proceedings 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 884-892). Beijing: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.116, {PDF}
     
  • Ko, R. K. L., & Delamore, B. (2015). A global, empirical analysis of the Shellshock Vulnerability in Web applications. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1129-1135). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.493
     
  • Will, M., Ko, R. K. L., & Witten, I. (2015). Bin encoding: a user-centric secure full-text search scheme for the Cloud. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 563-570). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.420
     
  • Bany Taha, M., Chaisiri, S., & Ko, R. K. L. (2015). Trusted tamper-evident data provenance. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 646-653). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.430
     
  • Chaisiri, S., Ko, R. K. L., & Niyato, D. (2015). A joint optimization approach to security-as-a-service allocation and cyber insurance management. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 426-433). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.403
     
  • Ko, R. K. L., & Choo, K. -K. R. (2015). Message from the symposium chairs: TSCloud 2014. In Proc 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. xxvi). Beijing, China: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.147
     
  • Ko, R., & Choo, K. K. R. (2015). Message from the workshop chairs of IEEE TSCloud 2015. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Vol. 1 (pp. xxx). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.337
     
  • Li, X., Joshi, C., Tan, A. Y. S., & Ko, R. K. L. (2015). Inferring user actions from provenance logs. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 742-749). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.442, {PDF}
     
  • Liesaputra V., Yongchareon S., Chaisiri S. (2015). Efficient Process Model Discovery Using Maximal Pattern Mining. In Motahari-Nezhad H., Recker J., Weidlich M. (eds) Business Process Management. BPM 2015. Lecture Notes in Computer Science, vol 9253. Springer, Cham {PDF}
     
  • Chase, J., Niyato, D., & Chaisiri S. (2015). Bring-Your-Own-Application (BYOA): Optimal Stochastic Application Migration in Mobile Cloud Computing. In Global Communications Conference (GLOBECOM), 2015 IEEE. 10.1109/GLOCOM.2015.7417575, {PDF}

  • Cabaniss, R., Kumar, V., & Madria, S. (2015). Multi-party encryption (MPE): secure communications in delay tolerant networks. Wireless Networks21(4), 1243-1258. doi:10.1007/s11276-014-0848-1

  • Kumar, V., & Madria, S. (2015). Distributed attribute based access control of aggregated data in sensor clouds. In Proc 34th International Symposium on Reliable Distributed Systems (pp. 218-227). Conference held Montreal, Quebec, Canada: IEEE. doi:10.1109/SRDS.2015.33

2014

  • Benzie, J., McCarter, D., & Ko, R. K. L. (2014). Cyber security NZ SME Landscape: Report prepared for Vodafone NZ Ltd.
     
  • Tan, A. Y. S., Ko, R. K. L., & Ng, G. P. Y. (2014). OpenStack Café: a novel time-based user-centric resource management in the cloud. In Proc 2014 IEEE 3rd International Congress on Big Data (pp. 422-429). Anchorage, Alaska: IEEE. doi:10.1109/BigData.Congress.2014.68, {PDF}
     
  • Ko, R. K. L., & Will, M. A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. In C. Kesselman (Ed.), Proc IEEE Seventh International Conference on Cloud Computing (pp. 881-889). Alaska, USA: IEEE. doi:10.1109/CLOUD.2014.121, {PDF}
     
  • Papanikolaou, N., Pearson, S., Mont, M. C., & Ko, R. K. L. (2014). A toolkit for automating compliance in Cloud computing services. Journal of Cloud Computing (Special Issue on Security Governance and SLAs in Cloud Computing), 3(1), 45-68. doi:10.1504/IJCC.2014.058830, {PDF}
     
  • Baek, Y., Ko, R. K. L., & Marsh, T. (2014). Trends and applications of serious gaming and social media. -: Springer. Retrieved from http://www.springer.com/us/book/9789814560252
     
  • Wu, Y., Ko, R., & Al-Dubai, A. (2014). Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks. Wireless Personal Communications, 75(3), 1587-1589. doi:10.1007/s11277-014-1649-7
     
  • Perez, G. M., Thampi, S. M., Ko, R., & Shu, L. (2014). Recent trends in computer networks and distributed systems security: Second International Conference, SNDS 2014. In Second International Conference on Security in Computer Networks and Distributed Systems (pp. 1-562). Conference held at Trivandrum, India: Springer. doi:10.1007/978-3-642-54525-2
     
  • Ko, R. K. L., Kirchberg, M., & Lee, B. S. (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7(11), 2183-2184. doi:10.1002/sec.1154
     
  • Ko, R. K. L., Tan, A. Y. S., & Ng, G. P. Y. (2014). Time for Cloud? Design and implementation of a time-based cloud resource management system. In C. Kesselman (Ed.), Proc IEEE 7th International Conference on Cloud Computing (pp. 530-536). Alaska, USA: IEEE. doi:10.1109/CLOUD.2014.77, {PDF}
     
  • Akram, R. N., Ko, R. K. L., & Law, T. F. (2014). Consumer-centric protection for online social networks. In 2014 IEEE 15th International Conference on Information Reuse and Integration (pp. 62-67). Redwood City, CA: IEEE Computer Society. doi:10.1109/IRI.2014.7051872, {PDF}
     
  • Akram, R. N., & Ko, R. K. L. (2014). End-to-end secure and privacy preserving mobile chat application. In D. Naccache, & D. Sauveron (Eds.), Proc 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Securing the Internet of Things Vol. LNCS 8501 (pp. 124-139). Heraklion, Crete, Greece: Springer Berlin Heidelberg. doi:10.1007/978-3-662-43826-8_9, {PDF}
     
  • Ko, R. K. L. (2014). Data accountability in Cloud systems. In S. Nepal, & M. Pathan (Eds.), Security, Privacy and Trust in Cloud Systems (pp. 211-238). Germany: Springer-Verlag Berlin Heidelberg. doi:10.1007/978-3-642-38586-5_7
     
  • Tan, A. Y. S., Ko, R. K. L., & Mendiratta, V. (2014). Virtual numbers for virtual machines?. In C. Kesselman (Ed.), Proc IEEE 7th International Conference on Cloud Computing (pp. 972-974). Alaska, USA: IEEE. doi:10.1109/CLOUD.2014.147, {PDF}
     
  • Ko, R. K. L., Tan, A. Y. S., & Gao, T. (2014). A mantrap-inspired, user-centric Data Leakage Prevention (DLP) approach. In Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom Vol. 2015-February (pp. 1033-1039). Singapore: IEEE. doi:10.1109/CloudCom.2014.23, {PDF}
     
  • Min, G., Varadharajan, V., Ko, R. K. L., Xiang, Y., Marmol, F. G., Ruj, S., . . . Yang, L. T. (2014). TSP 2013: Message from workshop chairs. In 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013. Zhangjiajie, China: IEEE Computer Society. doi:10.1109/HPCC.and.EUC.2013.350
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). Trusted Platform Module for Smart Cards. In 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). 10.1109/NTMS.2014.6814058, {PDF}
     
  • Akram, R. N., Markantonakis, K., & Sauveron, D. (2014). Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. In IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 10.1109/TrustCom.2014.57, {PDF}
     
  • Akram, R. N., Markantonakis, K. (2014) Rethinking the Smart Card Technology. In Tryfonas T., Askoxylakis I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, vol 8533. Springer, Cham. 10.1007/978-3-319-07620-1_20, {PDF}
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). Recovering from a lost digital wallet. In Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 (pp. 1615-1621). IEEE Computer Society. doi:10.1109/HPCC.and.EUC.2013.227
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). An introduction to the trusted platform module and mobile trusted module. In K. Markantonakis, & K. Mayes (Eds.), Secure Smart Embedded Devices, Platforms and Applications (pp. 71-93). New York, NY: Springer. doi:10.1007/978-1-4614-7915-4_4
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2014). An introduction to Java Card programming. In K. Markantonakis, & K. Mayes (Eds.), Secure Smart Embedded Devices, Platforms and Applications (pp. 497-513). New York, NY: Springer. doi:10.1007/978-1-4614-7915-4_22

  • Kumar, V., & Madria, S. (2014). Efficient and secure code dissemination in sensor clouds. In Proc IEEE 15th International Conference on Mobile Data Management (pp. 103-112). Conference held Brisbane, Australia: IEEE. doi:10.1109/MDM.2014.19

  • Madria, S., Kumar, V., & Dalvi, R. (2014). Sensor cloud: A cloud of virtual sensors. IEEE Software31(2), 70-77. doi:10.1109/MS.2013.141

2013

  • Tan, Y. S., Ko, R. K. L., & Holmes, G. (2013). Security and data accountability in distributed systems: a provenance survey. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC) (pp. 1571-1578). Zhangjiajie, China: IEEE. doi:10.1109/HPCC.and.EUC.2013.221
     
  • Suen, C. H., Ko, R. K. L., Tan, Y. S., Jagadpramana, P., & Lee, B. S. (2013). S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance. In Proc 12th IEEE International Conference of Trust, Security and Privacy in Computing and Communication (pp. 594-602). Conference held at Melbourne, Australia: IEEE. doi:10.1109/TrustCom.2013.73
     
  • Ko, R., Martucci, L., & Kirchberg, M. (2013). TSCloud 2013: Message from the chairs. In Proc 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 (pp. xlvi). Melbourne, Australia. doi:10.1109/TrustCom.2013.266
     
  • Tan, Y. S., Ko, R. K. L., Jagadpramana, P., & Lee, B. S. (2013). 20130304774, Determining file allocation based on file operations. Retrieved from http://www.google.com/patents/US20130304774
     
  • Ko, R. K. L., Lee, S. S. G., & Rajan, V. (2013). Cloud computing vulnerability incidents: a statistical overview. Cloud Security Alliance Cloud Vulnerabilities Working Group. Retrieved from https://cloudsecurityalliance.org/, {PDF}
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2013). A secure and trusted channel protocol for the User Centric Smart Card Ownership Model. In Proc 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 336-345). Conference held at Melbourne, Australia: IEEE Computer Society. doi:10.1109/trustcom.2013.245
     
  • Akram, R. N., Markantonakis, K., Mayes, K. (2013) Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. In Qing S., Zhou J., Liu D. (eds) Information and Communications Security. ICICS 2013. Lecture Notes in Computer Science, vol 8233. Springer, Cham
     
  • Akram, R. N., & Markantonakis, K. (2013). Smart cards: State-of-the-art to future directions. In Signal Processing and Information Technology(ISSPIT), 2013 IEEE International Symposium on (pp. 000154-000162). Athens, Greece. doi:10.1109/ISSPIT.2013.6781871
     
  • Akram, R. N., Markantonakis, K., & Mayes, K. (2013). Remote attestation mechanism for embedded devices based on physical unclonable functions. Cryptology and Information Security Series, 11, 107-121. doi:10.3233/978-1-61499-328-5-107
     
  • Msgna, M. G., Markantonakis, K., Mayes, K., & Akram, R. N. (2013). Subscriber centric conditional access system for pay-TV systems. In A. James, X. Fei, K. M. Chao, & J. Y. Chung (Eds.), Proc 2013 IEEE 10th International Conference on e-Business Engineering (pp. 450-455). Conference held at Coventry, UK: IEEE Computer Society. doi:10.1109/icebe.2013.70

  • Kumar, V., & Madria, S. (2013). PIP: Privacy and integrity preserving data aggregation in wireless sensor networks. In Proc IEEE 32nd International Symposium on Reliable Distributed Systems (pp. 10-19). Conference held Braga, Portugal: IEEE. doi:10.1109/SRDS.2013.10

  • Kumar, V., Chejerla, B., Madria, S., & Mohania, M. (2013). A survey of trust and trust management in cloud computing. In Managing Trust in Cyberspace (pp. 41-69). doi:10.1201/b16318

2012

  • Ko, R. K. L., Lee, S. S. G., & Rajan, V. (2012). Understanding cloud failures. IEEE Spectrum, 49(12), 84. doi:10.1109/MSPEC.2012.6361788

  • Cabaniss, R., Kumar, V., & Madria, S. (2012). Three point encryption (3PE): Secure communications in delay tolerant networks. In Proc IEEE Symposium on Reliable Distributed Systems (pp. 479-480). Conference held Irvine, USA: IEEE. doi:10.1109/SRDS.2012.74

  • Kumar, V., & Madria, S. K. (2012). Secure hierarchical data aggregation in wireless sensor networks: Performance evaluation and analysis. In Proc IEEE 13th International Conference on Mobile Data Management (pp. 196-201). Conference held Bengaluru, India: IEEE. doi:10.1109/MDM.2012.49

2011

  • Poolsappasit, N., Kumar, V., Madria, S., & Chellappan, S. (2011). Challenges in secure sensor-cloud computing. In Proc 8th VLDB Secure Data Management Workshop Vol. LNCS 6933 (pp. 70-84). Conference held Seattle, USA: Springer. doi:10.1007/978-3-642-23556-6_5

2010

  • Kumar, V., & Madria, S. (2010). Secure data aggregation in wireless sensor networks. Studies in Computational Intelligence278, 77-107. doi:10.1007/978-3-642-13965-9_3

  • Kumar, V., & Madria, S. (2010). Performance analysis of Secure Hierarchical Data Aggregation in wireless sensor networks. In Proc IEEE International Conference on Mobile Data Management (pp. 299-300). Conference held Kansas City, Missouri, USA: IEEE. doi:10.1109/MDM.2010.37

  • Kumar, V., McCarville-Schueths, J., & Madria, S. (2010). A test-bed for secure hierarchical data aggregation in wireless sensor networks. In Proc IEEE 7th International Conference on Mobile Adhoc and Sensor Systems (pp. 762-764). Conference held Wuhan, China: IEEE. doi:10.1109/MASS.2010.5663825