


default search action
Ryan Kok Leong Ko
Ryan K. L. Ko
Person information
- affiliation: The University of Queensland, Brisbane, QLD, Australia
- affiliation (former): University of Waikato, New Zealand
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j26]Shunyao Wang
, Ryan K. L. Ko
, Guangdong Bai
, Naipeng Dong
, Taejun Choi, Yanjun Zhang
:
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey. IEEE Commun. Surv. Tutorials 26(2): 930-966 (2024) - [j25]Heemeng Ho, Ryan Kok Leong Ko, Lorraine Mazerolle, John Gilmour, Cheng Miao:
Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. J. Cybersecur. 10(1) (2024) - [c62]Kun Han, Abigail M. Y. Koay, Ryan K. L. Ko, Weitong Chen, Miao Xu:
Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach. ADC 2024: 293-307 - [c61]Cheng Miao
, Heemeng Ho
, Elinor Tsen
, John Gilmour
, Ryan K. L. Ko
:
Scp-bp Framework: Situational Crime Prevention for Managing Data Breaches in Business Processes. BPM 2024: 456-473 - [c60]Yanjun Zhang
, Ruoxi Sun
, Liyue Shen
, Guangdong Bai
, Minhui Xue
, Mark Huasong Meng
, Xue Li
, Ryan K. L. Ko
, Surya Nepal
:
Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience. WWW 2024: 2986-2997 - 2023
- [j24]William J. Bingley
, Caitlin Curtis
, Steven Lockey
, Alina Bialkowski
, Nicole M. Gillespie
, S. Alexander Haslam, Ryan K. L. Ko
, Niklas Steffens
, Janet Wiles
, Peter Worthy
:
Where is the human in human-centered AI? Insights from developer priorities and user experiences. Comput. Hum. Behav. 141: 107617 (2023) - [j23]Md. Redowan Mahmud
, Joshua D. Scarsbrook
, Ryan K. L. Ko
, Omar Jarkas, Josh Hall, Stuart Smith, Jonathan Marshall:
Realizing credible remote agricultural auditing with trusted video technology. J. Cybersecur. 9(1) (2023) - [j22]Omar Jarkas
, Josh Hall
, Stuart Smith
, Md. Redowan Mahmud
, Parham Khojasteh, Joshua D. Scarsbrook
, Ryan K. L. Ko
:
ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Eng. Appl. Artif. Intell. 125: 106679 (2023) - [j21]Abigail M. Y. Koay
, Ryan K. L. Ko
, Hinne Hettema, Kenneth Radke:
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J. Intell. Inf. Syst. 60(2): 377-405 (2023) - [j20]Yanjun Zhang
, Guangdong Bai
, Xue Li
, Surya Nepal
, Marthie Grobler
, Chen Chen
, Ryan K. L. Ko
:
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks. IEEE Trans. Dependable Secur. Comput. 20(4): 3341-3357 (2023) - [c59]Jeyakumar Samantha Tharani
, Ryan K. L. Ko
, Vallipuram Muthukkumarasamy
:
A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure. BSCI 2023: 44-52 - [c58]Joshua D. Scarsbrook
, Mark Utting
, Ryan K. L. Ko
:
TypeScript's Evolution: An Analysis of Feature Adoption Over Time. MSR 2023: 109-114 - [p6]Richard Bean, Yanjun Zhang, Ryan K. L. Ko
, Xinyu Mao, Guangdong Bai
:
Preserving the Privacy and Cybersecurity of Home Energy Data. Emerging Trends in Cybersecurity Applications 2023: 301-322 - [p5]Richard Bean, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao
, Guangdong Bai:
Preserving the Privacy and Cybersecurity of Home Energy Data. Emerging Trends in Cybersecurity Applications 2023: 323-343 - [i12]Joshua D. Scarsbrook, Mark Utting, Ryan K. L. Ko:
TypeScript's Evolution: An Analysis of Feature Adoption Over Time. CoRR abs/2303.09802 (2023) - 2022
- [j19]Heemeng Ho
, Ryan K. L. Ko
, Lorraine Mazerolle
:
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review. Comput. Secur. 115: 102611 (2022) - [j18]Surya Nepal
, Ryan K. L. Ko
, Marthie Grobler
, L. Jean Camp:
Editorial: Human-Centric Security and Privacy. Frontiers Big Data 5: 848058 (2022) - [j17]Elinor Tsen
, Ryan K. L. Ko
, Sergeja Slapnicar
:
An exploratory study of organizational cyber resilience, its precursors and outcomes. J. Organ. Comput. Electron. Commer. 32(2): 153-174 (2022) - [j16]Laizhong Cui, Yulei Wu, Ryan K. L. Ko
, Alex Ladur, Jianping Wu:
Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond. ACM Trans. Sens. Networks 18(3): 40e:1-40e:3 (2022) - [j15]Yi Cui
, Feifei Bai
, Ruifeng Yan
, Tapan Kumar Saha
, Mehdi Mosadeghy
, Hongzhi Yin
, Ryan K. L. Ko
, Yilu Liu
:
Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids. IEEE Trans. Smart Grid 13(2): 1658-1661 (2022) - [j14]Yi Cui
, Feifei Bai
, Hongzhi Yin
, Tong Chen
, David Dart, Matthew Zillmann, Ryan K. L. Ko
:
Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data. IEEE Trans. Smart Grid 13(6): 4957-4960 (2022) - [c57]Liuhuo Wan, Yanjun Zhang, Ruiqing Li, Ryan K. L. Ko
, Louw Hoffman
, Guangdong Bai
:
SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation. ADMA (1) 2022: 131-145 - [c56]Gayan K. Kulatilleke, Marius Portmann
, Ryan K. L. Ko
, Shekhar S. Chandra
:
FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity. AI 2022: 73-86 - [c55]Jonathan Wilton, Abigail M. Y. Koay, Ryan K. L. Ko, Miao Xu, Nan Ye:
Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization. NeurIPS 2022 - [c54]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Ryan K. L. Ko
, Dan Dongseong Kim
:
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. QRS 2022: 276-286 - [e8]Guojun Wang
, Kim-Kwang Raymond Choo
, Ryan K. L. Ko
, Yang Xu
, Bruno Crispo
:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 [contents] - [i11]Jonathan Wilton, Abigail M. Y. Koay
, Ryan K. L. Ko, Miao Xu, Nan Ye:
Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization. CoRR abs/2210.08461 (2022) - 2021
- [j13]Yanjun Zhang
, Guangdong Bai
, Mingyang Zhong
, Xue Li
, Ryan K. L. Ko
:
Differentially Private Collaborative Coupling Learning for Recommender Systems. IEEE Intell. Syst. 36(1): 16-24 (2021) - [j12]Chalee Vorakulpipat
, Ryan K. L. Ko
, Qi Li
, Ahmed Meddahi
:
Security and Privacy in Smart Cities. Secur. Commun. Networks 2021: 9830547:1-9830547:2 (2021) - [j11]Yi Cui
, Feifei Bai
, Ruifeng Yan
, Tapan Kumar Saha
, Ryan K. L. Ko
, Yilu Liu
:
Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids. IEEE Trans. Smart Grid 12(5): 4577-4580 (2021) - [c53]Daniel Roodt, Ulrich Speidel, Vimal Kumar
, Ryan K. L. Ko:
On Random Editing in LZ-End. DCC 2021: 366 - [c52]Yanjun Zhang, Guangdong Bai
, Xue Li
, Caitlin Curtis
, Chen Chen
, Ryan K. L. Ko
:
Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis. ESORICS (2) 2021: 395-416 - [c51]Taejun Choi, Ryan K. L. Ko
, Tapan Kumar Saha
, Joshua D. Scarsbrook
, Abigail M. Y. Koay
, Shunyao Wang
, Wenlu Zhang
, Connor St Clair:
Plan2Defend: AI Planning for Cybersecurity in Smart Grids. ISGT Asia 2021: 1-5 - [c50]Abigail M. Y. Koay
, Miao Xie, Ryan K. L. Ko
, Charles Sterner, Taejun Choi, Naipeng Dong:
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets. UbiSec 2021: 102-115 - [c49]Kailong Wang, Junzhe Zhang, Guangdong Bai
, Ryan K. L. Ko
, Jin Song Dong:
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW 2021: 2142-2153 - [e7]Sabu M. Thampi, Guojun Wang
, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 [contents] - [i10]Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. CoRR abs/2101.11866 (2021) - [i9]Haoxi Tan, Mahin Chandramohan, Cristina Cifuentes, Guangdong Bai, Ryan K. L. Ko:
ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence. CoRR abs/2103.07012 (2021) - [i8]Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K. L. Ko:
Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning. CoRR abs/2104.13050 (2021) - [i7]Gayan K. Kulatilleke, Marius Portmann, Ryan K. L. Ko, Shekhar S. Chandra
:
FDGATII : Fast Dynamic Graph Attention with Initial Residual and Identity Mapping. CoRR abs/2110.11464 (2021) - 2020
- [j10]Takeshi Takahashi, Rodrigo Roman Castro, Bilhanan Silverajan, Ryan K. L. Ko
, Said Tabet:
Message from the guest editors. Int. J. Inf. Sec. 19(1): 1-2 (2020) - [c48]Yanjun Zhang, Guangdong Bai
, Xue Li
, Caitlin Curtis, Chen Chen
, Ryan K. L. Ko
:
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. ESORICS (1) 2020: 399-418 - [c47]Farhad Fatehi, Farkhondeh Hassandoust, Ryan K. L. Ko
, Saeed Akhlaghpour:
General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts. MIE 2020: 1118-1122 - [c46]Hetong Jiang
, Taejun Choi, Ryan K. L. Ko
:
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. SSCC 2020: 1-20 - [c45]Taejun Choi, Guangdong Bai
, Ryan K. L. Ko
, Naipeng Dong, Wenlu Zhang
, Shunyao Wang
:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. TrustCom 2020: 827-835 - [e6]Sabu M. Thampi, Gregorio Martínez Pérez, Ryan K. L. Ko
, Danda B. Rawat:
Security in Computing and Communications - 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers. Communications in Computer and Information Science 1208, Springer 2020, ISBN 978-981-15-4824-6 [contents] - [e5]Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4 [contents] - [i6]Daniel Roodt, Ulrich Speidel, Vimal Kumar, Ryan K. L. Ko:
Local Editing in LZ-End Compressed Data. CoRR abs/2007.06167 (2020) - [i5]Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis
, Chen Chen, Ryan K. L. Ko:
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. CoRR abs/2007.06953 (2020) - [i4]Hetong Jiang, Taejun Choi, Ryan K. L. Ko:
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. CoRR abs/2009.11484 (2020) - [i3]Ryan K. L. Ko:
Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security. CoRR abs/2012.04405 (2020)
2010 – 2019
- 2019
- [j9]Jonathan Chase
, Dusit Niyato
, Ping Wang
, Sivadon Chaisiri, Ryan K. L. Ko
:
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 16(4): 565-579 (2019) - [r1]Thye Way Phua, Ryan K. L. Ko
:
Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies 2019 - 2018
- [c44]Joshua D. Scarsbrook
, Ryan K. L. Ko
, Bill Rogers, David Bainbridge:
MetropolJS: visualizing and debugging large-scale javascript program structure with treemaps. ICPC 2018: 389-392 - [c43]Jeffery Garae, Ryan K. L. Ko
, Mark D. Apperley:
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach. TrustCom/BigDataSE 2018: 639-650 - 2017
- [j8]Lan Liu
, Ryan K. L. Ko
, Guangming Ren, Xiaoping Xu:
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. Secur. Commun. Networks 2017: 2910310:1-2910310:8 (2017) - [c42]Ryan K. L. Ko
, Thye Way Phua
:
The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance. SpaCCS Workshops 2017: 180-193 - [c41]Mark A. Will, Ryan K. L. Ko
:
Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud. TrustCom/BigDataSE/ICESS 2017: 449-455 - [c40]Mark A. Will, Ryan K. L. Ko
, Silvino J. Schlickmann:
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. TrustCom/BigDataSE/ICESS 2017: 1024-1031 - [c39]Jeffery Garae, Ryan K. L. Ko
, Janice Kho, Saidah Suwadi, Mark A. Will, Mark D. Apperley:
Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors. TrustCom/BigDataSE/ICESS 2017: 1123-1130 - [c38]Sam Shute, Ryan K. L. Ko
, Sivadon Chaisiri:
Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition. TrustCom/BigDataSE/ICESS 2017: 1131-1138 - 2016
- [c37]Mark A. Will, Ryan K. L. Ko
:
Computing Mod with a Variable Lookup Table. SSCC 2016: 3-17 - [c36]Shaun Stricot-Tarboton, Sivadon Chaisiri, Ryan K. L. Ko
:
Taxonomy of Man-in-the-Middle Attacks on HTTPS. Trustcom/BigDataSE/ISPA 2016: 527-534 - [c35]Sivadon Chaisiri, Ryan K. L. Ko
:
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. Trustcom/BigDataSE/ISPA 2016: 535-543 - [c34]Mark A. Will, Ryan K. L. Ko
, Ian H. Witten:
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates. Trustcom/BigDataSE/ISPA 2016: 900-908 - [c33]Jeffery Garae, Ryan K. L. Ko
, Sivadon Chaisiri:
UVisP: User-centric Visualization of Data Provenance with Gestalt Principles. Trustcom/BigDataSE/ISPA 2016: 1923-1930 - [c32]Craig Scoon, Ryan K. L. Ko
:
The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. Trustcom/BigDataSE/ISPA 2016: 1998-2005 - [e4]Jesús Carretero, Javier García Blas, Ryan K. L. Ko
, Peter Mueller
, Koji Nakano:
Algorithms and Architectures for Parallel Processing - 16th International Conference, ICA3PP 2016, Granada, Spain, December 14-16, 2016, Proceedings. Lecture Notes in Computer Science 10048, Springer 2016, ISBN 978-3-319-49582-8 [contents] - [e3]Peter Müller, Sabu M. Thampi, Md. Zakirul Alam Bhuiyan, Ryan Kok Leong Ko
, Robin Doss, José M. Alcaraz Calero
:
Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Communications in Computer and Information Science 625, Springer 2016, ISBN 978-981-10-2737-6 [contents] - 2015
- [c31]Ryan K. L. Ko
, Giovanni Russello, Richard Nelson, Shaoning Pang
, Aloysius Cheang, Gillian Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri
, Muhammad Rizwan Asghar
, Geoffrey Holmes:
STRATUS: Towards Returning Data Control to Cloud Users. ICA3PP (Workshops and Symposiums) 2015: 57-70 - [c30]Mark A. Will, Brandon Nicholson, Marc Tiehuis, Ryan K. L. Ko
:
Secure Voting in the Cloud Using Homomorphic Encryption and Mobile Agents. ICCCRI 2015: 173-184 - [c29]Sivadon Chaisiri
, Ryan K. L. Ko
, Dusit Niyato
:
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management. TrustCom/BigDataSE/ISPA (1) 2015: 426-433 - [c28]Mark A. Will, Ryan K. L. Ko
, Ian H. Witten:
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud. TrustCom/BigDataSE/ISPA (1) 2015: 563-570 - [c27]Mohammad M. Bany Taha, Sivadon Chaisiri
, Ryan K. L. Ko
:
Trusted Tamper-Evident Data Provenance. TrustCom/BigDataSE/ISPA (1) 2015: 646-653 - [c26]Xin Li, Chaitanya Joshi
, Alan Yu Shyang Tan
, Ryan Kok Leong Ko
:
Inferring User Actions from Provenance Logs. TrustCom/BigDataSE/ISPA (1) 2015: 742-749 - [c25]Baden Delamore, Ryan K. L. Ko
:
A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. TrustCom/BigDataSE/ISPA (1) 2015: 1129-1135 - [p4]Ryan K. L. Ko
, Kim-Kwang Raymond Choo:
Cloud security ecosystem. The Cloud Security Ecosystem 2015: 1-14 - [p3]Mark A. Will, Ryan K. L. Ko
:
A guide to homomorphic encryption. The Cloud Security Ecosystem 2015: 101-127 - [p2]Alan Yu Shyang Tan
, Ryan K. L. Ko
, Geoff Holmes, Bill Rogers:
Provenance for cloud data accountability. The Cloud Security Ecosystem 2015: 171-185 - [p1]Baden Delamore, Ryan K. L. Ko
:
Security as a service (SecaaS) - An overview. The Cloud Security Ecosystem 2015: 187-203 - [e2]Ryan Kok Leong Ko, Kim-Kwang Raymond Choo:
The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues. Elsevier 2015, ISBN 978-0-12-801595-7 [contents] - 2014
- [j7]Nick Papanikolaou, Siani Pearson
, Marco Casassa Mont, Ryan K. L. Ko
:
A toolkit for automating compliance in cloud computing services. Int. J. Cloud Comput. 3(1): 45-68 (2014) - [j6]Ryan K. L. Ko
, Markus Kirchberg, Bu-Sung Lee
:
Special issue on trust and security in cloud computing. Secur. Commun. Networks 7(11): 2183-2184 (2014) - [j5]Yulei Wu, Ryan K. L. Ko
, Ahmed Yassin Al-Dubai:
Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks. Wirel. Pers. Commun. 75(3): 1587-1589 (2014) - [c24]Ryan Kok Leong Ko
, Alan Yu Shyang Tan
, Grace P. Y. Ng:
'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resource Management System. IEEE CLOUD 2014: 530-537 - [c23]Ryan K. L. Ko
, Mark A. Will:
Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking. IEEE CLOUD 2014: 881-889 - [c22]Alan Yu Shyang Tan
, Ryan Kok Leong Ko
, Veena B. Mendiratta:
Virtual Numbers for Virtual Machines? IEEE CLOUD 2014: 972-974 - [c21]Alan Yu Shyang Tan
, Ryan Kok Leong Ko
, Grace P. Y. Ng:
OpenStack Café: A Novel Time-Based User-centric Resource Management Framework in the Cloud. BigData Congress 2014: 422-429 - [c20]Ryan Kok Leong Ko
, Alan Yu Shyang Tan
, Ting Gao:
A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. CloudCom 2014: 1033-1039 - [c19]Raja Naeem Akram
, Ryan K. L. Ko
, Tsz Fung Law:
Consumer-centric protection for online social networks. IRI 2014: 62-67 - [c18]Raja Naeem Akram
, Ryan K. L. Ko
:
Unified Model for Data Security - A Position Paper. TrustCom 2014: 831-839 - [c17]Raja Naeem Akram
, Ryan K. L. Ko
:
Digital Trust - Trusted Computing and Beyond: A Position Paper. TrustCom 2014: 884-892 - [c16]Baden Delamore, Ryan K. L. Ko
:
Escrow: A Large-Scale Web Vulnerability Assessment Tool. TrustCom 2014: 983-988 - [c15]Raja Naeem Akram
, Ryan K. L. Ko
:
End-to-End Secure and Privacy Preserving Mobile Chat Application. WISTP 2014: 124-139 - [e1]Gregorio Martínez Pérez, Sabu M. Thampi
, Ryan K. L. Ko
, Lei Shu
:
Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings. Communications in Computer and Information Science 420, Springer 2014, ISBN 978-3-642-54524-5 [contents] - [i2]Mark A. Will, Ryan K. L. Ko:
Computing Mod Without Mod. IACR Cryptol. ePrint Arch. 2014: 755 (2014) - 2013
- [c14]Yu Shyang Tan
, Ryan K. L. Ko
, Geoff Holmes:
Security and Data Accountability in Distributed Systems: A Provenance Survey. HPCC/EUC 2013: 1571-1578 - [c13]Chun Hui Suen, Ryan K. L. Ko
, Yu Shyang Tan
, Peter Jagadpramana, Bu-Sung Lee:
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance. TrustCom/ISPA/IUCC 2013: 594-602 - 2012
- [j4]Ryan K. L. Ko
, Eng Wah Lee, Stephen Siang Guan Lee:
Business-OWL (BOWL) - A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation. IEEE Trans. Serv. Comput. 5(2): 246-259 (2012) - [c12]Nick Papanikolaou, Siani Pearson, Marco Casassa Mont, Ryan K. L. Ko:
Automating Compliance for Cloud Computing Services. CLOSER 2012: 631-637 - [c11]Markus Kirchberg, Erwin Leonardi, Yu Shyang Tan
, Sebastian Link
, Ryan K. L. Ko
, Bu-Sung Lee
:
Formal Concept Discovery in Semantic Web Data. ICFCA 2012: 164-179 - [c10]Ryan K. L. Ko
, Markus Kirchberg, Bu-Sung Lee
, Elroy Chew:
Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations. ICWS 2012: 654-656 - [c9]Yu Shyang Tan
, Ryan K. L. Ko
, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee
, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc:
Tracking of Data Leaving the Cloud. TrustCom 2012: 137-144 - [c8]Olive Qing Zhang, Ryan K. L. Ko
, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee
:
How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms. TrustCom 2012: 1429-1437 - 2011
- [c7]Ryan K. L. Ko
, Bu-Sung Lee
, Siani Pearson
:
Towards Achieving Accountability, Auditability and Trust in Cloud Computing. ACC (4) 2011: 432-444 - [c6]Olive Qing Zhang, Markus Kirchberg, Ryan K. L. Ko
, Bu-Sung Lee
:
How to Track Your Data: The Case for Cloud Computing Provenance. CloudCom 2011: 446-453 - [c5]Ryan K. L. Ko
, Peter Jagadpramana, Miranda Mowbray, Siani Pearson
, Markus Kirchberg
, Qianhui Liang, Bu-Sung Lee
:
TrustCloud: A Framework for Accountability and Trust in Cloud Computing. SERVICES 2011: 584-588 - [c4]Ryan K. L. Ko
, Peter Jagadpramana, Bu-Sung Lee
:
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. TrustCom 2011: 765-771 - [i1]Markus Kirchberg, Ryan K. L. Ko, Bu-Sung Lee:
From Linked Data to Relevant Data -- Time is the Essence. CoRR abs/1103.5046 (2011) - 2010
- [j3]Ryan K. L. Ko