default search action
Benjamin P. Turnbull
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Mahmuda Akter, Nour Moustafa, Benjamin P. Turnbull:
SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems. Cogn. Comput. 16(5): 2626-2641 (2024) - [j33]Waleed Yamany, Marwa Keshk, Nour Moustafa, Benjamin P. Turnbull:
Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks. IEEE Trans. Consumer Electron. 70(1): 1359-1369 (2024) - [j32]Nathan Johnson, Benjamin P. Turnbull, Martin Reisslein, Nour Moustafa:
CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification. IEEE Trans. Comput. Soc. Syst. 11(4): 4636-4648 (2024) - [j31]Sara Salim, Benjamin P. Turnbull, Nour Moustafa:
A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks. IEEE Trans. Comput. Soc. Syst. 11(4): 4681-4697 (2024) - [j30]Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 19: 3772-3787 (2024) - 2023
- [j29]Shuo Yang, Michael Barlow, Thomas Townsend, Xuejie Liu, Dilini Samarasinghe, Erandi Lakshika, Glennn Moy, Timothy M. Lynar, Benjamin P. Turnbull:
Reinforcement Learning Agents Playing Ticket to Ride-A Complex Imperfect Information Board Game With Delayed Rewards. IEEE Access 11: 60737-60757 (2023) - [j28]Wael Issa, Nour Moustafa, Benjamin P. Turnbull, Nasrin Sohrabi, Zahir Tari:
Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. ACM Comput. Surv. 55(9): 191:1-191:43 (2023) - [j27]Marwa Keshk, Nickolaos Koroniotis, Nam Pham, Nour Moustafa, Benjamin P. Turnbull, Albert Y. Zomaya:
An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf. Sci. 639: 119000 (2023) - [j26]Theresa May Sobb, Benjamin P. Turnbull, Nour Moustafa:
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities. Sensors 23(17): 7391 (2023) - [j25]Waleed Yamany, Nour Moustafa, Benjamin P. Turnbull:
OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(1): 893-903 (2023) - 2022
- [j24]Sara Salim, Benjamin P. Turnbull, Nour Moustafa:
Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems. Ad Hoc Networks 128: 102786 (2022) - [j23]Quang Nhat Tran, Benjamin P. Turnbull, Min Wang, Jiankun Hu:
A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol. IEEE Open J. Comput. Soc. 3: 1-10 (2022) - [j22]Sara Salim, Nour Moustafa, Benjamin P. Turnbull, Imran Razzak:
Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks. ACM Trans. Multim. Comput. Commun. Appl. 18(2s): 120:1-120:19 (2022) - [j21]Marwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull:
Privacy-preserving big data analytics for cyber-physical systems. Wirel. Networks 28(3): 1241-1249 (2022) - [d1]Nathan Johnson, Benjamin P. Turnbull, Martin Reisslein, Nour Moustafa:
ASU/UNSW-CNATCC-001. IEEE DataPort, 2022 - 2021
- [j20]Nathan Johnson, Benjamin P. Turnbull, Thomas Maher, Martin Reisslein:
Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies. IEEE Access 9: 9365-9382 (2021) - [j19]Marwa Keshk, Benjamin P. Turnbull, Elena Sitnikova, Dinusha Vatsalan, Nour Moustafa:
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems. IEEE Access 9: 55077-55097 (2021) - [j18]Dilini Samarasinghe, Michael Barlow, Erandi Lakshika, Timothy M. Lynar, Nour Moustafa, Thomas Townsend, Benjamin P. Turnbull:
A Data Driven Review of Board Game Design and Interactions of Their Mechanics. IEEE Access 9: 114051-114069 (2021) - [j17]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. IEEE Internet Things J. 8(12): 9463-9472 (2021) - [j16]Quang Nhat Tran, Benjamin P. Turnbull, Hao-Tian Wu, A. J. S. de Silva, Katerina Kormusheva, Jiankun Hu:
A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture. IEEE Open J. Comput. Soc. 2: 72-84 (2021) - [j15]Quang Nhat Tran, Benjamin P. Turnbull, Jiankun Hu:
Biometrics and Privacy-Preservation: How Do They Evolve? IEEE Open J. Comput. Soc. 2: 179-191 (2021) - [c30]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. TrustCom 2021: 887-894 - [i2]Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. CoRR abs/2109.09259 (2021) - 2020
- [j14]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull:
A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions. IEEE Access 8: 104893-104917 (2020) - [j13]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. IEEE Trans. Inf. Forensics Secur. 15: 1164-1174 (2020) - [j12]Marwa Keshk, Benjamin P. Turnbull, Nour Moustafa, Dinusha Vatsalan, Kim-Kwang Raymond Choo:
A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks. IEEE Trans. Ind. Informatics 16(8): 5110-5118 (2020) - [c29]Waleed Yamany, Nour Moustafa, Benjamin P. Turnbull:
A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems. Australasian Conference on Artificial Intelligence 2020: 94-109 - [c28]Daniel Clark, Benjamin P. Turnbull:
Interactive 3D Visualization of Network Traffic in Time for Forensic Analysis. VISIGRAPP (3: IVAPP) 2020: 177-184 - [c27]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull:
A Collaborative Intrusion Detection System Using Deep Blockchain Framework for Securing Cloud Networks. IntelliSys (1) 2020: 553-565 - [c26]Daniel J. Clark, Benjamin P. Turnbull:
Experiment Design for Complex Immersive Visualisation. MilCIS 2020: 1-5 - [c25]Marwa Keshk, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull, Dinusha Vatsalan:
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems. MSN 2020: 711-717 - [c24]Theresa May Sobb, Benjamin P. Turnbull:
Assessment of Cyber Security Implications of New Technology Integrations into Military Supply Chains. SP (Workshops) 2020: 128-135 - [c23]Sara Salim, Nour Moustafa, Benjamin P. Turnbull:
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media. TrustCom 2020: 856-863
2010 – 2019
- 2019
- [j11]Osama Al-Kadi, Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers. IEEE Access 7: 114607-114618 (2019) - [j10]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull:
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 100: 779-796 (2019) - [j9]David G. A. Ormrod, Benjamin P. Turnbull:
The Modelling and Simulation of Integrated Battlefield Cyber-Kinetic Effects. Int. J. Cyber Warf. Terror. 9(4): 1-26 (2019) - [j8]Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things. IEEE Internet Things J. 6(3): 4815-4830 (2019) - 2018
- [j7]Nour Moustafa, Erwin Adi, Benjamin P. Turnbull, Jiankun Hu:
A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems. IEEE Access 6: 32910-32924 (2018) - [c22]Suneel Randhawa, Benjamin P. Turnbull, Joseph Yuen, Jonathan Dean:
Mission-Centric Automated Cyber Red Teaming. ARES 2018: 1:1-1:11 - [c21]Jacob Taylor, Benjamin P. Turnbull, Gideon Creech:
Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. ARES 2018: 48:1-48:11 - [c20]Nour Moustafa, Benjamin P. Turnbull, Kim-Kwang Raymond Choo:
Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks. ICII 2018: 139-145 - [i1]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin P. Turnbull:
Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset. CoRR abs/1811.00701 (2018) - 2017
- [j6]David G. A. Ormrod, Benjamin P. Turnbull:
Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success. Int. J. Cyber Warf. Terror. 7(4): 1-13 (2017) - [j5]Waqas Haider, Jiankun Hu, Jill Slay, Benjamin P. Turnbull, Yi Xie:
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87: 185-192 (2017) - 2015
- [j4]Benjamin P. Turnbull, Suneel Randhawa:
Automated event and social network extraction from digital evidence sources with ontological mapping. Digit. Investig. 13: 94-106 (2015) - [c19]Joseph Yuen, Benjamin P. Turnbull, Justin Hernandez:
Visual analytics for cyber red teaming. VizSEC 2015: 1-8 - [c18]David G. A. Ormrod, Benjamin P. Turnbull, Kent O'Sullivan:
System of systems cyber effects simulation ontology. WSC 2015: 2475-2486 - 2013
- [c17]Duncan A. Grove, Alex Murray, Damien Gerhardy, Benjamin P. Turnbull, Troy Tobin, Christopher Moir:
An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. AISC 2013: 31-38 - 2012
- [c16]Grant Osborne, Benjamin P. Turnbull, Jill Slay:
Development of InfoVis Software for Digital Forensics. COMPSAC Workshops 2012: 213-217 - 2010
- [c15]Grant Osborne, Benjamin P. Turnbull, Jill Slay:
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. ARES 2010: 629-634
2000 – 2009
- 2009
- [c14]Benjamin P. Turnbull, Robert Taylor, Barry Blundell:
The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data. ARES 2009: 143-149 - [c13]Grant Osborne, Benjamin P. Turnbull:
Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. ARES 2009: 1012-1017 - [c12]Amrit Pal Singh, Michael K. Lavine, Benjamin P. Turnbull, Trupti Shiralkar:
Acer Aspire One Netbooks: A Forensic Challenge. COMPSAC (2) 2009: 404-409 - [c11]Benjamin P. Turnbull, Grant Osborne, Matthew Simon:
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source. e-Forensics 2009: 36-41 - [c10]Trupti Shiralkar, Michael K. Lavine, Benjamin P. Turnbull:
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC. e-Forensics 2009: 116-121 - [c9]Jill Slay, Yi-Chi Lin, Benjamin P. Turnbull, Jason Beckett, Paul Lin:
Towards a Formalization of Digital Forensics. IFIP Int. Conf. Digital Forensics 2009: 37-47 - 2008
- [j3]Timothy Pavlic, Jill Slay, Benjamin P. Turnbull:
Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications. J. Digit. Forensics Secur. Law 3(1): 35-56 (2008) - [c8]Benjamin P. Turnbull, Jill Slay:
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. ARES 2008: 1355-1360 - [c7]Joshua Broadway, Benjamin P. Turnbull, Jill Slay:
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. ARES 2008: 1361-1368 - [c6]Benjamin P. Turnbull:
The adaptability of electronic evidence acquisition guides for new technologies. e-Forensics 2008: 1 - [c5]Timothy Pavlic, Jill Slay, Benjamin P. Turnbull:
Extracting Evidence Using Google Desktop Search. IFIP Int. Conf. Digital Forensics 2008: 43-50 - 2007
- [c4]Benjamin P. Turnbull, Jill Slay:
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. HICSS 2007: 267 - 2006
- [j2]Jill Slay, Benjamin P. Turnbull:
Computer Security Education and Research in Australia. IEEE Secur. Priv. 4(5): 60-63 (2006) - [j1]Benjamin P. Turnbull, Barry Blundell, Jill Slay:
Google Desktop as a Source of Digital Evidence. Int. J. Digit. EVid. 5(1) (2006) - 2005
- [c3]Benjamin P. Turnbull, Barry Blundell, Jill Slay:
Googling Forensics. Australian Computer, Network & Information Forensics Conference 2005: 62-67 - [c2]Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin P. Turnbull, Tom Wilsdon:
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. ECIW 2005: 39-46 - 2004
- [c1]Mathew Hannan, Benjamin P. Turnbull:
Wireless Network Security in Australia: A Study of 7 Australian Capital Cities. PACIS 2004: 117
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint