If you made any changes in Pure these will be visible here soon.

Research Output 1997 2017

2017

A formal model for an ideal CFI

Minagar, S., Srinivasan, B. & Le, P. D., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 707-726 20 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Enforcing security in artificially intelligent robots using monitors (short paper)

Creado, O. M. & Le, P. D., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 648-659 12 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Securing smart cities with monitors

Creado, O. M. & Le, P. D., 1 Jan 2017, Proceedings of the 30th International Business Information Management Association Conference (IBIMA): 8-9 November 2017 Madrid Spain. Soliman, K. S. (ed.). King of Prussia PA USA: International Business Information Management Association (IBIMA), p. 3972-3991 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2016

A dynamic security model for addressing hacking risk factors

Alsunbul, S. A., Le, P. D., Newmarch, J. & Tan, J., 2016, Proceedings of the 25th International Conference on Information Systems Development, ISD 2016: August 24-26, 2016, Katowice, Poland. Gołuchowski, J. & Pańkowska, M. (eds.). Association for Information Systems, p. 586-594 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A network defense system for detecting and preventing potential hacking attempts

Alsunbul, S., Le, P., Tan, J. & Srinivasan, B., 7 Mar 2016, 2016 International Conference on Information Networking (ICOIN 2016): 13-15 January 2016, Kota Kinabalu, Malaysia [proceedings]. Lee, H. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 449-454 6 p. 7427157

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2015

A hybrid mobile authentication model for ubiquitous networking

Almuhaideb, A., Srinivasan, B., Le, P. D., Alhabeeb, M. & Alfehaid, W. M., 2015, 2015 IEEE Trustcom/BigDataSE/ISPA. Yan, Z. & Mueller, P. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 360 - 367 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

An active defence system for securing network infrastructures against hacking

Alsunbul, S., Le, P. D., Tan, J. & Srinivasan, B., 2015, Proceedings of The 26th International Business Information Management Association Conference (IBIMA). Soliman, K. S. (ed.). Norristown PA USA: International Business Information Management Association, p. 634 - 647 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

An evolving trust paradigm for enforcing computing system security

Creado, O. M., Le, P. D., Newmarch, J. & Tan, J., 2015, 2015 IEEE Congress on Evolutionary Computation (CEC 2015). Murata, T. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 2595 - 2602 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A structuring concept for securing modern day computing systems

Creado, O. M., Le, P. D., Newmarch, J. & Tan, J., 2015, 2015 International Conference on Computational Science (ICCS2015). Koziel, S., Leifsson, L., Lees, M., Krzhizhanovskaya, V. V., Dongarra, J. & Sloot, P. M. A. (eds.). Amsterdam Netherlands: Elsevier, Vol. 51. p. 2744 - 2748 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File

Deterring hacking strategies via targeting scanning properties

Alsunbul, S., Le, P. D. & Tan, J., 2015, In : International Journal of Network Security and its Applications. 7, 4, p. 1 - 30 30 p.

Research output: Contribution to journalArticleResearchpeer-review

To address emerging infections, we must invest in enduring systems: the kinetics and dynamics of health systems strengthening

Pastakia, S., Njuguna, B., Le, P. V., Singh, M. K. & Brock, T. P., 1 Oct 2015, In : Clinical Pharmacology and Therapeutics. 98, 4, p. 362-364 3 p.

Research output: Contribution to journalReview ArticleOtherpeer-review

2013

A defense security approach for infrastructures against hacking

Alsunbul, S., Xiang, Y. (ed.), Le, P. D., Thuraisingham, B. (ed.), Tan, J. & Martinez, G. (ed.), 2013, p. 1600 - 1606. 7 p.

Research output: Contribution to conferenceOtherOther

2012

Analysis of mobile authentication protocols by SVO logic

Almuhaideb, A., Srinivasan, B., Le, P. D., Wilson, C. & Malhotra, V. M., 2012, Proceedings - 1st International Conference on Security of Internet of Things, SecurIT 2012: August 17-19, 2012, Amrita University, Amritapuri Campus, Kerala, India. New York, New York: Association for Computing Machinery (ACM), p. 126-134 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Passport/visa: Authentication and authorisation tokens for ubiquitous wireless communications

Almuhaideb, A., Le, P. D. & Srinivasan, B., 2012, Mobile and Ubiquitous Systems: Computing, Networking, and Services : 7th International ICST Conference, MobiQuitous 2010, Sydney, Australia, December 6-9, 2010, Revised Selected Papers. Sénac, P., Ott, M. & Seneviratne, A. (eds.). Heidelberg, Germany: Springer, p. 224-236 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 73 LNICST).

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

2011

Evaluating the functionality of the token filtering technique in filtering denial of service packets using a new formal evaluation model

Alhabeeb, M., Le, P. D. & Srinivasan, B., 2011, Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications. Rho, S., Chen, J. & Wang, C-L. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 318 - 323 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Formal verification of a secure mobile banking protocol

Ngo, H. H. H., Dandash, O., Le, P. D., Srinivasan, B. & Wilson, C. C., 2011, Proceedings of the First International Conference on Computer Science and Information Technology, Part II. Meghanathan, N., Kaushik, B. K. & Nagamalai, D. (eds.). Berlin Germany: Springer-Verlag London Ltd., p. 410 - 421 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preventing denial of service attacks in government e-services using a new efficient packet filtering technique

Alhabeeb, M., Le, P. D. & Srinivasan, B., 2011, Proceedings of the Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications. Rho, S., Chen, J. & Wang, C-L. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 262 - 269 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Two-party mobile authentication protocols for wireless roaming networks

Almuhaideb, A., Le, P. & Srinivasan, B., 2011, Proceedings of the 2011 IEEE International Symposium on Network Computing and Applications. Olsen, R. L. (ed.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 285 - 288 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2010

A framework to measure the effectiveness of image representations

Le, M. V., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 2010 International Conference on Image Processing, Computer Vision and Pattern Recognition. Arabnia, H. R. & Deligiannidis, L. (eds.). USA: CSREA Press, p. 41 - 46 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

An authentication model for wireless network services

Ngo, H. H. H., Wu, X., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Barolli, L. & Hussain, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 996-1003 8 p. 5474818

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

An individual and group authentication model for wireless network services

Ngo, H. H. H., Wu, X., Le, P. D. & Srinivasan, B., 2010, In : Journal of Convergence Information Technology. 5, 1, p. 82 - 94 13 p.

Research output: Contribution to journalArticleResearchpeer-review

An new holistic security approach for government critical systems: Flooding prevention

Alhabeeb, M., Bandyopadhyay, S. K. (ed.), Almuhaideb, A., Adi, W. (ed.), Le, P. D., Kim, T. (ed.), Srinivasan, B. & Xiao, Y. (ed.), 2010, p. 249 - 264. 16 p.

Research output: Contribution to conferenceOtherOther

A novel security approach for critical information systems: Preventing flooding in the non-authenticated client area using a new service from local network service providers

Alhabeeb, M., Ma, J. (ed.), Alsunbul, S., Bacon, L. (ed.), Almuhaideb, A., Du, W. (ed.), Le, P. D., Petridis, M. (ed.) & Srinivasan, B., 2010, p. 49 - 54. 6 p.

Research output: Contribution to conferenceOtherOther

Beyond fixed key size: Classifications toward a balance between security and performance

Almuhaideb, A., Alhabeeb, M., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Barolli, L. & Hussain, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1047 - 1053 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Dynamic key cryptography and applications

Ngo, H. H. H., Wu, X., Le, P. D., Wilson, C. C. & Srinivasan, B., 2010, In : International Journal of Network Security. 10, 3, p. 161 - 174 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Flexible authentication technique for ubiquitous wireless communication using passport and visa tokens

Almuhaideb, A., Alhabeeb, M., Le, P. D. & Srinivasan, B., 2010, In : Journal of Telecommunications. 1, 2, p. 1 - 10 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Holistic approach for critical system security: Flooding prevention

Alhabeeb, M., Wu, X., Almuhaideb, A., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 6th International Conference on Networked Computing. Yuan, C., Tsay, L-S., Wang, F-Y., Ko, F., Zhan, J., Na, Y., Choi, E., Jo, Y., Gomes, A., Shi, J. Y., Lin, H. Y. & Sohn, Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 196 - 203 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Holistic approach for critical system security: Flooding prevention and malicious packet stopping

Alhabeeb, M., Almuhaideb, A. & Le, P. D., 2010, In : Journal of Telecommunications. 1, 1, p. 14 - 24 11 p.

Research output: Contribution to journalArticleResearchpeer-review

Information security threats classification pyramid

Alhabeeb, M., Almuhaideb, A., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops. Barolli, L. & Hussain, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 208 - 213 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Novel hybrid group key agreement for sensitive information systems

Wu, X., Ngo, H. H. H., Le, P. D., Srinivasan, B. & Qi, H., 2010, In : Journal of Convergence Information Technology. 5, 1, p. 69 - 81 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Passport-Visa based authentication mechanism for ubiquitous mobile communication

Almuhaideb, A., Alhabeeb, M., Le, P. D. & Srinivasan, B., 2010, Proceedings of the 6th International Conference on Networked Computing. Yuan, C., Tsay, L-S., Wang, F-Y., Ko, F., Zhan, J., Na, Y., Choi, E., Jo, Y., Gomes, A., Shi, J. Y., Lin, H. Y. & Sohn, Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 204 - 209 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security architecture for sensitive information systems

Wu, X., Le, P. D. & Srinivasan, B., 2010, Convergence and Hybrid Information Technologies. Crisan, M. (ed.). Vukovar Croatia: In-Tech, p. 239 - 266 28 p.

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Researchpeer-review

Toward a ubiquitous mobile access model: A roaming agreement-less approach

Almuhaideb, A., Ma, J. (ed.), Alharbi, T., Bacon, L. (ed.), Alhabeeb, M., Du, W. (ed.), Le, P. D., Petridis, M. (ed.) & Srinivasan, B., 2010, p. 143 - 148. 6 p.

Research output: Contribution to conferenceOtherOther

2009

A membership oriented group key management for application services

Ngo, H. H. H., Wang, Y., Le, P. D., Srinivasan, B. & Malhotra, V. M., 2009, Proceedings of the 12th International Conference on Network-Based Information Systems. Durresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. & Takizawa, M. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 240 - 245 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Multicasting key management in wireless networks

Wang, Y., Ngo, H. H. H., Le, P. D., Srinivasan, B. & Malhotra, V. M., 2009, Proceedings of the 12th International Conference on Network-Based Information Systems. Durresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. & Takizawa, M. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 234 - 239 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Package-role based authorization control model for wireless network services

Ngo, H. H. H., Wu, X., Le, P. D. & Wilson, C. C., 2009, Proceedings of the International Conference on Availability, Reliability and Security. Tjoa, A. M. & Takizawa, M. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 475 - 480 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Probabilistic encryption - A comparative analysis against RSA and ECC

Creado, O. M., Wu, X., Wang, Y. & Le, P. D., 2009, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology. Sohn, S., Kwack, K. D., Um, K., Lee, G. Y. & Ko, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1123 - 1129 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Probabilistic encryption - A practical implementation

Creado, O. M., Wang, Y., Wu, X. & Le, P. D., 2009, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology. Sohn, S., Kwack, K. D., Um, K., Lee, G. Y. & Ko, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1130 - 1136 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

The design and implementation of a sensitive information system

Wang, X., Wu, X., Wang, Y. & Le, P. D., 2009, Proceedings of the Fourth International Conference on Computer Sciences and Convergence Information Technology. Sohn, S., Kwack, K. D., Um, K., Lee, G. Y. & Ko, F. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1174 - 1179 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008

A group authentication model for wireless network services based on group key management

Ngo, H., Wu, X. & Le, P. D., 2008, Proceedings of the Tenth International Conference on Enterprise Information Systems. Cordeiro, J. & Filipe, J. (eds.). Setubul Portugal: Institute for Systems and Technologies of Information, Control and Communication (INSTICC), Vol. ISAS-2. p. 182 - 188 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A method for authentication services in wireless networks

Ngo, H., Wu, X., Le, P. D. & Wilson, C. C., 2008, Proceedings of the 14th Americas Conference on Information Systems. Parsons, J. & Yuan, Y. (eds.). Toronto ON Canada: Association for Information Systems, p. 1 - 9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A novel authentication protocol for sensitive information privacy protection using dynamic key based group key management

Wu, X., Ngo, H., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology. Wang, P. P., Sohn, S., Dhillon, G., Lee, J., Ko, F. I. S., Nguyen, N. T., Bi, J., Sakurai, K., Ahmadi, M., Na, Y. J. & Chung, W-Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1113 - 1119 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A novel group key management scheme for privacy protection sensitive information systems

Wu, X., Ngo, H., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Security & Management. Arabnia, H. R., Aissi, S. & Bedworth, M. (eds.). USA: CSREA Press, p. 93 - 99 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A study of wavelets-based image representations and their effectiveness

Le, M. V., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Image Processing, Computer Vision and Pattern Recognition. Arabnia, H. R. (ed.). Las Vegas NV USA: CSREA Press, Vol. II. p. 638 - 642 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Design & implementation of a secure sensitive information system for wireless mobile devices

Wu, X., Ngo, H., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 Australasian Telecommunication Networks and Applications Conference. Dadej, A. & Harris, R. (eds.). New York NY USA: IEEE, Institute of Electrical and Electronics Engineers, p. 45 - 50 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Dynamic keys based sensitive information system

Wu, X., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 9th International Conference for Young Computer Scientists. Wang, G., Chen, J., Fellows, M. R. & Ma, H. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1895 - 1901 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient key management for secure wireless multicast

Wang, Y., Le, P. D. & Srinivasan, B., 2008, Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology. Wang, P. P., Sohn, S., Dhillon, G., Lee, J., Ko, F. I. S., Nguyen, N. T., Bi, J., Sakurai, K., Ahmadi, M., Na, Y. J. & Chung, W-Y. (eds.). Los Alamitos CA USA: IEEE, Institute of Electrical and Electronics Engineers, Vol. 2. p. 1131 - 1136 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Fraudulent Internet banking payments prevention using dynamic key

Dandash, O., Wang, Y., Le, P. D. & Srinivasan, B., 2008, In : Journal of Networks. 3, 1, p. 25 - 34 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Security analysis for Internet banking models

Dandash, O., Wu, X., Wang, Y., Le, P. D. & Srinivasan, B., 2008, In : ACIS International Journal of Computer & Information Science. 9, 2, p. 1 - 10 10 p.

Research output: Contribution to journalArticleResearchpeer-review