Professor Ryan Ko is Chair and Director of UQ Cyber and a member of the Academic Board at the University of Queensland, Australia. He holds a Bachelor of Engineering (Computer Engineering)(Hons.) (2005), and PhD (2011) from Nanyang Technological University, Singapore.
Ko has held senior scientific leadership, executive, and directorship roles across industry and academia, and has more than a decade of board, governance and advisory experience across government, industry and NGOs across Australia, New Zealand, Singapore, and USA.
He currently serves on the Risk and Audit Committee for the board of the global not-for-profit ORCID, AustCyber Queensland Innovation Node advisory board, Queensland Government's Digital Professionals Workforce Plan (DPWP)'s Program Advisory Board, Technical Reference Group member of Meat and Livestock Australia (MLA)'s Integrity Systems Company, and Technology Advisory Board member of the NZX-listed (NZE:LIC) Livestock Improvement Cooperation (LIC).
He is also an Adjunct Professor at the Singapore Institute of Technology, and an Affiliate Faculty Member at NIATEC at the Idaho State University, USA.
He is co-founder of Cyber Security Certification Australia (CSCAU), and co-founder of First Watch Ltd (NZ) – an industrial cybersecurity spin-off based on his patented OT security and provenance research at the University of Waikato. He is also an advisor to leading Australian cyber security startup Cybermetrix Pty Ltd, and the Silicon Valley-headquartered startup Nyriad.
He has also served as expert advisor to INTERPOL, the government of Tonga, NZDF, NZ Minister for Communications' Cyber Security Skills Taskforce, and one of four nationally-appointed Technical Adviser for the Harmful Digital Communications Act 2015, Ministry of Justice. Earlier in his career, Ko was a systems engineer, and subsequently founded two start-ups (one of which was a social enterprise which became an events/conventions management contractor with IMG at mega-events in Singapore, including the inaugural Youth Olympics in 2010).
Since joining the School of EECS at UQ in 2019, he has served as:
Ko has successfully established several university-wide, multi-disciplinary academic research and education programmes, including establishing and leading:
Over his academic career, Ko has been awarded A$20+million in competitive grants as lead Chief Investigator, and ~A$40+million as co-investigator. Prior to UQ, he was the highest funded computer scientist in New Zealand, as Principal Investigator and Science Leader of the largest MBIE-awarded cloud security research funding for STRATUS (NZ$12.2 million; 2014-2018). STRATUS' research was awarded 'Gold' by MBIE (i.e. top performing project, 2017), adopted by INTERPOL and featured in NZ's Department of Prime Minister and Cabinet's NZ Cyber Security Strategy 2016 annual report.
Ko has a track record developing international and national cyber security curricula, including:
Ko has also experience developing competitions and coaching competitive cyber security teams, including:
He contributed to the establishment of the Government of Tonga CERT and CERT NZ, and has spoken regularly on cyber and cloud security research across the globe, including the Republic of Korea National Assembly (2018), INTERPOL (2017), TEDx Ruakura (2017), and the NZ Members of Parliament (2016).
Ko's research in cyber security focuses on returning control of data to users. His research reduces users' reliance on trusting third-parties and focusses on (1) provenance logging and reconstruction, traceability and (2) privacy-preserving data processing. His research is adopted internationally (e.g. CERN, INTERPOL, and HP clients such as Apple, Nasa, US Treasury/IRS). His papers have received conference Best Paper Awards (2011, 2015, 2017), and resulted in several technology transfers (e.g. HP), open source contributions (e.g. Kali Linux THC) and spin-offs (e.g. First Watch). He has published in top venues including WWW (The Web), NeurIPS, DCC, ESORICS, IEEE TrustCom, IEEE ICWS, IEEE TDSC, IEEE TSC, Computers & Security, IEEE Trans on Smart Grid, and more than 100 publications including books, refereed conference papers, journal papers, book chapters, encyclopaedia entries, technical reports and international patents (PCT).
Recently, he is researching information integrity and cyber autonomy in critical infrastructure sectors such as energy, manufacturing, regulatory and agriculture sectors. He has served in technical programme committees for more than 30 IEEE conferences/workshops, associate editor for 6 journals, and as series editor for Elsevier's security books.
Within the ISO/IEC JTC 1/SC 27 technical committee, Prof Ko is Head of Delegation for the Singapore national body, served as Editor, ISO/IEC 21878 “Security guidelines for design and implementation of virtualized servers”, and hosted the ISO/IEC JTC 1/SC 27 meetings at Hamilton, New Zealand, in 2017. He is currently one of the editors of the ISO/IEC PWI 5181 Data Provenance Reference Model. In 2022, Ko co-chaired the development of the Singapore standard TR 106:2022 Tiered cybersecurity standards for enterprises in collaboration with the SPSTC and Singapore Cyber Security Agency.
Ko serves as an assessor for the Australian Research Council (ARC), Irish Research Council, Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO),and the NZ MBIE College of Assessors (since 2015). He is also an external expert for the Tertiary Education Quality and Standards Agency (TEQSA). Ko has externally examined 11 PhD and 3 Masters theses for universities in Australia, New Zealand, Canada, Hong Kong and Singapore.
He is a Fellow of the Queensland Academy of Arts and Sciences, a life member of the Association for Computing Machinery (ACM), and member of the IEEE and the Australian Computer Society (ACS).
For his contributions to the field, he was elected Fellow of Cloud Security Alliance (CSA) (2016) for significant contributions to cloud security research and education, the Singapore Government (Enterprise Singapore)’s Young Professional Award (2018) for his leadership at ISO, and awarded the inaugural CSA Ron Knode Service Award 2012 for the establishment of Cloud Data Governance and Cloud Vulnerabilities Research Working Groups. He is also recipient of the 2015 (ISC)2 Information Security Leadership Award.
For his research and teaching excellence, he was awarded the University of Waikato's Early Career Excellence Award (2014), Faculty Teaching Excellence Awards (2014, 2015, 2018), and the Nola Campbell eLearning Excellence Award (2014). During his PhD, he was also awarded A*STAR SIMTech's Best Student Award (2009), and clinched the 1st Prize of the IEEE Services Cup 2009 at IEEE ICWS (CORE A*) in Los Angeles, CA.
He is an active science communicator and is regularly interviewed and featured by Australian (ABC News, SBS News, 7 News, 9 News, Courier Mail, Network 10, AFR), Singaporean (Channel NewsAsia, CNA Radio938), NZ (NZ Herald, Dominion Post, Stuff.co.nz, Waikato Times, TVNZ, Central TV) and international media on topics of cyber security, cybercrime and data privacy.
Conference Publication: Positive-unlabeled learning using random forests via recursive greedy risk minimization
Wilton, Jonathan, Koay, Abigail M. Y., Ko, Ryan K. L., Miao Xu and Ye, Nan (2022). Positive-unlabeled learning using random forests via recursive greedy risk minimization. 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans, LA, United States, 29 November - 1 December 2022. New Orleans, LA, United States: Neural information processing systems foundation.
Journal Article: Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data
Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L. (2022). Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data. IEEE Transactions on Smart Grid, 13 (6), 1-4. doi: 10.1109/tsg.2022.3207066
Journal Article: Preserving privacy for distributed genome-wide analysis against identity tracing attacks
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672
Journal Article: An exploratory study of organizational cyber resilience, its precursors and outcomes
Tsen, Elinor, Ko, Ryan K. L. and Slapnicar, Sergeja (2022). An exploratory study of organizational cyber resilience, its precursors and outcomes. Journal of Organizational Computing and Electronic Commerce, 32 (2), 1-22. doi: 10.1080/10919392.2022.2068906
Journal Article: Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review
Ho, Heemeng, Ko, Ryan and Mazerolle, Lorraine (2022). Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review. Computers & Security, 115 102611, 1-24. doi: 10.1016/j.cose.2022.102611
Conference Publication: On random editing in LZ-end
Roodt, Daniel, Speidel, Ulrich, Kumar, Vimal and Ko, Ryan K. L. (2021). On random editing in LZ-end. 2021 Data Compression Conference (DCC), Snowbird, UT United States, 23 - 26 March 2021. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dcc50243.2021.00074
Conference Publication: It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts
Wang, Kailong, Zhang, Junzhe, Bai, Guangdong, Ko, Ryan and Dong, Jin Song (2021). It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW '21: The Web Conference 2021, Ljubljana, Slovenia, 19-23 April 2021. New York, NY United States: ACM. doi: 10.1145/3442381.3450008
Journal Article: Source authentication of distribution synchrophasors for cybersecurity of microgrids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041
Journal Article: Differentially private collaborative coupling learning for recommender systems
Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930
Conference Publication: PrivColl: practical privacy-preserving collaborative machine learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20
Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO.
Journal Article: A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing
Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626
Conference Publication: The full provenance stack: five layers for complete and meaningful provenance
Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, 12-15 December 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72395-2_18
(2022–2027) Monash University
(2022–2023) Horticulture Innovation Australia Limited
(2021–2024) Griffith University
Applying Situational Crime Prevention to Business Processes to Prevent Cybercrime
Doctor Philosophy
Virtualized Root of Trust in Cloud Computing
Doctor Philosophy
Evaluating and Improving Type Inference Models for Web Application Reverse Engineering
Doctor Philosophy
Positive-unlabeled learning using random forests via recursive greedy risk minimization
Wilton, Jonathan, Koay, Abigail M. Y., Ko, Ryan K. L., Miao Xu and Ye, Nan (2022). Positive-unlabeled learning using random forests via recursive greedy risk minimization. 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans, LA, United States, 29 November - 1 December 2022. New Orleans, LA, United States: Neural information processing systems foundation.
Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L. (2022). Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data. IEEE Transactions on Smart Grid, 13 (6), 1-4. doi: 10.1109/tsg.2022.3207066
Preserving privacy for distributed genome-wide analysis against identity tracing attacks
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672
An exploratory study of organizational cyber resilience, its precursors and outcomes
Tsen, Elinor, Ko, Ryan K. L. and Slapnicar, Sergeja (2022). An exploratory study of organizational cyber resilience, its precursors and outcomes. Journal of Organizational Computing and Electronic Commerce, 32 (2), 1-22. doi: 10.1080/10919392.2022.2068906
Ho, Heemeng, Ko, Ryan and Mazerolle, Lorraine (2022). Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review. Computers & Security, 115 102611, 1-24. doi: 10.1016/j.cose.2022.102611
Roodt, Daniel, Speidel, Ulrich, Kumar, Vimal and Ko, Ryan K. L. (2021). On random editing in LZ-end. 2021 Data Compression Conference (DCC), Snowbird, UT United States, 23 - 26 March 2021. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dcc50243.2021.00074
Wang, Kailong, Zhang, Junzhe, Bai, Guangdong, Ko, Ryan and Dong, Jin Song (2021). It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW '21: The Web Conference 2021, Ljubljana, Slovenia, 19-23 April 2021. New York, NY United States: ACM. doi: 10.1145/3442381.3450008
Source authentication of distribution synchrophasors for cybersecurity of microgrids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041
Differentially private collaborative coupling learning for recommender systems
Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930
PrivColl: practical privacy-preserving collaborative machine learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20
Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO.
Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626
The full provenance stack: five layers for complete and meaningful provenance
Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, 12-15 December 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72395-2_18
Sabu M. Thampi, Gregorio Martinez Perez, Ryan Ko and Danda B. Rawat eds. (2020). Security in Computing and Communications : 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers. Communications in Computer and Information Science, Singapore: Springer Singapore. doi: 10.1007/978-981-15-4825-3
Data Security in Cloud Computing
Vimal Kumar, Sivadon Chaisiri and Ryan Ko eds. (2017). Data Security in Cloud Computing. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e
Algorithms and Architectures for Parallel Processing
Jesus Carretero, Javier Garcia-Blas, Ryan K.L. Ko, Peter Mueller and Koji Nakano eds. (2016). Algorithms and Architectures for Parallel Processing. Lecture Notes in Computer Science, Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-49583-5
Security in computing and communications
Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss and Jose M. Alcaraz Calero eds. (2016). Security in computing and communications. Communications in Computer and Information Science, Singapore: Springer Singapore. doi: 10.1007/978-981-10-2738-3
The cloud security ecosystem: technical, legal, business and management issues
Ryan K. L. Ko and Kim-Kwang Raymond Choo eds. (2015). The cloud security ecosystem: technical, legal, business and management issues. Waltham, MA USA: Elsevier. doi: 10.1016/C2014-0-00456-X
Recent trends in computer networks and distributed systems security
Gregorio Martínez Pérez, Sabu M. Thampi, Ryan Ko and Lei Shu eds. (2014). Recent trends in computer networks and distributed systems security. Communications in Computer and Information Science, Berlin, Heidelberg: Springer, Berlin, Heidelberg. doi: 10.1007/978-3-642-54525-2
Trends and Applications of Serious Gaming and Social Media
Youngkyun Baek , Ryan Ko and Tim Marsh eds. (2014). Trends and Applications of Serious Gaming and Social Media. Gaming Media and Social Effects, Singapore: Springer. doi: 10.1007/978-981-4560-26-9
Preserving the privacy and cybersecurity of home energy data
Bean, Richard, Zhang, Yanjun, Ko, Ryan K. L., Mao, Xinyu and Bai, Guangdong (2023). Preserving the privacy and cybersecurity of home energy data. Emerging trends in cybersecurity applications. (pp. 323-343) edited by Kevin Daimi, Abeer Alsadoon, Cathryn Peoples and Nour El Madhoun. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-031-09640-2_14
Ko, Ryan K. L. (2020). Cyber autonomy: automating the hacker – self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national security. Emerging technologies and international security: machines, the state, and war. (pp. 173-191) edited by Reuben Steff, Joe Burton and Simona R. Soare. London, United Kingdom: Routledge.
Data Provenance for Big Data Security and Accountability
Phua, Thye Way and Ko, Ryan K. L. (2018). Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies. (pp. 1-6) Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-63962-8_237-1
Yu Shyang Tan, Alan, Chaisiri, Sivadon, Leong, Ryan Ko, Holmes, Geoff and Rogers, Bill (2017). Data provenance in cloud. Data security in cloud computing. (pp. 261-275) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch12
Security visualization for cloud computing: an overview
Garae, Jeffery, Ko, Ryan K. and Apperley, Mark (2017). Security visualization for cloud computing: an overview. Data security in cloud computing. (pp. 277-295) edited by Vimal Kumar , Sivadon Chaisiri and Ryan Ko. London, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch13
A data-centric view of cloud security
Kumar, Vimal, Chaisiri, Sivadon and Ko, Ryan (2017). A data-centric view of cloud security. Data security in cloud computing. (pp. 1-17) Hertfordshire, United Kingdom: Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch1
Distributing encoded data for private processing in the cloud
Will, Mark A. and Ko, Ryan K. L. (2017). Distributing encoded data for private processing in the cloud. Data security in cloud computing. (pp. 89-115) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch5
The Waikato Data Privacy Matrix
Scoon, Craig and Ko, Ryan K. L. (2017). The Waikato Data Privacy Matrix. Data security in cloud computing. (pp. 243-259) edited by Vimal Kumar, Sivadon Chaisiri and Ryan Ko. London, United Kingdom: The Institution of Engineering and Technology. doi: 10.1049/pbse007e_ch11
Visualization and data provenance trends in decision support for cybersecurity
Garae, Jeffery and Ko, Ryan K. L. (2017). Visualization and data provenance trends in decision support for cybersecurity. Data analytics and decision support for cybersecurity: trends, methodologies and applications. (pp. 243-270) edited by Iván Palomares Carrascosa, Harsha Kumara Kalutarage and Yan Huang. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-59439-2_9
A guide to homomorphic encryption
Will, Mark A. and Ko, Ryan K. L. (2015). A guide to homomorphic encryption. The cloud security ecosystem: technical, legal, business and management issues. (pp. 101-127) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00005-7
Ko, Ryan K. L. and Choo, Kim-Kwang Raymond (2015). Cloud security ecosystem. The cloud security ecosystem: technical, legal, business and management issues. (pp. 1-14) edited by Ryan Ko and Kim-Kwang Raymond Choo. Waltham, MA USA: Elsevier. doi: 10.1016/B978-0-12-801595-7.00001-X
Provenance for cloud data accountability
Tan, Alan Y. S., Ko, Ryan K. L., Holmes, Geoff and Rogers, Bill (2015). Provenance for cloud data accountability. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. (pp. 171-185) Waltham, MA United States: Elsevier. doi: 10.1016/B978-0-12-801595-7.00008-2
Security as a service (SecaaS)—An overview
Delamore, Baden and Ko, Ryan K. L. (2015). Security as a service (SecaaS)—An overview. The Cloud Security Ecosystem. (pp. 187-203) Waltham, MA United States: Elsevier. doi: 10.1016/b978-0-12-801595-7.00009-4
Data accountability in cloud systems
Ko, Ryan K. L. (2014). Data accountability in cloud systems. Security, privacy and trust in cloud systems. (pp. 211-238) edited by Surya Nepal and Mukaddim Pathan. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-38586-5_7
ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification
Jarkas, Omar, Hall, Josh, Smith, Stuart, Mahmud, Redowan, Khojasteh, Parham, Scarsbrook, Joshua and Ko, Ryan K.L. (2023). ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Engineering Applications of Artificial Intelligence, 125 106679, 106679. doi: 10.1016/j.engappai.2023.106679
Bingley, William J., Haslam, S. Alexander, Steffens, Niklas K., Gillespie, Nicole, Worthy, Peter, Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Ko, Ryan K.L. and Wiles, Janet (2023). Enlarging the model of the human at the heart of human-centered AI: a social self-determination model of AI system impact. New Ideas in Psychology, 70 101025, 1-12. doi: 10.1016/j.newideapsych.2023.101025
Where is the human in human-centered AI? Insights from developer priorities and user experiences
Bingley, William J., Curtis, Caitlin, Lockey, Steven, Bialkowski, Alina, Gillespie, Nicole, Haslam, S. Alexander, Ko, Ryan K.L., Steffens, Niklas, Wiles, Janet and Worthy, Peter (2023). Where is the human in human-centered AI? Insights from developer priorities and user experiences. Computers in Human Behavior, 141 107617, 1-8. doi: 10.1016/j.chb.2022.107617
Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study
Ho, Heemeng, Gilmour, John, Mazerolle, Lorraine and Ko, Ryan (2023). Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study. Security Journal, 1-24. doi: 10.1057/s41284-023-00371-8
Realizing credible remote agricultural auditing with trusted video technology
Mahmud, Redowan, Scarsbrook, Joshua D, Ko, Ryan K L, Jarkas, Omar, Hall, Josh, Smith, Stuart and Marshall, Jonathan (2023). Realizing credible remote agricultural auditing with trusted video technology. Journal of Cybersecurity, 9 (1) tyad012. doi: 10.1093/cybsec/tyad012
Koay, Abigail M. Y., Ko, Ryan K. L, Hettema, Hinne and Radke, Kenneth (2022). Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. Journal of Intelligent Information Systems, 60 (2), 1-29. doi: 10.1007/s10844-022-00753-1
Cui, Yi, Bai, Feifei, Yin, Hongzhi, Chen, Tong, Dart, David, Zillmann, Matthew and Ko, Ryan K. L. (2022). Multiscale adaptive multifractal detrended fluctuation analysis-based source identification of synchrophasor data. IEEE Transactions on Smart Grid, 13 (6), 1-4. doi: 10.1109/tsg.2022.3207066
Cui, Laizhong, Wu, Yulei, Ko, Ryan, Ladur, Alex and Wu, Jianping (2022). Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond. ACM Transactions on Sensor Networks, 18 (3) 40e, 1-3. doi: 10.1145/3538515
Necessary but not sufficient: assurance mechanisms for enhancing trust in AI-enabled job screening
Lockey, Steve, Gillespie, Nicole, Curtis, Caitlin, Bingley, William, Worthy, Peter, Haslam, Alexander, Steffens, Niklas, Bialkowski, Alina, Ko, Ryan and Wiles, Janet (2022). Necessary but not sufficient: assurance mechanisms for enhancing trust in AI-enabled job screening. Academy of Management Proceedings, 2022 (1). doi: 10.5465/ambpp.2022.10638abstract
Preserving privacy for distributed genome-wide analysis against identity tracing attacks
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Nepal, Surya, Grobler, Marthie, Chen, Chen and Ko, Ryan K. L. (2022). Preserving privacy for distributed genome-wide analysis against identity tracing attacks. IEEE Transactions on Dependable and Secure Computing, 20 (4), 1-17. doi: 10.1109/tdsc.2022.3186672
An exploratory study of organizational cyber resilience, its precursors and outcomes
Tsen, Elinor, Ko, Ryan K. L. and Slapnicar, Sergeja (2022). An exploratory study of organizational cyber resilience, its precursors and outcomes. Journal of Organizational Computing and Electronic Commerce, 32 (2), 1-22. doi: 10.1080/10919392.2022.2068906
Editorial: Human-centric security and privacy
Nepal, Surya, Ko, Ryan K. L., Grobler, Marthie and Camp, L. Jean (2022). Editorial: Human-centric security and privacy. Frontiers in Big Data, 5 848058, 848058. doi: 10.3389/fdata.2022.848058
Ko, Ryan K. L., Xu, Yang and Crispo, Bruno (2022). Preface. Communications in Computer and Information Science, 1557 CCIS, v-vi.
Ho, Heemeng, Ko, Ryan and Mazerolle, Lorraine (2022). Situational Crime Prevention (SCP) Techniques to Prevent and Control Cybercrimes: A Focused Systematic Review. Computers & Security, 115 102611, 1-24. doi: 10.1016/j.cose.2022.102611
Security and privacy in smart cities
Vorakulpipat, Chalee, Ko, Ryan K. L., Li, Qi and Meddahi, Ahmed (2021). Security and privacy in smart cities. Security and Communication Networks, 2021 9830547, 1-2. doi: 10.1155/2021/9830547
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Mosadeghy, Mehdi, Yin, Hongzhi, Ko, Ryan K. L. and Liu, Yilu (2021). Multifractal characterization of distribution synchrophasors for cybersecurity defense of smart grids. IEEE Transactions on Smart Grid, 13 (2), 1-1. doi: 10.1109/tsg.2021.3132536
Thampi, Sabu M., Wang, Guojun, Rawat, Danda B., Ko, Ryan and Fan, Chun-I (2021). Preface. Communications in Computer and Information Science, 1364.
Source authentication of distribution synchrophasors for cybersecurity of microgrids
Cui, Yi, Bai, Feifei, Yan, Ruifeng, Saha, Tapan, Ko, Ryan K L and Liu, Yilu (2021). Source authentication of distribution synchrophasors for cybersecurity of microgrids. IEEE Transactions on Smart Grid, 12 (5) 9454123, 1-1. doi: 10.1109/tsg.2021.3089041
O’Hara, Abigail C., Ko, Ryan K. L., Mazerolle, Lorraine and Rimer, Jonah R. (2020). Crime script analysis for adult image-based sexual abuse: a study of crime intervention points for retribution-style offenders. Crime Science, 9 (1) 26. doi: 10.1186/s40163-020-00130-9
Welcome Messages from IEEE TrustCom 2020 Program Chairs
Ko, Ryan, Alam Bhuiyan, Md Zakirul and Pan, Yi (2020). Welcome Messages from IEEE TrustCom 2020 Program Chairs. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 9343234. doi: 10.1109/TrustCom50675.2020.00006
Differentially private collaborative coupling learning for recommender systems
Zhang, Yanjun, Bai, Guangdong, Zhong, Mingyang, Li, Xue and Ko, Ryan K. L. (2020). Differentially private collaborative coupling learning for recommender systems. IEEE Intelligent Systems, 36 (1) 9130104, 1-1. doi: 10.1109/MIS.2020.3005930
Message from the guest editors
Takahashi, Takeshi, Roman Castro, Rodrigo, Silverajan, Bilhanan, Ko, Ryan K. L. and Tabet, Said (2019). Message from the guest editors. International Journal of Information Security, 19 (1), 1-2. doi: 10.1007/s10207-019-00472-9
Chase, Jonathan, Niyato, Dusit, Wang, Ping, Chaisiri, Sivadon and Ko, Ryan (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, 16 (4) 7926340, 1-1. doi: 10.1109/tdsc.2017.2703626
Liu, Lan, Ko, Ryan K. L., Ren, Guangming and Xu, Xiaoping (2017). Malware propagation and prevention model for time-varying community networks within software defined networks. Security and Communication Networks, 2017 2910310, 1-8. doi: 10.1155/2017/2910310
Special issue on trust and security in cloud computing
Ko, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2014). Special issue on trust and security in cloud computing. Security and Communication Networks, 7 (11), 2183-2184. doi: 10.1002/sec.1154
Special issue on advances in trust, security and privacy for wireless and mobile networks
Wu, Yulei, Ko, Ryan and Al-Dubai, Ahmed (2014). Special issue on advances in trust, security and privacy for wireless and mobile networks. Wireless Personal Communications, 75 (3), 1587-1589. doi: 10.1007/s11277-014-1649-7
A toolkit for automating compliance in cloud computing services
Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan K.L. (2014). A toolkit for automating compliance in cloud computing services. International Journal of Cloud Computing, 3 (1), 45. doi: 10.1504/ijcc.2014.058830
Will, Mark A. and Ko, Ryan K. L. (2014). Computing Mod Without Mod.
TSP 2013: message from workshop chairs
Min, Geyong, Varadharajan, Vijay, Ko, Ryan K. L., Xiang, Yang, Marmol, Felix Gomez, Ruj, Sushmita, Wang, Guojun and Yang, Laurence T. (2014). TSP 2013: message from workshop chairs. Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013 6825532. doi: 10.1109/HPCC.and.EUC.2013.350
Ko, Ryan K. L., Lee, Stephen S. G. and Rajan, Veerappa (2012). Understanding cloud failures. IEEE Spectrum, 49 (12), 84-84. doi: 10.1109/MSPEC.2012.6361788
Message from UbiSafe-2012 symposium chairs
Vasilakos, Athanasios V., Jiang, Webin, Martinez, Gregorio and Ko, Ryan K.L. (2012). Message from UbiSafe-2012 symposium chairs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 6296254 doi: 10.1109/TrustCom.2012.305
How to track your data: Rule-based data provenance tracing algorithms
Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: Rule-based data provenance tracing algorithms. HP Laboratories Technical Report (109)
Tracking of data leaving the cloud
Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. HP Laboratories Technical Report (108)
Ko, Ryan K. L., Lee, E. W. and Lee, S. G. (2012). Business-OWL (BOWL)-a hierarchical task network ontology for dynamic business process decomposition and formulation. IEEE Transactions on Services Computing, 5 (2) 5989787, 246-259. doi: 10.1109/TSC.2011.48
How to track your data: The case for cloud computing provenance
Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K L and Lee, Bu Sung (2012). How to track your data: The case for cloud computing provenance. HP Laboratories Technical Report (11)
Ko, Ryan K.L., Jagadpramana, Peter and Lee, Bu Sung (2011). Flogger: A File-centric logger for monitoring file access and transfers within cloud computing environments. HP Laboratories Technical Report (119), 1-8.
Cloud computing in plain English
Ko, Ryan K. L. (2010). Cloud computing in plain English. Crossroads, 16 (3), 5-6. doi: 10.1145/1734160.1734163
A computer scientist's introductory guide to business process management (BPM)
Ko, Ryan K. L. (2009). A computer scientist's introductory guide to business process management (BPM). Crossroads, 15 (4), 11-18. doi: 10.1145/1558897.1558901
Business process management (BPM) standards: a survey
Ko, Ryan K. L., Lee, Stephen S. G. and Lee, Eng Wah (2009). Business process management (BPM) standards: a survey. Business Process Management Journal, 15 (5), 744-791. doi: 10.1108/14637150910987937
A framework for user-centric visualisation of blockchain transactions in critical infrastructure
Jeyakumar, Samantha Tharani, Ko, Ryan and Muthukkumarasamy, Vallipuram (2023). A framework for user-centric visualisation of blockchain transactions in critical infrastructure. BSCI '23: Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Melbourne, VIC, Australia, 10 - 14 July 2023. New York, NY, United States: Association for Computing Machinery. doi: 10.1145/3594556.3594624
TypeScript’s Evolution: An Analysis of Feature Adoption Over Time
Scarsbrook, Joshua D., Utting, Mark and Ko, Ryan K. L. (2023). TypeScript’s Evolution: An Analysis of Feature Adoption Over Time. IEEE/ACM 20th International Conference on Mining Software Repositories (MSR), Melbourne Australia, May 15-16, 2023. LOS ALAMITOS: IEEE. doi: 10.1109/msr59073.2023.00027
Evaluating performance and security of a hybrid moving target defense in SDN environments
Kim, Minjune, Cho, Jin-Hee, Lim, Hyuk, Moore, Terrence J., Nelson, Frederica F., Ko, Ryan K. L. and Dongseong Kim, Dan (2022). Evaluating performance and security of a hybrid moving target defense in SDN environments. 22nd IEEE International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China, 5-9 December 2022. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/qrs57517.2022.00037
Positive-unlabeled learning using random forests via recursive greedy risk minimization
Wilton, Jonathan, Koay, Abigail M. Y., Ko, Ryan K. L., Miao Xu and Ye, Nan (2022). Positive-unlabeled learning using random forests via recursive greedy risk minimization. 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans, LA, United States, 29 November - 1 December 2022. New Orleans, LA, United States: Neural information processing systems foundation.
Cybercrime, employee productivity and wellbeing in a hybrid work environment
Ayoko, Oluremi (Remi), Ko, Ryan, Kromah, Momo and Luong, Hai (2022). Cybercrime, employee productivity and wellbeing in a hybrid work environment. 2022 ANZSOC conference: transforming criminology for the 2020s and beyond, Darwin, NT, Australia, 28 - 30 November 2022.
SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation
Wan, Liuhuo, Zhang, Yanjun, Li, Ruiqing, Ko, Ryan, Hoffman, Louw and Bai, Guangdong (2022). SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation. 18th International Conference on Advanced Data Mining and Applications (ADMA 2022), Brisbane, QLD Australia, 28–30 November 2022. Heidelberg, Germany: Springer. doi: 10.1007/978-3-031-22064-7_11
FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity
Kulatilleke, Gayan K., Portmann, Marius, Ko, Ryan and Chandra, Shekhar S. (2022). FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity. 35th Australasian Joint Conference on Artificial Intelligence: AI 2022, Perth, WA Australia, 5–8 December 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-031-22695-3_6
SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets
Koay, Abigail M. Y., Xie, Miao, Ko, Ryan K. L., Sterner, Charles, Choi, Taejun and Dong, Naipeng (2022). SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets. 1st International Conference on Ubiquitous Security (UbiSec), Guangzhou, Peoples Republic of China, 28-31 December 2021. Singapore, Singapore: Springer Singapore. doi: 10.1007/978-981-19-0468-4_8
Plan2Defend: AI planning for cybersecurity in smart grids
Choi, Taejun, Ko, Ryan K. L., Saha, Tapan, Scarsbrook, Joshua, Koay, Abigail M. Y., Wang, Shunyao, Zhang, Wenlu and St Clair, Connor (2021). Plan2Defend: AI planning for cybersecurity in smart grids. 2021 IEEE PES Innovative Smart Grid Technologies - Asia (ISGT Asia), Brisbane, QLD, Australia, 5-8 December 2021. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/isgtasia49270.2021.9715679
Privacy-preserving gradient descent for distributed genome-wide analysis
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2021). Privacy-preserving gradient descent for distributed genome-wide analysis. ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4–8 October, 2021. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-88428-4_20
Roodt, Daniel, Speidel, Ulrich, Kumar, Vimal and Ko, Ryan K. L. (2021). On random editing in LZ-end. 2021 Data Compression Conference (DCC), Snowbird, UT United States, 23 - 26 March 2021. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/dcc50243.2021.00074
Wang, Kailong, Zhang, Junzhe, Bai, Guangdong, Ko, Ryan and Dong, Jin Song (2021). It’s Not Just the Site, It’s the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW '21: The Web Conference 2021, Ljubljana, Slovenia, 19-23 April 2021. New York, NY United States: ACM. doi: 10.1145/3442381.3450008
An analytics framework for heuristic inference attacks against industrial control systems
Choi, Taejun, Bai, Guangdong, Ko, Ryan K. L., Dong, Naipeng, Zhang, Wenlu and Wang, Shunyao (2021). An analytics framework for heuristic inference attacks against industrial control systems. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 202, Guangzhou, China, 29 December 2020-1 January 2021. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom50675.2020.00112
Jiang, Hetong, Choi, Taejun and Ko, Ryan K. L. (2021). Pandora: a cyber range environment for the safe testing and deployment of autonomous cyber attack tools. 8th International Symposium, SSCC 2020, Chennai, India, 15-17 October 2020. Singapore, Singapore: Springer Singapore. doi: 10.1007/978-981-16-0422-5_1
General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts
Fatehi, Farhad, Hassandoust, Farkhondeh, Ko, Ryan K. L. and Akhlaghpour, Saeed (2020). General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts. 30th Medical Informatics Europe (MIE) Conference, Geneva Switzerland, Apr, 2020. Amsterdam, Netherlands: IOS Press. doi: 10.3233/SHTI200336
Thampi, Sabu M., Martinez Perez, Gregorio, Ko, Ryan and Rawat, Danda B. (2020). Preface. 7th International Symposium on Security in Computing and Communications, SSCC 2019, Trivandrum, India, 18 - 21 December 2019. Heidelberg, Germany: Springer.
PrivColl: practical privacy-preserving collaborative machine learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan K. L. (2020). PrivColl: practical privacy-preserving collaborative machine learning. European Symposium on Research in Computer Security, Guildford, United Kingdom, 14-18 September 2020. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-58951-6_20
Message from IEEE TrustCom 2019 General Chairs
Ko, Ryan, Chen, Liqun and Zhu, Liming (2019). Message from IEEE TrustCom 2019 General Chairs. 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5-8 August 2019. Piscataway, NJ USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/trustcom/bigdatase.2019.00005
A full-scale security visualization effectiveness measurement and presentation approach
Garae, Jeffery, Ko, Ryan K. L. and Apperley, Mark (2018). A full-scale security visualization effectiveness measurement and presentation approach. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, NY, United States, 31 July - 3 August 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers . doi: 10.1109/TrustCom/BigDataSE.2018.00095
MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps
Scarsbrook, Joshua D., Ko, Ryan K. L., Rogers, Bill and Bainbridge, David (2018). MetropolJS: Visualizing and debugging large-scale javascript program structure with treemaps. 26th Conference on Program Comprehension ICPC '18, Gothenburg, Sweden, 28-29 May 2018. New York, United States: ACM. doi: 10.1145/3196321.3196368
Security visualization intelligence model for law enforcement investigations
Garae, Jeffery, Ko, Ryan K. L ., Apperley, Mark and Schlickmann, Silvino J. (2018). Security visualization intelligence model for law enforcement investigations. 2018 Cyber Forensic & Security International Conference (2018 CFSIC), Nuku'alofa, Tonga, 21-23 August 2018. Nuku'alofa, Tonga:
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Will, Mark A., Ko, Ryan K. L. and Schlickmann, Silvino J. (2017). Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW Australia, 1-4 August 2017. Piscataway, NJ United States: IEEE. doi: 10.1109/trustcom/bigdatase/icess.2017.347
Attribution using keyboard row based behavioural biometrics for handedness recognition
Shute, Sam, Ko, Ryan K. L. and Chaisiri, Sivadon (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 1 - 4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.363
Returning control of data to users with a personal information crunch - a position paper
Will, Mark A., Garae, Jeffery, Tan, Yu Shyang, Scoon, Craig and Ko, Ryan K. L. (2017). Returning control of data to users with a personal information crunch - a position paper. 5th International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, 11-12 April 2017. Piscataway, NJ, United States: IEEE. doi: 10.1109/ICCCRI.2017.12
Secure FPGA as a service - towards secure data processing by physicalizing the cloud
Will, Mark A. and Ko, Ryan K. L. (2017). Secure FPGA as a service - towards secure data processing by physicalizing the cloud. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, Australia, 1-4 August 2017. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.270
The full provenance stack: five layers for complete and meaningful provenance
Ko, Ryan K. L. and Phua, Thye Way (2017). The full provenance stack: five layers for complete and meaningful provenance. 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017, Guangzhou, China, 12-15 December 2017. Cham, Switzerland: Springer . doi: 10.1007/978-3-319-72395-2_18
Ko, Ryan K. L. and Garae, Jeffery (2017). User-centric intelligence visualizations for ransomware propagation, bitcoin transactions and early cybercrime detection. 3rd INTERPOL Digital Security Research Seminar, Singapore, 12-13 September 2017. Singapore: INTERPOL.
Visualizing the New Zealand cyber security challenge for attack behaviors
Garae, Jeffery, Ko, Ryan K. L., Kho, Janice, Suwadi, Saidah, Will, Mark A. and Apperley, Mark (2017). Visualizing the New Zealand cyber security challenge for attack behaviors. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, Sydney, NSW, Australia, 1 -4 August 2017. New York, NY, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.362
Computing mod with a variable lookup table
Will, Mark A. and Ko, Ryan K. L. (2016). Computing mod with a variable lookup table. 4th International Symposium on Security in Computing and Communications (SSCC), Jaipur, India, 21-24 September 2016. Singapore: Springer. doi: 10.1007/978-981-10-2738-3_1
Chaisiri, Sivadon and Ko, Ryan K. L. (2016). From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.0107
Message from the TSCloud 2016 Symposium Chairs
Ko, Ryan and Choo, Kim-Kwang Raymond (2016). Message from the TSCloud 2016 Symposium Chairs. IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 August 2016. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2016.0015
Mueller, Peter, Thampi, Sabu M., Alam Bhuiyan, Md. Zakirul, Ko, Ryan, Doss, Robin and Alcaraz Calero, Jose M. (2016). Preface. 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016. Singapore: Springer.
Privacy preserving computation by fragmenting individual bits and distributing gates
Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.153
Taxonomy of Man-in-the-Middle attacks on HTTPS
Stricot-Tarboton, Shaun, Chaisiri, Sivadon and Ko, Ryan K. L. (2016). Taxonomy of Man-in-the-Middle attacks on HTTPS. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.105
The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws
Scoon, Craig and Ko, Ryan K. L. (2016). The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom/2016.303
UVisP: user-centric visualization of data provenance with Gestalt principles
Garae, Jeffery, Ko, Ryan K. L. and Chaisiri, Sivadon (2016). UVisP: user-centric visualization of data provenance with Gestalt principles. 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), Tianjin, China, 23-26 August 2016. New York, NY, United States: IEEE. doi: 10.1109/TrustCom.2016.292
A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications
Delamore, Baden and Ko, Ryan K. L. (2015). A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. Joint 14th IEEE Int Conf on Trust, Security and Privacy in Computers and Communications / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE International Conference on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki Finland, 20-22 August 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/Trustcom.2015.493
A joint optimization approach to security-as-a-service allocation and cyber insurance management
Chaisiri, Sivadon, Ko, Ryan K. L. and Niyato, Dusit (2015). A joint optimization approach to security-as-a-service allocation and cyber insurance management. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.403
Bin encoding: a user-centric secure full-text searching scheme for the cloud
Will, Mark A., Ko, Ryan K. L. and Witten, Ian H. (2015). Bin encoding: a user-centric secure full-text searching scheme for the cloud. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/Trustcom.2015.420
Inferring user actions from provenance logs
Li, Xin, Joshi, Chaitanya, Tan, Alan Y. S. and Ko, Ryan K. L. (2015). Inferring user actions from provenance logs. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.442
Message from the ITA 2015 Symposium Chairs
Wu, Yulei , Ko, Ryan , Javadi, Bahman and Al-Dubai, Ahmed (2015). Message from the ITA 2015 Symposium Chairs. ITA 2015 Symposium, Liverpool, United Kingdom, 26-28 October 2015. Piscataway, NJ, United States: IEEE. doi: 10.1109/cit/iucc/dasc/picom.2015.389
Message from the symposium chairs: TSCloud 2014
Ko, Ryan K.L. and Choo, Kim-Kwang Raymond (2015). Message from the symposium chairs: TSCloud 2014. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2014.147
Message from the workshop chairs of IEEE TSCloud 2015
Ko, Ryan and Choo, Kim-Kwang Raymond (2015). Message from the workshop chairs of IEEE TSCloud 2015. Symposium on Trust and Security in Cloud Computing (TrustCloud), Helsinki, Finland, 20 - 22 August 2015. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/Trustcom.2015.337
STRATUS: Towards Returning Data Control to Cloud Users
Ko, Ryan K. L., Russello, Giovanni, Nelson, Richard, Pang, Shaoning, Cheang, Aloysius, Dobbie, Gill, Sarrafzadeh, Abdolhossein, Chaisiri, Sivadon, Asghar, Muhammad Rizwan and Holmes, Geoffrey (2015). STRATUS: Towards Returning Data Control to Cloud Users. 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Zhangjiajie, China, 18-20 November 2015. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-27161-3_6
Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents
Will, Mark A., Nicholson, Brandon, Tiehuis, Marc and Ko, Ryan K. L. (2015). Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents. International Conference on Cloud Computing Research and Innovation ICCCRI, Singapore Singapore, 26-27 October 2015. Piscataway, NJ United States: IEEE. doi: 10.1109/ICCCRI.2015.30
Trusted tamper-evident data provenance
Taha, Mohammad M. Bany, Chaisiri, Sivadon and Ko, Ryan K. L. (2015). Trusted tamper-evident data provenance. Joint 14th IEEE Int Conf on Trust, Secur and Privacy in Comp and Commun / 13th IEEE Int Symposium on Parallel and Distributed Proc with Applications / 9th IEEE Int Conf on Big Data Science and Engineering (IEEE TrustCom-ISPA-BigDataSE), Helsinki, Finland, 20-22 August 2015. New York, NY, United States: IEEE. doi: 10.1109/Trustcom.2015.430
Welcome message from the ICA3PP 2015 workshop chairs
Dong, Mianxiong, Ko, Ryan K. L. and Alam Bhuiyan, Md. Zakirul (2015). Welcome message from the ICA3PP 2015 workshop chairs. ICA3PP 2015 Workshop, Zhangjiajie, China, 18-20 November 2015. Heidelberg, Germany: Springer.
'Time' for cloud? Design and implementation of a time-based cloud resource management system
Ko, Ryan K. L., Tan, Alan Y. S. and Ng, Grace P. Y. (2014). 'Time' for cloud? Design and implementation of a time-based cloud resource management system. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/CLOUD.2014.77
A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach
Ko, Ryan K. L., Tan, Alan Y. S. and Gao, Ting (2014). A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. 6th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Singapore Singapore, 15-18 December 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2014.23
Consumer-centric protection for online social networks
Akram, Raja Naeem, Ko, Ryan K. L. and Law, Tsz Rung (2014). Consumer-centric protection for online social networks. 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI) / IRI-HI / FMI / DIM / EM-RITE / WICSOC / SocialSec / IICPC / NatSec, San Francisco, CA, 13-15 August 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/IRI.2014.7051872
Digital Trust - Trusted Computing and Beyond A Position Paper
Akram, Raja Naeem and Ko, Ryan K. L. (2014). Digital Trust - Trusted Computing and Beyond A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.116
End-to-end secure and privacy preserving mobile chat application
Akram, Raja Naeem and Ko, Ryan K. L. (2014). End-to-end secure and privacy preserving mobile chat application. International Workshop on Information Security Theory and Practice, Heraklion, Greece, 2 July 2014. New York, NY, United States: Springer . doi: 10.1007/978-3-662-43826-8_9
Escrow: A Large-Scale Web Vulnerability Assessment Tool
Delamore, Baden and Ko, Ryan K. L. (2014). Escrow: A Large-Scale Web Vulnerability Assessment Tool. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.130
OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud
Tan, Alan Y. S., Ko, Ryan K. L. and Ng, Grace P. Y. (2014). OpenStack Cafe: a novel time-based user-centric resource management framework in the cloud. 3rd IEEE International Congress on Big Data, Anchorage, AK USA, 27 June-2 July 2014. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/BigData.Congress.2014.68
Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking
Ko, Ryan K. L. and Will, Mark A. (2014). Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK, United States, 27 June - 2 July 2014. Piscataway, NJ, United States: IEEE. doi: 10.1109/CLOUD.2014.121
Recent Trends in Computer Networks and Distributed Systems Security - Preface
Pérez, Gregorio Martínez, Thampi, Sabu M., Ko, Ryan and Shu, Lei (2014). Recent Trends in Computer Networks and Distributed Systems Security - Preface. SNDS: International Conference on Security in Computer Networks and Distributed Systems, Trivandrum, India, 13-14 March 2014. Heidelberg, Germany: Springer Verlag.
Unified Model for Data Security - A Position Paper
Akram, Raja Naeem and Ko, Ryan K. L. (2014). Unified Model for Data Security - A Position Paper. 13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2014.110
Virtual Numbers for Virtual Machines?
Tan, Alan Y. S., Ko, Ryan K. L. and Mendiratta, Veena (2014). Virtual Numbers for Virtual Machines?. 7th IEEE International Conference on Cloud Computing (CLOUD), Anchorage, AK United States, 27 June - 2 July 2014. Piscataway, NJ United States: IEEE. doi: 10.1109/CLOUD.2014.147
S2Logger: end-to-end data tracking mechanism for cloud data provenance
Suen, Chun Hui, Ko, Ryan K. L., Tan, Yu Shyang, Jagadpramana, Peter and Lee, Bu Sung (2013). S2Logger: end-to-end data tracking mechanism for cloud data provenance. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 16-18 July 2013. Piscataway, NJ, United States: IEEE. doi: 10.1109/TrustCom.2013.73
Security and data accountability in distributed systems: a provenance survey
Tan, Yu Shyang, Ko, Ryan K. L. and Holmes, Geoff (2013). Security and data accountability in distributed systems: a provenance survey. 15th IEEE International Conference on High Performance Computing and Communications (HPCC) /11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), Zhangjiajie, China, 13-15 November 2013. New York, NY, United States: IEEE. doi: 10.1109/HPCC.and.EUC.2013.221
TSCloud 2013: Message from the Chairs
Ko, Ryan , Martucci, Leonardo and Kirchberg, Markus (2013). TSCloud 2013: Message from the Chairs. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, VIC, Australia, 16-18 July 2013. Piscataway, NJ, United States: IEEE. doi: 10.1109/trustcom.2013.266
Automating compliance for cloud computing services
Papanikolaou, Nick, Pearson, Siani, Mont, Marco Casassa and Ko, Ryan (2012). Automating compliance for cloud computing services. 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April 2012. Setúbal, Portugal: SciTe Press.
Formal concept discovery in semantic web data
Kirchberg, Markus, Leonardi, Erwin, Tan, Yu Shyang, Link, Sebastian, Ko, Ryan K. L. and Lee, Bu Sung (2012). Formal concept discovery in semantic web data. 10th International Conference on Formal Concept Analysis, ICFCA 2012, Leuven, Belgium, 7- 10 May 2012. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-29892-9_18
How to track your data: rule-based data provenance tracing algorithms
Zhang, Olive Qing, Ko, Ryan K. L., Kirchberg, Markus, Suen, Chun Hui, Jagadpramana, Peter and Lee, Bu Sung (2012). How to track your data: rule-based data provenance tracing algorithms. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 25 - 27 June 2012. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom.2012.175
Message from TSCloud Symposium Chairs
Ko, Ryan K. L. and Kirchberg, Markus (2012). Message from TSCloud Symposium Chairs. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 25-27 June 2012. Piscataway, NJ United States: IEEE. doi: 10.1109/trustcom.2012.12
Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations
Ko, Ryan K. L., Kirchberg, Markus, Lee, Bu Sung and Chew, Elroy (2012). Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations. 2012 IEEE 19th International Conference on Web Services, Honolulu, HI United States, 24-29 June 2012. Piscataway, NJ United States: IEEE. doi: 10.1109/icws.2012.107
Tracking of data leaving the cloud
Tan, Yu Shyang, Ko, Ryan K. L., Jagadpramana, Peter, Suen, Chun Hui, Kirchberg, Markus, Lim, Teck Hooi, Lee, Bu Sung, Singla, Anurag, Mermoud, Ken, Keller, Doron and Duc, Ha (2012). Tracking of data leaving the cloud. 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, United Kingdom, 25-27 June 2012. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2012.282
Ko, Ryan K. L., Jagadpramana, Peter and Lee, Bu Sung (2011). Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, 16-18 November 2011. Piscataway, NJ United States: IEEE. doi: 10.1109/TrustCom.2011.100
From linked data to relevant data - time is the essence
Kirchberg, Markus, Ko, Ryan K.L. and Lee, Bu Sung (2011). From linked data to relevant data - time is the essence. 1st International Workshop on Usage Analysis and the Web of Data (USEWOD2011) in the 20th International World Wide Web Conference (WWW2011), Hyderabad, India, 28 March 2011.
From system-centric to data-centric logging - accountability, trust & security in cloud computing
Ko, Ryan K. L., Kirchberg, Markus and Lee, Bu Sung (2011). From system-centric to data-centric logging - accountability, trust & security in cloud computing. 2011 Defense Science Research Conference and Expo (DSR), Singapore, Singapore, 3 - 5 August 2011. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/DSR.2011.6026885
How to track your data: The case for cloud computing provenance
Zhang, Olive Qing, Kirchberg, Markus, Ko, Ryan K. L. and Lee, Bu Sung (2011). How to track your data: The case for cloud computing provenance. 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, 29 November - December 1 2011. Piscataway, NJ United States: IEEE. doi: 10.1109/CloudCom.2011.66
Towards achieving accountability, auditability and trust in cloud computing
Ko, Ryan K. L., Lee, Bu Sung and Pearson, Siani (2011). Towards achieving accountability, auditability and trust in cloud computing. 1st International Conference on Advances in Computing and Communications, ACC 2011, Kochi, India, 22-24 July 2011. Heidelberg, Germany: Springer. doi: 10.1007/978-3-642-22726-4_45
TrustCloud: A framework for accountability and trust in cloud computing
Ko, Ryan K. L., Jagadpramana, Peter, Mowbray, Miranda, Pearson, Siani, Kirchberg, Markus, Liang, Qianhui and Lee, Bu Sung (2011). TrustCloud: A framework for accountability and trust in cloud computing. 2011 IEEE World Congress on Services, Washington, DC United States, 4-9 July 2011. Piscataway, NJ United States: IEEE. doi: 10.1109/SERVICES.2011.91
Ko, Ryan K.L., Lee, Stephen S. G., Lee, E. W. and Jusuf, Andre (2009). Dynamic collaborative business process formulation via ontologised hierarchical task network (HTN) planning. 2009 IEEE International Conference on Web Services, Los Angeles, CA USA, 6-10 July 2009. New York, NY, USA: Institute of Electrical and Electronics Engineers. doi: 10.1109/icws.2009.77
Generating request web services from annotated BPEL
Le, Duy Ngan, Nguyen, Ngoc Son, Mous, Karel, Ko, Ryan Kok Leong and Goh, Angela Eck Soong (2009). Generating request web services from annotated BPEL. 2009 IEEE-RIVF International Conference on Computing and Communication Technologies: Research, Innovation and Vision for the Future, RIVF 2009, Da Nang, Vietnam, 13-17 July 2009. Piscataway, NJ United States: IEEE. doi: 10.1109/RIVF.2009.5174641
Genesis Dynamic Collaborative Business Process Formulation Based on Business Goals and Criteria
Ko, Ryan K. L., Jusuf, Andre and Lee, S. G. (2009). Genesis Dynamic Collaborative Business Process Formulation Based on Business Goals and Criteria. 2009 Congress on Services, Los Angeles, CA United States, 6-10 July 2009. Piscataway, NJ United States: IEEE. doi: 10.1109/services-i.2009.108
High-level business processes for agile B2B collaboration
Mous, K., Ko, K. L., Lee, S. G., Tan, P. S. and Lee, E. W. (2007). High-level business processes for agile B2B collaboration. 35th International MATADOR Conference, Taipei, Taiwan , July 2007. London, United Kingdom: Springer.
Wang, Guojun, Choo, Kim-Kwang Raymond, Ko, Ryan K. L., Xu, Yang and Crispo, Bruno eds. (2022). Ubiquitous Security : First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers. UbiSec: First International Conference on Ubiquitous Security, Guangzhou, China, 28–31 December 2021. Singapore: Springer.
Digital Service Transformation: Pathways to human and economic wellbeing White Paper
Andreassen, Tor W., Archibald, Gordon, Beekhuyzen, Jenine, Bongiovanni, Ivano, Brea, Edgar, Breidbach, Christoph, Burchill, Keith, Burgers, Henri, Cao, Selina, Coote, Len, Coram, Brendan, Cunningham, Claire, Feast, George, Field, Mitch, Ford, Jerad, Fouche, Leon, Gain, Alexandria, Gooding, Glen, Goyeneche Ramirez, David, Green, Teegan, Gschwind, Daniel, Hall, Thomas, Hartley, Nicole, Heinz, Daniel, Hine, Damian, Indulska, Marta, Kapernick, Brett, Kastelle, Tim, Ko, Ryan ... Zhang, Wenlu (2023). Digital Service Transformation: Pathways to human and economic wellbeing White Paper. Brisbane, QLD Australia: The University of Queensland Business School - Service Innovation Alliance. doi: 10.14264/aed4918
Discussion Paper: 2023-2030 Australian Cyber Security Strategy
Abeysooriya, Sasenka, Akhlaghpour, Saeed, Bongiovanni, Ivano, Dowsett, Dallas, Grotowski, Joseph, Holm, Mike, Kim, Dan, Ko, Ryan, Phillips, Andelka M., Slapnicar, Sergeja, Stockdale, David, Swinson, John, Thonon, Geoffroy, Utting, Mark, Walker-Munro, Brendan and Willoughby, Shannon (2023). Discussion Paper: 2023-2030 Australian Cyber Security Strategy. UQ CYBER and AUSCERT.
Dataset for SCP Survey Paper published in the journal Computers & Security.
Ho, Hee Meng and Ko, Ryan (2022). Dataset for SCP Survey Paper published in the journal Computers & Security.. The University of Queensland. (Dataset) doi: 10.48610/213f95d
Nabbs-Keller, G., Ko, R., Mackay, T., Salmawan, N. A., Widodo, W. N. and Reksoprodjo, A. H. S. (2021). Cyber security governance in the Indo-Pacific: Policy futures in Australia, Indonesia and the Pacific. Policy Futures Brisbane, Australia: The University of Queensland. doi: 10.14264/4364b42
Systems and methods for enhancing data provenance by logging kernel-level events
Ko, Ryan Kok Leong, Choi, Taejun and Anderson-Scott, Christian (2021). Systems and methods for enhancing data provenance by logging kernel-level events. WO2021038527A1.
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
Zhang, Yanjun, Bai, Guangdong, Li, Xue, Curtis, Caitlin, Chen, Chen and Ko, Ryan KL (2020). PrivColl: Practical Privacy-Preserving Collaborative Machine Learning.
Dataset of data breaches and ransomware attacks over 15 years from 2004
Tsen, Elinor, Ko, Ryan and Slapnicar, Sergeja (2020). Dataset of data breaches and ransomware attacks over 15 years from 2004. The University of Queensland. (Dataset) doi: 10.14264/dfe5027
Dizon, Michael, Ko, Ryan, Rumbles, Wayne, Gonzalez, Patricia, McHugh, Philip and Meehan, Anthony (2019). A matter of security, privacy and trust: a study of the principles and values of encryption in New Zealand. NZ Law Foundation: NZ Law Foundation.
Security systems, methods and devices
Ko, Ryan Kok Leong , Choi, Taejun and Anderson-Scott, Christian (2019). Security systems, methods and devices. 756876.
Ko, Ryan, Clarke, Geoff, Ramaswamy, Chandramouli, Ge, Xiaoyu and Chaudury, Abhik (2018). ISO/IEC 21878:2018 Information technology -- Security techniques -- Security guidelines for design and implementation of virtualized servers. ISO/IEC JTC 1/SC 27 Information Security, cybersecurity and privacy protection Geneva, Switzerland: ISO.
Towards one global privacy law
Ryan Ko, Mark Rodrigues, Aleksey Ladur and Craig Scoon (2018, 01 04). Towards one global privacy law AsiaGlobal Online
Turning the tide with cyber toolmakers
Ko, Ryan (2017, 09 01). Turning the tide with cyber toolmakers The National Business Review (NZ) 101-127.
Opinion: ransomware attack needs global solution
Burton, Joe and Ko, Ryan (2017, 05 22). Opinion: ransomware attack needs global solution Waikato Times 1-1.
Why we need a remote kill switch for our online data
Ko, Ryan (2016, 11 27). Why we need a remote kill switch for our online data Waikato Times 1-1.
Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.
Benzie, Julie, McCarter, Dale and Ko, Ryan (2014). Cyber security NZ SME landscape: report prepared for Vodafone NZ Ltd.. New Zealand: Vodafone NZ.
Determining file allocation based on file operations
Tan, Yu Shyang, Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Determining file allocation based on file operations. US9152640B2.
Cloud computing vulnerability incidents: a statistical overview
Ko, Ryan, Lee, Stephen G. and Rajan, Veerapa (2013). Cloud computing vulnerability incidents: a statistical overview. Seattle, United States: Cloud Security Alliance.
Suen, Chun Hui, Jagadpramana, Peter, Ko, Kok Leong Ryan and Lee, Bu Sung (2013). Tracing data block operations. WO2013025211A1.
Tracing operations in a cloud system
Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.
Tracing operations in a cloud system
Ko, Kok Leong Ryan, Jagadpramana, Peter and Lee, Bu Sung (2013). Tracing operations in a cloud system. WO2013009300A1.
Cloud Consumer Advocacy questionnaire and information survey
Ko, Ryan K. L., Goh, George, Jaini, Srinivas and Mather, Tim (2011). Cloud Consumer Advocacy questionnaire and information survey. Seattle, USA: Cloud Security Alliance.
Ko, Ryan Kok Leong (2011). A hybrid hierarchical task network planning and ontological approach for dynamic cross-enterprise business process formulation. PhD Thesis, College of Engineering, Nanyang Technological University Singapore.
(2022–2027) Monash University
(2022–2023) Horticulture Innovation Australia Limited
(2021–2024) Griffith University
Development of quality assurance technologies for meat processing plants
(2021) Innovation Connections
Massive static and real-time datasets for cyber security research and digital competitiveness
(2020–2023) Data 61 - University Collaboration Agreement (DUCA)
Applying Situational Crime Prevention to Business Processes to Prevent Cybercrime
Doctor Philosophy — Principal Advisor
Virtualized Root of Trust in Cloud Computing
Doctor Philosophy — Principal Advisor
Evaluating and Improving Type Inference Models for Web Application Reverse Engineering
Doctor Philosophy — Principal Advisor
Other advisors:
Adaptive, secure and resilient programmable logic controllers (PLCs) and data transfer protocols
Doctor Philosophy — Principal Advisor
Other advisors:
Using Situational Crime Prevention (SCP) to Prevent Cybercrimes
Doctor Philosophy — Principal Advisor
Other advisors:
A Distributed Data Collection Infrastructure For Automating Industrial Control Systems Security
Doctor Philosophy — Principal Advisor
Other advisors:
Distributed data collection infrastructure for IT and OT networks for automated early warning detection
Doctor Philosophy — Principal Advisor
Other advisors:
Secure, Accountable and Provenance-Centric File System
Doctor Philosophy — Principal Advisor
Other advisors:
Examining Changes in Conspiracy Discourse on Reddit from 2019 - 2023
Doctor Philosophy — Associate Advisor
Other advisors:
The nexus between data breaches, cyber safety and employee productivity in the hybrid work context
Doctor Philosophy — Associate Advisor
Other advisors:
Metaverse
Doctor Philosophy — Associate Advisor
Other advisors:
IoT security analytics
Doctor Philosophy — Associate Advisor
Other advisors:
Unified Cyber Security Framework for Distributed Learning
Doctor Philosophy — Associate Advisor
Other advisors:
Security of Internet of Things (IoT) Integration
Doctor Philosophy — Associate Advisor
Other advisors:
Informal and formal justice for rape: Digital "court" and court trials in Australia
Doctor Philosophy — Associate Advisor
Other advisors:
Machine Learning for Cyber Security
Doctor Philosophy — Associate Advisor
Other advisors:
Investigating the components of a contextual cyber resilience for organisations
(2023) Doctor Philosophy — Associate Advisor
Other advisors:
Security and Performance Evaluation of Software Defined Networking adopting Moving Target Defenses
(2023) Doctor Philosophy — Associate Advisor
Other advisors:
Privacy-preserving Sharing for Genome-wide Analysis
(2021) Doctor Philosophy — Associate Advisor
Other advisors: