A survey and analysis of the GNSS spoofing threat and countermeasures D Schmidt, K Radke, S Camtepe, E Foo, M Ren ACM Computing Surveys (CSUR) 48 (4), 1-31, 2016 | 238 | 2016 |
Improving performance of intrusion detection system using ensemble methods and feature selection NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza Proceedings of the Australasian computer science week multiconference, 1-6, 2018 | 201 | 2018 |
Off-line fair payment protocols using convertible signatures C Boyd, E Foo International Conference on the Theory and Application of Cryptology and …, 1998 | 176 | 1998 |
Secure data aggregation in wireless sensor network: a survey H Al Zaid, E Foo, J Gonzalez Nieto Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008 | 166 | 2008 |
Anomaly detection for industrial control systems using process mining D Myers, S Suriadi, K Radke, E Foo Computers & Security 78, 103-125, 2018 | 117 | 2018 |
Poisoned GOOSE: Exploiting the GOOSE protocol NS Kush, E Ahmed, M Branagan, E Foo Proceedings of the Twelfth Australasian Information Security Conference …, 2014 | 104 | 2014 |
Towards secure and legal e-tendering M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ... Journal of Information Technology in Construction 11 (e-Commerce in …, 2006 | 94 | 2006 |
Securing DNP3 broadcast communications in SCADA systems R Amoah, S Camtepe, E Foo IEEE Transactions on Industrial Informatics 12 (4), 1474-1485, 2016 | 89 | 2016 |
A user-centric federated single sign-on system S Suriadi, E Foo, A Jøsang Journal of Network and Computer Applications 32 (2), 388-401, 2009 | 86 | 2009 |
A new authentication mechanism and key agreement protocol for sip using identity-based cryptography J Ring, K Choo, E Foo, M Looi Proceedings of the AusCERT Asia Pacific Information Technology Security …, 2006 | 79 | 2006 |
An efficient authentication scheme for intra-vehicular controller area network B Palaniswamy, S Camtepe, E Foo, J Pieprzyk IEEE Transactions on Information Forensics and Security 15, 3107-3122, 2020 | 71 | 2020 |
Practical modbus flooding attack and detection S Bhatia, NS Kush, C Djamaludin, AJ Akande, E Foo Proceedings of the Twelfth Australasian Information Security Conference …, 2014 | 71 | 2014 |
Toward non-parallelizable client puzzles S Tritilanunt, C Boyd, E Foo, JM González Nieto Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007 | 64 | 2007 |
Who is more susceptible to phishing emails?: a Saudi Arabian study I Alseadoon, T Chan, E Foo, J Gonzalez Nieto | 63 | 2012 |
Barriers to information technology governance adoption: a preliminary empirical investigation M Othman, T Chan, E Foo, G Timbrell Knowledge Management and Innovation-A Business Competitive Edge Perspective …, 2011 | 61 | 2011 |
RSDA: Reputation-based secure data aggregation in wireless sensor networks H Alzaid, E Foo, JG Nieto 2008 Ninth International Conference on Parallel and Distributed Computing …, 2008 | 60 | 2008 |
Extending the cyber-attack landscape for SCADA-based critical infrastructure NR Rodofile, K Radke, E Foo International Journal of Critical Infrastructure Protection 25, 14-35, 2019 | 49 | 2019 |
Formal modelling and analysis of DNP3 secure authentication R Amoah, S Camtepe, E Foo Journal of Network and Computer Applications 59, 345-360, 2016 | 49 | 2016 |
Defining security services for electronic tendering R Du, E Foo, C Boyd, B Fitzgerald Proceedings of the second workshop on Australasian information security …, 2004 | 46 | 2004 |
Addressing malware attacks on connected and autonomous vehicles: recent techniques and challenges A Al-Sabaawi, K Al-Dulaimi, E Foo, M Alazab Malware Analysis Using Artificial Intelligence and Deep Learning, 97-119, 2021 | 41 | 2021 |