Follow
Ernest Foo
Title
Cited by
Cited by
Year
A survey and analysis of the GNSS spoofing threat and countermeasures
D Schmidt, K Radke, S Camtepe, E Foo, M Ren
ACM Computing Surveys (CSUR) 48 (4), 1-31, 2016
2382016
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian computer science week multiconference, 1-6, 2018
2012018
Off-line fair payment protocols using convertible signatures
C Boyd, E Foo
International Conference on the Theory and Application of Cryptology and …, 1998
1761998
Secure data aggregation in wireless sensor network: a survey
H Al Zaid, E Foo, J Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
1662008
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
1172018
Poisoned GOOSE: Exploiting the GOOSE protocol
NS Kush, E Ahmed, M Branagan, E Foo
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
1042014
Towards secure and legal e-tendering
M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ...
Journal of Information Technology in Construction 11 (e-Commerce in …, 2006
942006
Securing DNP3 broadcast communications in SCADA systems
R Amoah, S Camtepe, E Foo
IEEE Transactions on Industrial Informatics 12 (4), 1474-1485, 2016
892016
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
862009
A new authentication mechanism and key agreement protocol for sip using identity-based cryptography
J Ring, K Choo, E Foo, M Looi
Proceedings of the AusCERT Asia Pacific Information Technology Security …, 2006
792006
An efficient authentication scheme for intra-vehicular controller area network
B Palaniswamy, S Camtepe, E Foo, J Pieprzyk
IEEE Transactions on Information Forensics and Security 15, 3107-3122, 2020
712020
Practical modbus flooding attack and detection
S Bhatia, NS Kush, C Djamaludin, AJ Akande, E Foo
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
712014
Toward non-parallelizable client puzzles
S Tritilanunt, C Boyd, E Foo, JM González Nieto
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
642007
Who is more susceptible to phishing emails?: a Saudi Arabian study
I Alseadoon, T Chan, E Foo, J Gonzalez Nieto
632012
Barriers to information technology governance adoption: a preliminary empirical investigation
M Othman, T Chan, E Foo, G Timbrell
Knowledge Management and Innovation-A Business Competitive Edge Perspective …, 2011
612011
RSDA: Reputation-based secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JG Nieto
2008 Ninth International Conference on Parallel and Distributed Computing …, 2008
602008
Extending the cyber-attack landscape for SCADA-based critical infrastructure
NR Rodofile, K Radke, E Foo
International Journal of Critical Infrastructure Protection 25, 14-35, 2019
492019
Formal modelling and analysis of DNP3 secure authentication
R Amoah, S Camtepe, E Foo
Journal of Network and Computer Applications 59, 345-360, 2016
492016
Defining security services for electronic tendering
R Du, E Foo, C Boyd, B Fitzgerald
Proceedings of the second workshop on Australasian information security …, 2004
462004
Addressing malware attacks on connected and autonomous vehicles: recent techniques and challenges
A Al-Sabaawi, K Al-Dulaimi, E Foo, M Alazab
Malware Analysis Using Artificial Intelligence and Deep Learning, 97-119, 2021
412021
The system can't perform the operation now. Try again later.
Articles 1–20