Research Publications for Ryan Kok Leong K L (Ryan) Ko

Welcome to the University of Waikato research publications search page. This database includes all research publications produced by the University from 1998.

See Also: Research Links | Student Research Theses | Research Commons

Author's Publications

Publications ByKO, Ryan Kok Leong K L (Ryan)

  Use our Online Phonebook to contact our current staff members.

  • Garae, J., Ko, R. K. L., Kho, J., Suwadi, S., Will, M. A., & Apperley, M. (2017). Visualizing the New Zealand Cyber Security Challenge for attack behaviors. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 1123-1130). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.362

  • Chase, J., Niyato, D., Wang, P., Chaisiri, S., & Ko, R. (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, PP(99). doi:10.1109/TDSC.2017.2703626

  • Will, M., Garae, J., Tan, Y. S., Scoon, C., & Ko, R. (2017). Returning control of data to users with a personal information crunch - a position paper. In International Conference on Cloud Computing Research and Innovation.

  • Liu, L., Ko, R. K. L., Ren, G., & Xu, X. (2017). Malware propagation and prevention model for time-varying community networks within Software Defined Networks. Security and Communication Networks, 2017, 1-8. doi:10.1155/2017/2910310

  • Will, M. A., & Ko, R. K. L. (2017). Secure FPGA as a service - towards secure data processing by physicalizing the cloud. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 449-455). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.270

  • Will, M. A., Ko, R. K. L., & Schlickmann, S. J. (2017). Anonymous data sharing between organisations with elliptic curve cryptography. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 1024-1031). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.347

  • Shute, S., Ko, R. K. L., & Chaisiri, S. (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 1131-1138). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.363

  • Burton, J., & Ko, R. (2017). Opinion: Ransomware attack needs global solution. Retrieved from http://www.stuff.co.nz/

  • Will, M. A., & Ko, R. K. L. (2016). Computing mod with a variable lookup table. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625 (pp. 3-17). Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3_1

  • Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R., & Alcaraz Calero, J. M. (2016). Preface: Proc 4th International Symposium on Security in Computing and Communications. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625. Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3

This page has been reformatted for printing.