Alex Ng
Alex Ng
Verifierad e-postadress på latrobe.edu.au - Startsida
Citeras av
Citeras av
Cybersecurity data science: an overview from machine learning perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big data 7, 1-29, 2020
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues
ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters, A Ng, ...
Sensors 20 (9), 2464, 2020
An evaluation of contemporary commercial SOAP implementations
A Ng, S Chen, P Greenfield
Proceedings of the 5th Australasian Workshop on Software and System …, 2004
Evaluation and modeling of web services performance
S Chen, B Yan, J Zic, R Liu, A Ng
2006 IEEE International Conference on Web Services (ICWS'06), 437-444, 2006
A taxonomy of blockchain threats and vulnerabilities
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, MAPA Watters
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and …, 2020
A study of the impact of compression and binary encoding on SOAP performance
A Ng, P Greenfield, S Chen
Proceedings of the Sixth Australasian Workshop on Software and System …, 2005
Dynamic user-centric access control for detection of ransomware attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
Automated measurement of attitudes towards social distancing using social media: a COVID-19 case study
ASM Kayes, MS Islam, PA Watters, A Ng, H Kayesh
Preprints, 2020
Forensic characteristics of phishing petty theft or organized crime?
S McCombie, P Watters, A Ng, B Watson
WEBIST 2008-4th International Conference on Web Information Systems and …, 2008
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2021
A mechanism to detect and prevent ethereum blockchain smart contract reentrancy attacks
A Alkhalifah, A Ng, PA Watters, ASM Kayes
Frontiers in Computer Science 3, 598780, 2021
Optimising web services performance with table driven xml
A Ng
Australian Software Engineering Conference (ASWEC'06), 10 pp.-112, 2006
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
A performance evaluation of distributed database architectures
S Chen, A Ng, P Greenfield
Concurrency and Computation: Practice and Experience 25 (11), 1524-1546, 2013
An empirical analysis of blockchain cybersecurity incidents
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, M Alazab, PA Watters
IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE …, 2019
An Empirical Analysis of Blockchain Cybersecurity Incidents
A Alkhalifah, A Ng, MJM Chowdhury, ASM Kayes, PA Watters
In 2019 IEEE Asia-Pacific Conference on Computer Science and Data …, 2019
Trust modeling for blockchain-based wearable data market
MJM Chowdhury, MS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ...
2019 IEEE International Conference on Cloud Computing Technology and Science …, 2019
Inventive approaches for technology integration and information resources management
M Khosrow-Pour
IGI Global, 2014
A performance evaluation of public cloud using TPC-C
J Yao, A Ng, S Chen, D Liu, C Friedrich, S Nepal
Service-Oriented Computing-ICSOC 2012 Workshops: ICSOC 2012, International …, 2013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20