Follow
Ernest Foo
Title
Cited by
Cited by
Year
A survey and analysis of the GNSS spoofing threat and countermeasures
D Schmidt, K Radke, S Camtepe, E Foo, M Ren
ACM Computing Surveys (CSUR) 48 (4), 1-31, 2016
2112016
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian computer science week multiconference, 1-6, 2018
1832018
Off-line fair payment protocols using convertible signatures
C Boyd, E Foo
International Conference on the Theory and Application of Cryptology and …, 1998
1771998
Secure data aggregation in wireless sensor network: a survey
H Al Zaid, E Foo, J Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
1682008
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
1052018
Poisoned GOOSE: Exploiting the GOOSE protocol
NS Kush, E Ahmed, M Branagan, E Foo
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
1012014
Towards secure and legal e-tendering
M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ...
Journal of Information Technology in Construction 11 (e-Commerce in …, 2006
892006
Securing DNP3 broadcast communications in SCADA systems
R Amoah, S Camtepe, E Foo
IEEE Transactions on Industrial Informatics 12 (4), 1474-1485, 2016
872016
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
872009
A new authentication mechanism and key agreement protocol for sip using identity-based cryptography
J Ring, K Choo, E Foo, M Looi
Proceedings of the AusCERT Asia Pacific Information Technology Security …, 2006
792006
Practical modbus flooding attack and detection
S Bhatia, NS Kush, C Djamaludin, AJ Akande, E Foo
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
692014
Toward non-parallelizable client puzzles
S Tritilanunt, C Boyd, E Foo, JM González Nieto
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
632007
Who is more susceptible to phishing emails?: a Saudi Arabian study
I Alseadoon, T Chan, E Foo, J Gonzalez Nieto
602012
RSDA: Reputation-based secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JG Nieto
2008 Ninth International Conference on Parallel and Distributed Computing …, 2008
592008
Barriers to information technology governance adoption: a preliminary empirical investigation
M Othman, T Chan, E Foo, G Timbrell
Knowledge Management and Innovation-A Business Competitive Edge Perspective …, 2011
582011
An efficient authentication scheme for intra-vehicular controller area network
B Palaniswamy, S Camtepe, E Foo, J Pieprzyk
IEEE Transactions on Information Forensics and Security 15, 3107-3122, 2020
512020
Extending the cyber-attack landscape for SCADA-based critical infrastructure
NR Rodofile, K Radke, E Foo
International Journal of Critical Infrastructure Protection 25, 14-35, 2019
482019
Formal modelling and analysis of DNP3 secure authentication
R Amoah, S Camtepe, E Foo
Journal of Network and Computer Applications 59, 345-360, 2016
462016
Defining security services for electronic tendering
R Du, E Foo, C Boyd, B Fitzgerald
Proceedings of the second workshop on Australasian information security …, 2004
442004
The power of hands-on exercises in SCADA cyber security education
E Sitnikova, E Foo, RB Vaughn
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013
402013
The system can't perform the operation now. Try again later.
Articles 1–20