Suivre
Alex Ng
Alex Ng
Adresse e-mail validée de latrobe.edu.au - Page d'accueil
Titre
Citée par
Citée par
Année
Cybersecurity data science: an overview from machine learning perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big data 7, 1-29, 2020
5422020
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
1012021
A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues
ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters, A Ng, ...
Sensors 20 (9), 2464, 2020
772020
An evaluation of contemporary commercial SOAP implementations
A Ng, S Chen, P Greenfield
Proceedings of the 5th Australasian Workshop on Software and System …, 2004
642004
Evaluation and modeling of web services performance
S Chen, B Yan, J Zic, R Liu, A Ng
2006 IEEE International Conference on Web Services (ICWS'06), 437-444, 2006
492006
A taxonomy of blockchain threats and vulnerabilities
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, MAPA Watters
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and …, 2020
422020
A culturally sensitive test to evaluate nuanced gpt hallucination
TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence, 2023
382023
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
332023
A study of the impact of compression and binary encoding on SOAP performance
A Ng, P Greenfield, S Chen
Proceedings of the Sixth Australasian Workshop on Software and System …, 2005
292005
Dynamic user-centric access control for detection of ransomware attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
282021
Automated measurement of attitudes towards social distancing using social media: a COVID-19 case study
ASM Kayes, MS Islam, PA Watters, A Ng, H Kayesh
Preprints, 2020
242020
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2021
232021
A mechanism to detect and prevent Ethereum blockchain smart contract reentrancy attacks
A Alkhalifah, A Ng, PA Watters, ASM Kayes
Frontiers in Computer Science 3, 598780, 2021
222021
Forensic characteristics of phishing petty theft or organized crime?
S McCombie, P Watters, A Ng, B Watson
WEBIST 2008-4th International Conference on Web Information Systems and …, 2008
212008
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
172023
An empirical analysis of blockchain cybersecurity incidents
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, M Alazab, PA Watters
IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE …, 2019
172019
An Empirical Analysis of Blockchain Cybersecurity Incidents
A Alkhalifah, A Ng, MJM Chowdhury, ASM Kayes, PA Watters
In 2019 IEEE Asia-Pacific Conference on Computer Science and Data …, 2019
172019
Optimising web services performance with table driven xml
A Ng
Australian Software Engineering Conference (ASWEC'06), 10 pp.-112, 2006
162006
A performance evaluation of distributed database architectures
S Chen, A Ng, P Greenfield
Concurrency and Computation: Practice and Experience 25 (11), 1524-1546, 2013
142013
Trust modeling for blockchain-based wearable data market
MJM Chowdhury, MS Ferdous, K Biswas, N Chowdhury, ASM Kayes, ...
2019 IEEE International Conference on Cloud Computing Technology and Science …, 2019
122019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20