
Ernest Foo
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j23]Aklilu Daniel Tesfamicael
, Vicky Liu
, Matthew McKague
, William J. Caelli, Ernest Foo:
A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market. IEEE Access 8: 132424-132445 (2020) - [j22]Basker Palaniswamy
, Seyit Camtepe
, Ernest Foo
, Josef Pieprzyk
:
An Efficient Authentication Scheme for Intra-Vehicular Controller Area Network. IEEE Trans. Inf. Forensics Secur. 15: 3107-3122 (2020) - [j21]Basker Palaniswamy, Seyit Camtepe
, Ernest Foo
, Leonie Simpson, Mir Ali Rezazadeh Baee
, Josef Pieprzyk:
Continuous authentication for VANET. Veh. Commun. 25: 100255 (2020) - [c57]Darshika Niranjan Koggalahewa, Yue Xu, Ernest Foo
:
Spam Detection in Social Networks based on Peer Acceptance. ACSW 2020: 8:1-8:7 - [c56]Jayamine Alupotha, Xavier Boyen, Ernest Foo:
Compact Multi-Party Confidential Transactions. CANS 2020: 430-452 - [c55]Darshika N. Koggalahewa, Yue Xu, Ernest Foo:
Two-stage Unsupervised Approach for Combating Social Spammers. SSCI 2020: 71-78
2010 – 2019
- 2019
- [j20]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Extending the cyber-attack landscape for SCADA-based critical infrastructure. Int. J. Crit. Infrastructure Prot. 25: 14-35 (2019) - [j19]Mir Ali Rezazadeh Baee
, Leonie Simpson
, Ernest Foo
, Josef Pieprzyk
:
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. IEEE Trans. Veh. Technol. 68(12): 11577-11587 (2019) - [c54]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, Bill Caelli:
QoE Estimation Model for a Secure Real-Time Voice Communication System in the Cloud. ACSW 2019: 10:1-10:9 - [c53]Mukhtar Hussain
, Ernest Foo
, Suriadi Suriadi:
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection. FIT 2019: 150-155 - 2018
- [j18]David Myers
, Suriadi Suriadi
, Kenneth Radke, Ernest Foo:
Anomaly detection for industrial control systems using process mining. Comput. Secur. 78: 103-125 (2018) - [j17]Hassan Fareed M. Lahza, Kenneth Radke, Ernest Foo:
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols. Int. J. Crit. Infrastructure Prot. 20: 48-67 (2018) - [c52]Ngoc Tu Pham, Ernest Foo, Suriadi Suriadi, Helen Jeffrey, Hassan Fareed M. Lahza:
Improving performance of intrusion detection system using ensemble methods and feature selection. ACSW 2018: 2:1-2:6 - [c51]Alvin DMello, Ernest Foo, Jason Reid:
Characterizing TCP/IP for High Frequency Communication Systems. MilCIS 2018: 1-7 - [c50]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, Bill Caelli:
Modeling for a QoS-Efficient Real-Time Video Conferencing System in the Cloud. SoftCOM 2018: 1-6 - [c49]Xuelei Wang, Ernest Foo:
Assessing Industrial Control System Attack Datasets for Intrusion Detection. SSIC 2018: 1-8 - [e2]Sajal Bhatia, Alvaro A. Cárdenas, Ernest Foo, Marina Krotofil, Sye Loong Keoh, Thomas Locher, Daisuke Mashima, Tommy Morris, John Mulder, Stephen McLaughlin, Igor Nai Fovino, Julian L. Rrushi, Bradley Schatz, Jared Smith, Saman A. Zonouz, Tim Zimmerman:
Proceedings of the 4th Annual Industrial Control System Security Workshop, ICSS 2018, San Juan, PR, USA, December 4, 2018. ACM 2018, ISBN 978-1-4503-6220-7 [contents] - 2017
- [c48]Nicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke, Ernest Foo:
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure. ACISP (2) 2017: 452-459 - [c47]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Framework for SCADA cyber-attack dataset creation. ACSW 2017: 69:1-69:10 - [c46]Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, William J. Caelli:
Modeling for performance and security balanced trading communication systems in the cloud. IPCCC 2017: 1-7 - [c45]David Myers
, Kenneth Radke, Suriadi Suriadi, Ernest Foo:
Process Discovery for Industrial Control System Cyber Attack Detection. SEC 2017: 61-75 - [c44]Michelle Fernando, Dhammika Jayalath
, Seyit Camtepe
, Ernest Foo:
Reed Solomon Codes for the Reconciliation of Wireless PHY Layer Based Secret Keys. VTC-Fall 2017: 1-6 - 2016
- [j16]Jonathan J. Davis, Ernest Foo:
Automated feature engineering for HTTP tunnel detection. Comput. Secur. 59: 166-185 (2016) - [j15]Chris I. Djamaludin, Ernest Foo, Seyit Ahmet Çamtepe
, Peter Corke
:
Revocation and update of trust in autonomous delay tolerant networks. Comput. Secur. 60: 15-36 (2016) - [j14]Desmond Allan Schmidt, Kenneth Radke, Seyit Ahmet Çamtepe
, Ernest Foo, Michal Ren:
A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. ACM Comput. Surv. 48(4): 64:1-64:36 (2016) - [j13]Raphael Amoah, Seyit Ahmet Çamtepe
, Ernest Foo:
Formal modelling and analysis of DNP3 secure authentication. J. Netw. Comput. Appl. 59: 345-360 (2016) - [j12]Raphael Amoah
, Seyit Ahmet Çamtepe
, Ernest Foo:
Securing DNP3 Broadcast Communications in SCADA Systems. IEEE Trans. Ind. Informatics 12(4): 1474-1485 (2016) - [c43]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
DNP3 network scanning and reconnaissance for critical infrastructure. ACSW 2016: 39 - [c42]Anisur Rahman, Yue Xu
, Kenneth Radke, Ernest Foo:
Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. NSS 2016: 499-506 - 2015
- [j11]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of two authorization protocols using Colored Petri Nets. Int. J. Inf. Sec. 14(3): 221-247 (2015) - [c41]Ayodeji J. Akande, Colin J. Fidge, Ernest Foo:
Component Modeling for SCADA Network Mapping. ACSC 2015: 91-100 - [c40]David Myers, Ernest Foo, Kenneth Radke:
Internet-wide Scanning Taxonomy and Framework. AISC 2015: 61-65 - [c39]Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. AISC 2015: 67-70 - [e1]Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0 [contents] - 2014
- [j10]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Security properties analysis in a TPM-based protocol. Int. J. Secur. Networks 9(2): 85-103 (2014) - [c38]Nishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo:
Poisoned GOOSE: Exploiting the GOOSE Protocol. AISC 2014: 17-22 - [c37]Sajal Bhatia, Nishchal Kush, Chris I. Djamaludin, Ayodeji J. Akande, Ernest Foo:
Practical Modbus Flooding Attack and Detection. AISC 2014: 57-65 - [c36]Raphael Amoah, Suriadi Suriadi, Seyit Ahmet Çamtepe
, Ernest Foo:
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model. ICC 2014: 827-833 - 2013
- [j9]Chris I. Djamaludin, Ernest Foo, Peter I. Corke
:
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI. Comput. Secur. 39: 299-314 (2013) - [j8]Saeed Abu-Nimeh, Ernest Foo, Igor Nai Fovino, Manimaran Govindarasu, Thomas Morris:
Cyber security of networked critical infrastructures [Guest Editorial]. IEEE Netw. 27(1): 3-4 (2013) - [c35]Ibrahim Mohammed Alseadoon, Mohd Fairuz Iskandar Othman, Ernest Foo, Taizan Chan:
Typology of phishing email victims based on their behavioural response. AMCIS 2013 - [c34]Ernest Foo, Mark Branagan, Thomas Morris:
A Proposed Australian Industrial Control System Security Curriculum. HICSS 2013: 1754-1762 - [c33]Elena Sitnikova, Ernest Foo, Rayford B. Vaughn:
The Power of Hands-On Exercises in SCADA Cyber Security Education. World Conference on Information Security Education 2013: 83-94 - 2012
- [j7]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, DongGook Park:
A taxonomy of secure data aggregation in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 8(1/2): 101-148 (2012) - [j6]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, Ejaz Ahmed:
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Secur. Commun. Networks 5(2): 125-144 (2012) - [j5]Suriadi Suriadi, Chun Ouyang, Ernest Foo:
Privacy Compliance Verification in Cryptographic Protocols. Trans. Petri Nets Other Model. Concurr. 6: 251-276 (2012) - [c32]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. AISC 2012: 47-58 - 2010
- [c31]Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo:
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. AINA 2010: 859-865 - [c30]Rouhshi Low
, Mark Burdon
, Sharon Christensen, William D. Duncan, Paul Barnes, Ernest Foo:
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response. ISTAS 2010: 411-418
2000 – 2009
- 2009
- [j4]Suriadi Suriadi, Ernest Foo, Audun Jøsang
:
A user-centric federated single sign-on system. J. Netw. Comput. Appl. 32(2): 388-401 (2009) - [c29]Suriadi Suriadi, Chun Ouyang, Jason Smith, Ernest Foo:
Modeling and Verification of Privacy Enhancing Protocols. ICFEM 2009: 127-146 - [c28]Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Colin Boyd, Ernest Foo:
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA. S-CUBE 2009: 66-82 - 2008
- [j3]Rong Du, Ernest Foo, Colin Boyd:
Designing a secure e-tender submission protocol. Electron. Commer. Res. 8(3): 115-142 (2008) - [c27]Suriadi Suriadi, Ernest Foo, Rong Du:
Layered Identity Infrastructure Model for Identity Meta Systems. AISC 2008: 83-92 - [c26]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto:
Secure Data Aggregation in Wireless Sensor Network: a survey. AISC 2008: 93-105 - [c25]Mohammed Alzomai, Audun Jøsang
, Adrian McCullagh, Ernest Foo:
Strengthening SMS-Based Authentication through Usability. ISPA 2008: 683-688 - [c24]Suriadi Suriadi, Ernest Foo, Jason Smith:
Conditional Privacy Using Re-encryption. NPC Workshops 2008: 18-25 - [c23]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto:
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. PDCAT 2008: 419-424 - [c22]Suriadi Suriadi, Ernest Foo, Jason Smith:
A User-Centric Protocol for Conditional Anonymity Revocation. TrustBus 2008: 185-194 - 2007
- [j2]Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo:
Denial-of-service resistance in key establishment. Int. J. Wirel. Mob. Comput. 2(1): 59-71 (2007) - [c21]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200 - [c20]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264 - 2006
- [j1]Martin P. Betts, Peter Black, Sharon Christensen, Ed Dawson, Rong Du, William D. Duncan, Ernest Foo, Juan Manuel González Nieto:
Towards Secure and Legal E-Tendering. J. Inf. Technol. Constr. 11: 89-102 (2006) - [c19]Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering. ACSW 2006: 155-164 - [c18]Kevin Tham, Mark Looi, Ernest Foo:
Ubiquitous Authorization Scheme Based on Device Profile. EUC Workshops 2006: 312-321 - [c17]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625 - [c16]Rong Du, Colin Boyd, Ernest Foo:
A Secure E-Tender Submission Protocol. TrustBus 2006: 213-222 - 2005
- [c15]Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd:
Designing Secure E-Tendering Systems. TrustBus 2005: 70-79 - 2004
- [c14]Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson:
A Mobile Agent System Providing Offer Privacy. ACISP 2004: 301-312 - [c13]Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell:
Visually Sealed and Digitally Signed Documents. ACSC 2004: 287-294 - [c12]Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald:
Defining Security Services for Electronic Tendering. ACSW 2004: 43-52 - [c11]Matthew Henricksen, Ming Yao, Ernest Foo:
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. Cryptographic Algorithms and their Uses 2004: 110-124 - [c10]Ming Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173 - [c9]Ming Yao, Matthew Henricksen, Ernest Foo, Ed Dawson:
Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures. TrustBus 2004: 132-141 - 2003
- [c8]Ming Yao, Ernest Foo, Kun Peng, Ed Dawson:
An Improved Forward Integrity Protocol for Mobile Agents. WISA 2003: 272-285 - 2000
- [c7]Ernest Foo, Colin Boyd:
Passive Entities: A Strategy for Electronic Payment Design. ACISP 2000: 134-148 - [c6]Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson:
Linkability in Practical Electronic Cash Design. ISW 2000: 149-163
1990 – 1999
- 1999
- [c5]Colin Boyd, Ernest Foo, Chris Pavlovski:
Efficient Electronic Cash Using Batch Signatures. ACISP 1999: 244-257 - [c4]Chris Pavlovski
, Colin Boyd, Ernest Foo:
Detachable Electronic Coins. ICICS 1999: 54-70 - 1998
- [c3]Colin Boyd, Ernest Foo:
Off-Line Fair Payment Protocols Using Convertible Signatures. ASIACRYPT 1998: 271-285 - [c2]Ernest Foo, Colin Boyd:
A Payment Scheme Using Vouchers. Financial Cryptography 1998: 103-121 - 1997
- [c1]Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson:
A taxonomy of electronic cash schemes. SEC 1997: 337-348
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-08 11:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint