Follow
Alex Ng
Alex Ng
Verified email at latrobe.edu.au - Homepage
Title
Cited by
Cited by
Year
Cybersecurity data science: an overview from machine learning perspective
IH Sarker, ASM Kayes, S Badsha, H Alqahtani, P Watters, A Ng
Journal of Big data 7, 1-29, 2020
7762020
A culturally sensitive test to evaluate nuanced gpt hallucination
TR McIntosh, T Liu, T Susnjak, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence, 2023
1562023
Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
ACM Computing Surveys (CSUR) 54 (9), 1-36, 2021
1542021
Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration
T McIntosh, T Susnjak, T Liu, D Xu, P Watters, D Liu, Y Hao, A Ng, ...
ACM Computing Surveys 57 (1), 1-40, 2024
1252024
A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues
ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters, A Ng, ...
Sensors 20 (9), 2464, 2020
862020
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters
Computers & security 134, 103424, 2023
692023
An evaluation of contemporary commercial SOAP implementations
A Ng, S Chen, P Greenfield
Proceedings of the 5th Australasian Workshop on Software and System …, 2004
652004
A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware
TR McIntosh, T Susnjak, T Liu, P Watters, A Ng, MN Halgamuge
IEEE Transactions on Artificial Intelligence, 2024
512024
A taxonomy of blockchain threats and vulnerabilities
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, MAPA Watters
Blockchain for Cybersecurity and Privacy Architectures, Challenges, and …, 2020
512020
Evaluation and modeling of web services performance
S Chen, B Yan, J Zic, R Liu, A Ng
2006 IEEE International Conference on Web Services (ICWS'06), 437-444, 2006
492006
Dynamic user-centric access control for detection of ransomware attacks
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 111, 102461, 2021
382021
Applying staged event-driven access control to combat ransomware
T McIntosh, ASM Kayes, YPP Chen, A Ng, P Watters
Computers & Security 128, 103160, 2023
372023
A mechanism to detect and prevent Ethereum blockchain smart contract reentrancy attacks
A Alkhalifah, A Ng, PA Watters, ASM Kayes
Frontiers in Computer Science 3, 598780, 2021
352021
Enforcing situation-aware access control to build malware-resilient file systems
T McIntosh, P Watters, ASM Kayes, A Ng, YPP Chen
Future Generation Computer Systems 115, 568-582, 2021
352021
A study of the impact of compression and binary encoding on SOAP performance
A Ng, P Greenfield, S Chen
Proceedings of the Sixth Australasian Workshop on Software and System …, 2005
292005
Automated measurement of attitudes towards social distancing using social media: a COVID-19 case study
ASM Kayes, MS Islam, PA Watters, A Ng, H Kayesh
Preprints, 2020
232020
An empirical analysis of blockchain cybersecurity incidents
A Alkhalifah, A Ng, ASM Kayes, J Chowdhury, M Alazab, PA Watters
IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE …, 2019
212019
An Empirical Analysis of Blockchain Cybersecurity Incidents
A Alkhalifah, A Ng, MJM Chowdhury, ASM Kayes, PA Watters
In 2019 IEEE Asia-Pacific Conference on Computer Science and Data …, 2019
212019
Forensic characteristics of phishing petty theft or organized crime?
S McCombie, P Watters, A Ng, B Watson
WEBIST 2008-4th International Conference on Web Information Systems and …, 2008
212008
Optimising web services performance with table driven xml
A Ng
Australian Software Engineering Conference (ASWEC'06), 10 pp.-112, 2006
182006
The system can't perform the operation now. Try again later.
Articles 1–20