Follow
Ryan Ko
Ryan Ko
Professor, Chair & Director – Cyber Security, The University of Queensland
Verified email at uq.edu.au - Homepage
Title
Cited by
Cited by
Year
Business process management (BPM) standards: a survey
RKL Ko, SSG Lee, E Wah Lee
Business process management journal 15 (5), 744-791, 2009
8132009
TrustCloud: A framework for accountability and trust in cloud computing
RKL Ko, P Jagadpramana, M Mowbray, S Pearson, M Kirchberg, Q Liang, ...
2011 IEEE World Congress on Services, 584-588, 2011
6712011
A computer scientist's introductory guide to business process management (BPM)
RKL Ko
XRDS: Crossroads, The ACM Magazine for Students 15 (4), 11-18, 2009
3422009
Towards achieving accountability, auditability and trust in cloud computing
RKL Ko, BS Lee, S Pearson
Advances in Computing and Communications: First International Conference …, 2011
1672011
Flogger: A file-centric logger for monitoring file access and transfers within cloud computing environments
RKL Ko, P Jagadpramana, BS Lee
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
1152011
S2logger: End-to-end data tracking mechanism for cloud data provenance
CH Suen, RKL Ko, YS Tan, P Jagadpramana, BS Lee
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
1022013
Progger: An efficient, tamper-evident kernel-space logger for cloud data provenance tracking
RKL Ko, MA Will
2014 IEEE 7th International Conference on Cloud Computing, 881-889, 2014
892014
How to track your data: The case for cloud computing provenance
OQ Zhang, M Kirchberg, RKL Ko, BS Lee
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
882011
From system-centric to data-centric logging-accountability, trust & security in cloud computing
RKL Ko, M Kirchberg, BS Lee
2011 Defense Science Research Conference and Expo (DSR), 1-4, 2011
84*2011
Cloud computing vulnerability incidents: A statistical overview
R Ko, SG Lee, V Rajan
Cloud Security Alliance, 2013
742013
Security and data accountability in distributed systems: A provenance survey
YS Tan, RKL Ko, G Holmes
2013 IEEE 10th International Conference on High Performance Computing and …, 2013
722013
A guide to homomorphic encryption
MA Will, RKL Ko
Elsevier, 2015
642015
Where is the human in human-centered AI? Insights from developer priorities and user experiences
WJ Bingley, C Curtis, S Lockey, A Bialkowski, N Gillespie, SA Haslam, ...
Computers in Human Behavior 141, 107617, 2023
612023
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
AMY Koay, RKL Ko, H Hettema, K Radke
Journal of Intelligent Information Systems 60 (2), 377-405, 2023
512023
How to track your data: Rule-based data provenance tracing algorithms
OQ Zhang, RKL Ko, M Kirchberg, CH Suen, P Jagadpramana, BS Lee
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
502012
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review
H Ho, R Ko, L Mazerolle
Computers & Security 115, 102611, 2022
492022
Formal concept discovery in semantic web data
M Kirchberg, E Leonardi, YS Tan, S Link, RKL Ko, BS Lee
Formal Concept Analysis: 10th International Conference, ICFCA 2012, Leuven …, 2012
472012
The cloud security ecosystem: technical, legal, business and management issues
R Choo, R Ko
Syngress, 2015
452015
A data-centric view of cloud security
V Kumar, S Chaisiri, R Ko
Institution of Engineering and Technology, 2017
402017
Taxonomy of Man-in-the-Middle Attacks on HTTPS
S Stricot-Tarboton, S Chaisiri, RKL Ko
2016 Ieee Trustcom/Bigdatase/Ispa, 527-534, 2016
402016
The system can't perform the operation now. Try again later.
Articles 1–20