Ernest Foo
Cited by
Cited by
Secure data aggregation in wireless sensor network: a survey
H Al Zaid, E Foo, J Gonzalez Nieto
Proceedings of the Sixth Australasian Information Security Conference (AISC …, 2008
Off-line fair payment protocols using convertible signatures
C Boyd, E Foo
International Conference on the Theory and Application of Cryptology and …, 1998
A survey and analysis of the GNSS spoofing threat and countermeasures
D Schmidt, K Radke, S Camtepe, E Foo, M Ren
ACM Computing Surveys (CSUR) 48 (4), 1-31, 2016
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
A new authentication mechanism and key agreement protocol for sip using identity-based cryptography
J Ring, K Choo, E Foo, M Looi
Proceedings of the AusCERT Asia Pacific Information Technology Security …, 2006
Poisoned GOOSE: Exploiting the GOOSE protocol
NS Kush, E Ahmed, M Branagan, E Foo
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
Towards secure and legal e-tendering
M Betts, P Black, S Christensen, E Dawson, R Du, B Duncan, E Foo, ...
Journal of Information Technology in Construction 11 (e-Commerce in …, 2006
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian Computer Science Week Multiconference, 1-6, 2018
Securing DNP3 broadcast communications in SCADA systems
R Amoah, S Camtepe, E Foo
IEEE Transactions on Industrial Informatics 12 (4), 1474-1485, 2016
Toward non-parallelizable client puzzles
S Tritilanunt, C Boyd, E Foo, JMG Nieto
International Conference on Cryptology and Network Security, 247-264, 2007
Barriers to information technology governance adoption: a preliminary empirical investigation
M Othman, T Chan, E Foo, G Timbrell
Knowledge Management and Innovation-A Business Competitive Edge Perspective …, 2011
RSDA: Reputation-based secure data aggregation in wireless sensor networks
H Alzaid, E Foo, JG Nieto
2008 Ninth International Conference on Parallel and Distributed Computing …, 2008
Practical modbus flooding attack and detection
S Bhatia, NS Kush, C Djamaludin, AJ Akande, E Foo
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
Defining security services for electronic tendering
R Du, E Foo, C Boyd, B Fitzgerald
Proceedings of the ACSW Workshop. The Australian Information Security …, 2004
Who is more susceptible to phishing emails?: a Saudi Arabian study
I Alseadoon, T Chan, E Foo, J Gonzalez Nieto
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
Formal modelling and analysis of DNP3 secure authentication
R Amoah, S Camtepe, E Foo
Journal of Network and Computer Applications 59, 345-360, 2016
Real-time and interactive attacks on DNP3 critical infrastructure using Scapy
N Rodofile, K Radke, E Foo
Proceedings of the 13th Australasian Information Security Conference (AISC …, 2015
Gap analysis of intrusion detection in smart grids
N Kush, E Foo, E Ahmed, I Ahmed, A Clark
School of Computer and Information Science, Security Research Centre, Edith …, 2011
An improved forward integrity protocol for mobile agents
M Yao, E Foo, K Peng, E Dawson
International Workshop on Information Security Applications, 272-285, 2003
The system can't perform the operation now. Try again later.
Articles 1–20