| 2024 |
Choudhury, S. K., Sa, P. K., Choo, K. K. R., & Bakshi, S. (2024). Segmenting foreground objects in a multi-modal background using modified Z-score. Journal of ambient intelligence and humanized computing, 15(2), 1213-1227. DOI |
| 2023 |
Chen, Y., Salcic, Z., Wang, H., Choo, K. K. R., & Zhang, X. (2023). NACA: a joint distortion-based non-additive cost assignment method for video steganography. IEEE Transactions on Dependable and Secure Computing, 20(3), 2360-2374. DOI Scopus10 WoS8 |
| 2022 |
Telikani, A., Gandomi, A. H., Choo, K. K. R., & Shen, J. (2022). A cost-sensitive deep learning based approach for network traffic classification. IEEE Transactions on Network and Service Management, 19(1), 661-670. DOI |
| 2022 |
Asikuzzaman, M., Mareen, H., Moustafa, N., Choo, K. K. R., & Pickering, M. R. (2022). Blind camcording-resistant video watermarking in the DTCWT and SVD domain. IEEE Access, 10, 15681-15698. DOI |
| 2022 |
Xenofontos, C., Zografopoulos, I., Konstantinou, C., Jolfaei, A., Khan, M. K., & Choo, K. K. R. (2022). Consumer, commercial and industrial IoT (in)security: attack taxonomy and case studies. IEEE Internet of Things Journal, 9(1), 199-221. DOI Scopus128 WoS98 |
| 2022 |
Sahoo, K. S., Tiwary, M., Luhach, A. K., Nayyar, A., Choo, K. K. R., & Bilal, M. (2022). Demand-supply based economic model for resource provisioning in industrial IoT traffic. IEEE Internet of Things Journal, 9(13), 10529-10538. DOI |
| 2021 |
Jahromi, A. N., Karimipour, H., Dehghantanha, A., & Choo, K. K. R. (2021). Toward detection and attribution of cyber-attacks in IoT-enabled cyber-physical systems. IEEE Internet Of Things Journal, 8(17), 13712-13722. DOI |
| 2021 |
Fardous, J., Du, J. T., Hansen, P., Choo, K. K. R., & Huang, S. S. (2021). Group trip planning and information seeking behaviours by mobile social media users: a study of tourists in Australia, Bangladesh and China. Journal of Information Science, 47(3), 323-339. DOI Scopus14 |
| 2021 |
Dai, W., Lv, Y., Choo, K. K. R., Liu, Z., Zou, D., & Jin, H. (2021). CRSA: a cryptocurrency recovery scheme based on hidden assistance relationships. IEEE Transactions on Information Forensics and Security, 16(9511470), 4291-4305. DOI Scopus3 WoS2 |
| 2021 |
Sun, D., Zhang, X., Choo, K. K. R., Hu, L., & Wang, F. (2021). NLP-based digital forensic investigation platform for online communications. Computers & Security, 104(102210), 1-12. DOI Scopus35 |
| 2021 |
Tang, X., Guo, C., Choo, K. K. R., Liu, Y., & Li, L. (2021). A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Computer Networks, 200(108540), 1-14. DOI Scopus37 WoS28 |
| 2021 |
Peng, C., Luo, M., Li, L., Choo, K. K. R., & He, D. (2021). Efficient certificateless online/offline signature scheme for wireless body area networks. IEEE Internet of Things Journal, 8(18), 14287-14298. DOI Scopus33 WoS25 |
| 2020 |
Chin, P. Y., Evans, N., Liu, C. Z., & Choo, K. K. R. (2020). Understanding factors influencing employees' consumptive and contributive use of enterprise social networks. Information systems frontiers, 22(6), 1357-1376. DOI WoS35 |
| 2020 |
Saxena, N., Conti, M., Choo, K. K. R., & Chaudhari, N. S. (2020). BAS-VAS: a novel secure protocol for value added service delivery to mobile devices. IEEE Transactions on Information Forensics and Security, 15, 1470-1485. DOI |
| 2020 |
Kumar, N., Vasilakos, A. V., Choo, K. K. R., & Yang, L. T. (2020). Energy Management for Cyber-Physical Cloud Systems. Future Generation Computer Systems, 105, 754-756. DOI Scopus1 |
| 2020 |
Feng, J., Yang, L. T., Zhu, Q., & Choo, K. K. R. (2020). Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Transactions on Dependable and Secure Computing, 17(4), 857-868. DOI Scopus114 |
| 2020 |
Dai, W., Daia, C., Choo, K. R., Cui, C., Zou, D., & Jin, H. (2020). SDTE: a secure blockchain-based data trading ecosystem. IEEE Transactions on Information Forensics and Security, 15, 725-737. DOI Scopus228 WoS146 |
| 2020 |
Alkadi, O. S., Moustafa, N., Turnbull, B., & Choo, K. K. R. (2020). An ontological graph identification method for improving localisation of IP prefix hijacking in network systems. IEEE transactions on information forensics and security, 15, 1164-1174. DOI |
| 2020 |
Le Khac, N. A., Jacobs, D., Nijhoff, J., Bertens, K., & Choo, K. K. R. (2020). Smart vehicle forensics: challenges and case study. Future generation computer systems, 109, 500-510. DOI |
| 2020 |
Yang, J., Jiang, B., Lv, Z., & Choo, K. K. R. (2020). A task scheduling algorithm considering game theory designed for energy management in cloud computing. Future generation computer systems, 105, 985-992. DOI |
| 2019 |
Kanwal, T., Shaukat, S. A. A., Anjum, A., Malik, S. U. R., Choo, K. K. R., Khan, A., . . . Khan, S. U. (2019). Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes. Information sciences, 488, 238-256. DOI Scopus25 |
| 2019 |
Volety, T., Saini, S., McGhin, T., Liu, C. Z., & Choo, K. K. R. (2019). Cracking Bitcoin wallets: I want what you have in the wallets. Future generation computer systems, 91, 136-143. DOI |
| 2019 |
Do, Q., Martini, B., & Choo, K. K. R. (2019). The role of the adversary model in applied security research. Computers and Security, 81. pp. 156-181, 156-181. DOI |
| 2019 |
Zhang, F., Lee, V. E., Jin, R., Garg, S., Choo, K. K. R., Maasberg, M., . . . Cheng, C. (2019). Privacy-aware smart city: a case study in collaborative filtering recommender systems. Journal of parallel and distributed computing, 127, 145-159. DOI |
| 2019 |
Moustafa, N., Choo, K. K. R., Radwan, I., & Camtepe, S. (2019). Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE transactions on information forensics and security, 14(8, article no. 8600389), 1975-1987. DOI |
| 2019 |
Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N., & Choo, K. K. R. (2019). BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Computers and security, 85, 288-299. DOI |
| 2019 |
Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2019). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE transactions on emerging topics in computing, 7(2, article no. 7762123), 314-322. DOI |
| 2019 |
Aggarwal, S., Chaudhary, R., Aujla, G. S., Kumar, N., Choo, K. K. R., & Zomaya, A. Y. (2019). Blockchain for smart communities: applications, challenges and opportunities. Journal of network and computer applications, 144, 13-48. DOI |
| 2019 |
Bewong, M., Liu, J., Liu, L., Li, J., & Choo, K. K. R. (2019). A relative privacy model for effective privacy preservation in transactional data. Concurrency and computation: practice and experience, 31(23, article no. e4923), 1-13. DOI Scopus8 |
| 2019 |
Esposito, C., Castiglione, A., Frattini, F., Cinque, M., Yang, Y., & Choo, K. K. R. (2019). On data sovereignty in cloud-based computation offloading for smart cities applications. IEEE internet of things journal, 6(3), 4521-4535. DOI Scopus31 |
| 2018 |
Jia, X., He, D., Li, L., & Choo, K. K. R. (2018). Signature-based three-factor authenticated key exchange for internet of things applications. Multimedia tools and applications, 77(14), 18355-18382. DOI Scopus36 WoS28 |
| 2018 |
Ding, H., Zhang, Y., Ren, Y., Shi, B., & Choo, R. (2018). Heterogeneous investment in spatial public goods game with mixed strategy. Soft computing, 22(4), 1287-1294. DOI Scopus24 WoS22 |
| 2018 |
Amin, R., Islam, S. K. H., Kumar, N., & Choo, K. K. R. (2018). An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. Journal of network and computer applications, 104, 133-144. DOI Scopus74 WoS61 |
| 2018 |
Yang, W., Wang, G., Choo, K. K. R., & Chen, S. (2018). HEPart: A balanced hypergraph partitioning algorithm for big data applications. Future generation computer systems, 83, 250-268. DOI Scopus25 |
| 2018 |
D'orazio, C. J., & Choo, K. K. R. (2018). Circumventing iOS security mechanisms for APT forensic investigations: a security taxonomy for cloud apps. Future generation computer systems, 79(1), 247-261. DOI |
| 2018 |
Heravi, A., Mubarak, S., & Choo, K. K. R. (2018). Information privacy in online social networks: uses and gratification perspective. Computers in human behavior, 84, 441-459. DOI |
| 2018 |
Choo, K. K. R., Shi, Y., & Chen, Z. (2018). Measurements and security of complex networks and systems: research advances and challenges. Future generation computer systems, 83, 374-375. DOI Scopus2 |
| 2018 |
HaddadPajouh, H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future generation computer systems, 85, 1-9. DOI |
| 2018 |
Cahyani, N. D. W., Martini, B., Choo, K. K. R., Ab Rahman, N. H., & Ashman, H. (2018). An evidence-based forensic taxonomy of windows phone communication apps. Journal of forensic sciences, 63(3), 868-881. DOI |
| 2018 |
Pajouh, H. H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). Intelligent OS X malware threat detection with code inspection. Journal of computer virology and hacking techniques, 14(3), 213-223. DOI |
| 2018 |
Khan, M. K., Zakariah, M., Malik, H., & Choo, K. K. R. (2018). A novel audio forensic data-set for digital multimedia forensics. Australian journal of forensic sciences, 50(2), 525-542. DOI Scopus25 WoS20 |
| 2018 |
Wang, H., He, D., Sun, Y., Kumar, N., & Choo, K. K. R. (2018). PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. Future generation computer systems, 79(1), 262-270. DOI Scopus11 |
| 2018 |
Wu, L., Chen, B., Choo, K. K. R., & He, D. (2018). Efficient and secure searchable encryption protocol for cloud-based Internet of Things. Journal of parallel and distributed computing, 111, 152-161. DOI |
| 2018 |
Choo, K. K. R., Lu, R., Chen, L., & Yi, X. (2018). A foggy research future: advances and future opportunities in fog computing research. Future generation computer systems, 78(2), 677-679. DOI Scopus39 |
| 2018 |
Anjum, A., Malik, S. U. R., Choo, K. K. R., Khan, A., Haroon, A., Khan, S., . . . Raza, B. (2018). An efficient privacy mechanism for electronic health records. Computers and security, 72, 196-211. DOI Scopus62 WoS44 |
| 2018 |
Ma, M., He, D., Kumar, N., Choo, K. K. R., & Chen, J. (2018). Certificateless searchable public key encryption scheme for industrial Internet of Things. IEEE transactions on industrial informatics, 14(2), 759-767. DOI |
| 2018 |
Cahyani, N. D. W., Choo, K. K. R., Ab Rahman, N. H., & Ashman, H. (2018). An evidence-based forensic taxonomy of windows phone dating apps. Journal of forensic sciences, 64(1), 243-253. DOI |
| 2018 |
Zhou, L., Su, C., Sun, X., Zhao, X., & Choo, K. K. R. (2018). Stag hunt and trust emergence in social networks. Future generation computer systems, 88, 168-172. DOI Scopus11 |
| 2018 |
He, D., Kumar, N., Wang, H., Wang, L., Choo, K. K. R., & Vinel, A. (2018). A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE transactions on dependable and secure computing, 15(4), 633-645. DOI Scopus129 |
| 2018 |
Zhang, F., Lee, V. E., & Choo, K. K. R. (2018). Jo-DPMF: differentially private matrix factorization learning through joint optimization. Information sciences, 467, 271-281. DOI |
| 2018 |
Quick, D., & Choo, K. K. R. (2018). IoT Device Forensics and Data Reduction. IEEE Access, 6, 47566-47574. DOI |
| 2018 |
Fang, H., Xu, L., Zou, Y., Wang, X., & Choo, K. K. R. (2018). Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE transactions on vehicular technology, 67(11), 10788-10799. DOI |
| 2018 |
Do, Q., Martini, B., & Choo, K. K. R. (2018). Cyber-physical systems information gathering: A smart home case study. Computer networks, 138, 1-12. DOI |
| 2018 |
Xu, Z., Luo, X., Liu, Y., Choo, K. K. R., Sugumaran, V., Yen, N., . . . Hu, C. (2018). From latency, through outbreak, to decline: detecting different states of emergency events using web resources. IEEE transactions on big data, 4(2), 245-257. DOI WoS12 |
| 2018 |
Quick, D., & Choo, K. K. R. (2018). Digital forensic intelligence: data subsets and open source intelligence (DFINT+OSINT): a timely and cohesive mix. Future generation computer systems, 78(2), 558-567. DOI |
| 2018 |
Jabbarpour, M. R., Zarrabi, H., Khokhar, R. H., Shamshirband, S., & Choo, K. K. R. (2018). Applications of computational intelligence in vehicle traffic congestion problem: a survey. Soft computing, 22(7), 2299-2320. DOI |
| 2018 |
Radhakrishna, V., Aljawarneh, S. A., Kumar, P. V., & Choo, K. K. R. (2018). A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft computing, 22(6), 1903-1919. DOI Scopus114 |
| 2018 |
Chanajitt, R., Viriyasitavat, W., & Choo, K. K. R. (2018). Forensic analysis and security assessment of Android m-banking apps. Australian journal of forensic sciences, 50(1), 3-19. DOI |
| 2018 |
Ahmad, I., Abbas, H., Raza, A., Choo, K. K. R., Sajid, A., Pasha, M., & Khan, F. A. (2018). Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis. Australian journal of forensic sciences, 50(2), 183-208. DOI |
| 2018 |
Liu, X., Choo, K. K. R., Deng, R. H., Lu, R., & Weng, J. (2018). Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE transactions on dependable and secure computing, 15(1), 27-39. DOI Scopus169 |
| 2018 |
Jiang, R., Lu, R., & Choo, K. K. R. (2018). Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future generation computer systems, 78(1), 392-401. DOI |
| 2017 |
D'orazio, C. J., Choo, K. K. R., & Yang, L. T. (2017). Data exfiltration from Internet of Things devices: iOS devices as case studies. IEEE internet of things journal, 4(2), 524-535. DOI Scopus112 |
| 2017 |
Cahyani, N. D. W., Martini, B., Choo, K. K. R., & Al Azhar, A. K. B. P. M. N. (2017). Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study. Concurrency and computation: practice and experience, 29(14, article no. e3855), 1-16. DOI |
| 2017 |
Ab, R. N. H., Cahyani, N. D. W., & Choo, K. K. R. (2017). Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency and computation, 29(14, article no. e3868), 1-16. DOI |
| 2017 |
Do, Q., Martini, B., & Choo, K. K. R. (2017). Is the data on your wearable device secure? An Android Wear smartwatch case study. Software: practice and experience, 47(3), 391-403. DOI |
| 2017 |
Zheng, X., Xuan, J., Liu, Y., Choo, K. K. R., Mei, L., & Hu, C. (2017). Building spatial temporal relation graph of concepts pair using web repository. Information systems frontiers, 19(5), 1029-1038. DOI Scopus12 WoS6 |
| 2017 |
Odelu, V., Kumar, D. A., Sreenivasa, R. Y., Kumari, S., Khan, M. K., & Choo, K. K. R. (2017). Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Computer standards & interfaces, 54(1), 3-9. DOI Scopus85 WoS60 |
| 2017 |
Azfar, A., Choo, K. K. R., & Liu, L. (2017). Forensic taxonomy of android productivity apps. Multimedia tools and applications, 76(3), 3313-3341. DOI WoS19 |
| 2017 |
D'orazio, C. J., Lu, R., Choo, K. K. R., & Vasilakos, A. V. (2017). A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Applied mathematics and computation, 293, 523-544. DOI |
| 2017 |
Zhang, Z., & Choo, K. K. R. (2017). Guest editorial: multimedia social network security and applications. Multimedia tools and applications, 76(3), 3163-3168. DOI Scopus1 |
| 2017 |
Peng, J., Detchon, S., Choo, K. K. R., & Ashman, H. (2017). Astroturfing detection in social media: a binary n-gram-based approach. Concurrency computation, 29(17, article no. e4013), 1-14. DOI |
| 2017 |
Kumari, S., Das, A. K., Wazid, M., Li, X., Wu, F., Choo, K. K. R., & Khan, M. K. (2017). On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurrency and computation, 29(23, article no. e3930), 1-24. DOI Scopus36 WoS27 |
| 2017 |
Teing, Y. Y., Dehghantanha, A., Choo, K. K. R., & Yang, L. T. (2017). Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Computers and electrical engineering, 58, 350-363. DOI Scopus46 |
| 2017 |
Chen, Y., Wang, L., Li, F., Du, B., Choo, K. K. R., Hassan, H., & Qin, W. (2017). Air quality data clustering using EPLS method. Information fusion, 36, 225-232. DOI Scopus37 |
| 2017 |
Ding, Y., Xu, Z., Ye, J., & Choo, K. K. R. (2017). Secure outsourcing of modular exponentiations under single untrusted programme model. Journal of computer and system sciences, 90, 1-13. DOI Scopus42 WoS28 |
| 2017 |
Liu, J., Yu, X., Xu, Z., Choo, K. K. R., Hong, L., & Cui, X. (2017). A cloud-based taxi trace mining framework for smart city. Software: practice and experience, 47(8), 1081-1094. DOI Scopus35 WoS23 |
| 2017 |
D'Orazio, C. J., & Choo, K. K. R. (2017). A technique to circumvent SSL/TLS validations on iOS devices. Future generation computer systems, 74, 366-374. DOI |
| 2017 |
Tahaei, H., Salleh, R., Khan, S., Izard, R., Choo, K. K. R., & Anuar, N. B. (2017). A multi-objective software defined network traffic measurement. Measurement, 95, 317-327. DOI WoS36 |
| 2017 |
Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future generation computer systems, 68, 320-330. DOI Scopus143 WoS119 |
| 2017 |
Choo, K. K. R., Abawajy, J., & Islam, R. (2017). Special issue on cyber security in the critical infrastructure: advances and future directions. Journal of computer and system sciences, Special issue, 1-2. DOI |
| 2017 |
Chen, Y., Li, F., Chen, J., Du, B., Choo, K. K. R., & Hassan, H. (2017). EPLS: a novel feature extraction method for migration data clustering. Journal of parallel and distributed computing, 103, 96-103. DOI Scopus9 WoS7 |
| 2017 |
Li, B., Lu, R., Wang, W., & Choo, K. K. R. (2017). Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. Journal of parallel and distributed computing, 103, 32-41. DOI Scopus129 WoS98 |
| 2017 |
Xu, Z., Wu, L., Khan, M. K., Choo, K. K. R., & He, D. (2017). A secure and efficient public auditing scheme using RSA algorithm for cloud storage. Journal of supercomputing, 73(12), 5285-5309. DOI Scopus27 WoS15 |
| 2017 |
Eterovic Soric, B., Choo, K. K. R., Mubarak, S., & Ashman, H. L. (2017). Windows 7 antiforensics: a review and a novel approach. Journal of forensic sciences, 62(4), 1054-1070. DOI |
| 2017 |
Eterovic Soric, B., Choo, K. K. R., Ashman, H., & Mubarak, S. (2017). Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review. Computers and security, 70, 278-289. DOI |
| 2017 |
He, D., Kumar, N., Wang, H., Wang, L., & Choo, K. K. R. (2017). Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Applied mathematics and computation, 314, 31-43. DOI Scopus65 |
| 2017 |
Bolimos, I. A., & Choo, K. K. R. (2017). Online fraud offending within an Australian jurisdiction. Journal of financial crime, 24(2), 277-308. DOI |
| 2017 |
Choo, K. K. R., Rana, O. F., & Rajarajan, M. (2017). Cloud security engineering: theory, practice and future research. IEEE Transactions on Cloud Computing, 5(3), 372-374. DOI |
| 2017 |
Quick, D., & Choo, K. K. R. (2017). Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data. Software: practice and experience, 47(8), 1095-1109. DOI |
| 2017 |
He, D., Kumar, N., Choo, K. K. R., & Wu, W. (2017). Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Transactions on Information Forensics and Security, 12(2, article no. 7723917), 454-464. DOI WoS62 |
| 2017 |
Tassone, C. F. R., Martini, B., & Choo, K. K. R. (2017). Visualizing digital forensic datasets: a proof of concept. Journal of forensic sciences, 62(5), 1197-1204. DOI |
| 2017 |
Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K. K. R., & Dlodlo, M. (2017). From cloud to fog computing: a review and a conceptual live VM migration framework. IEEE Access, 5(7896564), 8284-8300. DOI Scopus284 WoS209 |
| 2017 |
Sung, N. W., Pham, N. T., Huynh, T., Hwang, W. J., You, I., & Choo, K. K. R. (2017). Prediction-based association control scheme in dense femtocell networks. PLoS one, 12(3), 1-23. DOI |
| 2017 |
Quick, D., & Choo, K. K. R. (2017). Pervasive social networking forensics: intelligence and evidence from mobile device extracts. Journal of network and computer applications, 86, 24-33. DOI |
| 2017 |
Liu, P., Choo, K. K. R., Wang, L., & Huang, F. (2017). SVM or deep learning? A comparative study on remote sensing image classification. Soft computing, 21(23), 7053-7065. DOI Scopus227 WoS101 |
| 2017 |
Wang, L., Zhang, J., Liu, P., Choo, K. K. R., & Huang, F. (2017). Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification. Soft computing, 21(1), 213-221. DOI Scopus155 WoS124 |
| 2017 |
Yang, W., Wang, G., Bhuiyan, M. Z. A., & Choo, K. K. R. (2017). Hypergraph partitioning for social networks based on information entropy modularity. Journal of network and computer applications, 86, 59-71. DOI Scopus51 |
| 2017 |
Aburumman, A., Seo, W. J., Esposito, C., Castiglione, A., Islam, R., & Choo, K. K. R. (2017). A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy. Concurrency and computation, 29(23, article no. e3978), 1-16. DOI WoS7 |
| 2017 |
Pokharel, S., Choo, K. K. R., & Liu, J. (2017). Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication. Concurrency and computation, 29(7), 1-13. DOI Scopus4 WoS3 |
| 2017 |
Pokharel, S., Choo, K. K. R., & Liu, J. (2017). Mobile cloud security: an adversary model for lightweight browser security. Computer standards and interfaces, 49, 71-78. DOI Scopus14 WoS11 |
| 2017 |
Meng, W., Li, W., Xiang, Y., & Choo, K. K. R. (2017). A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. Journal of network and computer applications, 78, 162-169. DOI Scopus69 |
| 2017 |
Huang, C., Lu, R., & Choo, K. K. R. (2017). Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE communications magazine, 55(11), 105-111. DOI Scopus313 WoS242 |
| 2017 |
Huang, C., Lu, R., & Choo, K. K. R. (2017). Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. Journal of computer and system sciences, 89, 51-63. DOI Scopus16 WoS12 |
| 2017 |
Teing, Y. Y., Dehghantanha, A., Choo, K. K. R., Dargahi, T., & Conti, M. (2017). Forensic investigation of cooperative storage cloud service: symform as a case study. Journal of forensic sciences, 62(3), 641-654. DOI Scopus19 Europe PMC2 |
| 2017 |
Luo, M., Zhou, X., Li, L., Choo, K. K. R., & He, D. (2017). Security analysis of two password-authenticated multi-key exchange protocols. IEEE access, 5, 8017-8024. DOI Scopus3 WoS3 |
| 2017 |
Mansoori, M., Welch, I., Choo, K. K. R., Maxion, R. A., & Hashemi, S. E. (2017). Real-world IP and network tracking measurement study of malicious websites with HAZOP. International journal of computers and applications, 39(2), 106-121. DOI Scopus3 |
| 2017 |
Cahyani, N. D. W., Martini, B., & Choo, K. K. R. (2017). Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study. Australian journal of forensic sciences, 49(1), 106-122. DOI |
| 2017 |
Daryabar, F., Dehghantanha, A., & Choo, K. K. (2017). Cloud storage forensics: MEGA as a case study. Australian journal of forensic sciences, 49(3), 344-357. DOI |
| 2017 |
Hu, Y. C., Choo, K. K. R., & Chen, W. L. (2017). Tamper detection and image recovery for BTC-compressed images. Multimedia tools and applications, 76(14), 15435-15463. DOI Scopus17 |
| 2017 |
Cahyani, N. D. W., Rahman, N. H. A., Glisson, W. B., & Choo, K. K. R. (2017). The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mobile networks and applications, 22(2), 240-254. DOI |
| 2017 |
Azfar, A., Choo, K. K. R., & Liu, L. (2017). Forensic taxonomy of Android social apps. Journal of forensic sciences, 62(2), 435-456. DOI Scopus22 WoS18 Europe PMC2 |
| 2016 |
Esposito, C., Castiglione, A., Martini, B., & Choo, K. K. R. (2016). Cloud manufacturing: security, privacy, and forensic concerns. IEEE cloud computing, 3(4), 16-22. DOI |
| 2016 |
Butler, A., & Choo, K. K. R. (2016). IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective. Security Journal, 29(2), 306-325. DOI |
| 2016 |
Osanaiye, O., Cai, H., Choo, K. K. R., Dehghantanha, A., Xu, Z., & Dlodlo, M. (2016). Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. Eurasip Journal on Wireless Communications and Networking, 2016(130), 1-10. DOI Scopus314 WoS190 |
| 2016 |
Ge, M., Choo, K. K. R., Huai, W., & Yong, Y. (2016). Survey on key revocation mechanisms in wireless sensor networks. Journal of Network and Computer Applications, 63, 24-38. DOI WoS26 |
| 2016 |
Xu, Z., Zhang, H., Sugumaran, V., Choo, K. K. R., Mei, L., & Zhu, Y. (2016). Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media. Eurasip Journal on Wireless Communications and Networking, 2016(44), 1-9. DOI Scopus93 WoS87 |
| 2016 |
D'Orazio, C., & Choo, K. K. R. (2016). An adversary model to evaluate DRM protection of video contents on iOS devices. Computers and security, 56, 94-110. DOI |
| 2016 |
Zhao, L., Chen, L., Ranjan, R., Choo, K. K. R., & He, J. (2016). Geographical information system parallelization for spatial big data processing: a review. Cluster computing, 19(1), 139-152. DOI Scopus66 |
| 2016 |
Yang, Y., Lu, J., Choo, K. K. R., & Liu, J. (2016). On lightweight security enforcement in cyber-physical systems. Lecture notes in computer science, 9542, 97-112. DOI Scopus17 |
| 2016 |
Gao, Y., Zeng, P., Choo, K. K. R., & Song, F. (2016). An improved online/offline identity-based signature scheme for WSNs. International journal of network security, 18(6), 1143-1151. Scopus18 |
| 2016 |
Ab, R. N. H., Glisson, W. B., Yang, Y., & Choo, K. K. R. (2016). Forensic-by-design framework for cyber-physical cloud systems. IEEE cloud computing, 3(1), 50-59. DOI Scopus153 |
| 2016 |
Li, L., Lu, R., Choo, K. K. R., Datta, A., & Shao, J. (2016). Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Transactions on information forensics and security, 11(8), 1847-1861. DOI Scopus186 |
| 2016 |
Rahman, S., Prima, A. A., Razzaque, M. A., Hassan, M. M., Alelaiwi, A., Alrubaian, M., & Choo, K. K. R. (2016). Internet data budget allocation policies for diverse smartphone applications. Eurasip journal on wireless communications and networking, 2016(1, article no. 226), 1-12. DOI Scopus1 WoS2 |
| 2016 |
Daryabar, F., Dehghantanha, A., Eterovic Soric, B., & Choo, K. K. R. (2016). Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices. Australian journal of forensic sciences, 48(6), 615-642. DOI Scopus56 |
| 2016 |
Shariati, M., Dehghantanha, A., & Choo, K. K. R. (2016). SugarSync forensic analysis. Australian Journal of Forensic Sciences, 48(1), 95-117. DOI Scopus45 |
| 2016 |
Norouzizadeh, D. F., Dehghantanha, A., Eterovic Soric, B., & Choo, K. K. R. (2016). Investigating social networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Australian journal of forensic sciences, 48(4), 469-488. DOI Scopus75 |
| 2016 |
Prokhorenko, V., Choo, K., & Ashman, H. (2016). Context-oriented web application protection model. Applied Mathematics and Computation, 285, 59-78. DOI Scopus26 WoS22 |
| 2016 |
Prokhorenko, V., Choo, K., & Ashman, H. (2016). Web application protection techniques: A taxonomy. Journal of Network and Computer Applications, 60, 95-112. DOI Scopus82 WoS59 |
| 2016 |
Prokhorenko, V., Choo, K., & Ashman, H. (2016). Intent-based extensible real-time PHP supervision framework. IEEE Transactions on Information Forensics and Security, 11(10), 2215-2226. DOI Scopus18 WoS14 |
| 2016 |
Ding, H., Cao, L., Ren, Y., Choo, K. K. R., & Shi, B. (2016). Reputation-based investment helps to optimize group behaviors in spatial lattice networks. PLoS ONE, 11(9, article number e0162781), 1-17. DOI Scopus22 Europe PMC2 |
| 2016 |
Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. K. R. (2016). Fine-grained database field search using attribute-based encryption for e-healthcare clouds. Journal of medical systems, 40(11, article no. 235), 1-8. DOI Scopus98 WoS74 Europe PMC7 |
| 2016 |
Lin, C., Zhu, F., Wu, W., Liang, K., & Choo, K. K. R. (2016). A new transitive signature scheme. Lecture notes in computer science, 9955, 156-167. DOI Scopus7 WoS7 |
| 2016 |
Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., & Choo, K. K. R. (2016). Cloud based data sharing with fine-grained proxy re-encryption. Pervasive and Mobile Computing, 28, 122-134. DOI Scopus93 |
| 2016 |
Yuan, L., Li, M., Guo, C., Choo, K. K. R., & Ren, Y. (2016). Novel threshold changeable secret sharing schemes based on polynomial interpolation. PLoS One, 11(10), 1-19. DOI Scopus20 Europe PMC1 |
| 2016 |
Azfar, A., Choo, R., & Liu, L. (2016). Android mobile VoIP apps: a survey and examination of their security and privacy. Electronic commerce research, 16(1), 73-111. DOI |
| 2016 |
Hu, Y., Yan, J., & Choo, K. K. R. (2016). PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment. Cluster computing, 19(1), 153-166. DOI Scopus7 WoS6 |
| 2016 |
Martini, B., Do, Q., & Choo, K. K. R. (2016). Digital forensics in the cloud era: the decline of passwords and the need for legal reform. Trends and issues in crime and criminal justice, (512), 1-16. |
| 2016 |
Leom, M. D., Choo, K. K. R., & Hunt, R. (2016). Remote wiping and secure deletion on mobile devices: a review. Journal of forensic sciences, 61(6), 1473-1492. DOI |
| 2016 |
Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster computing, 19(2), 723-740. DOI |
| 2016 |
Bagiwa, M. A., Wahab, A. W. A., Idris, M. Y. I., Khan, S., & Choo, K. K. R. (2016). Chroma key background detection for digital video using statistical correlation of blurring artifact. Digital investigation, 19, 29-43. DOI Scopus24 WoS18 |
| 2016 |
Afifi, F., Anuar, N. B., Shamshirband, S., & Choo, K. K. R. (2016). DyHAP: dynamic hybrid ANFIS-PSO approach for predicting mobile malware. PLoS ONE, 11(9, article no. e0162627), 1-21. DOI |
| 2016 |
Xu, Z., Wei, X., Liu, Y., Mei, L., Hu, C., Choo, K. K. R., . . . Sugumaran, V. (2016). Building the search pattern of web users using conceptual semantic space model. International journal of web and grid services, 12(3), 328-347. DOI Scopus18 WoS16 |
| 2016 |
Karim, A., Salleh, R., Khan, M. K., Siddiqa, A., & Choo, K. K. R. (2016). On the analysis and detection of mobile botnet applications. Journal of universal computer science, 22(4), 567-588. DOI Scopus19 WoS15 |
| 2016 |
Teing, Y. Y., Dehghantanha, A., Choo, K. K. R., Muda, Z., Abdullah, M. T., & Chai, W. C. (2016). A closer look at syncany windows and Ubuntu clients' residual artefacts. Lecture notes in computer science, 10067, 342-357. DOI |
| 2016 |
Iqbal, S., Mat, K. M. L., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of network and computer applications, 74, 98-120. DOI Scopus201 WoS146 |
| 2016 |
Al Mayouf, Y. R., Ismail, M., Abdullah, N. F., Wahab, A. W. A., Mahdi, O. A., Khan, S., & Choo, K. K. R. (2016). Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network. PLoS ONE, 11(11, article no. 0165966), 1-24. DOI WoS27 Europe PMC3 |
| 2016 |
Azfar, A., Choo, K. K. R., & Liu, L. L. (2016). An android communication app forensic taxonomy. Journal of forensic sciences, 61(5), 1337-1350. DOI WoS32 Europe PMC6 |
| 2016 |
Warif, N. B. A., Wahab, A. W. A., Idris, M. Y. I., Ramli, R., Salleh, R., Shamshirband, S., & Choo, K. K. R. (2016). Copy-move forgery detection: survey, challenges and future directions. Journal of network and computer applications, 75, 259-278. DOI Scopus193 |
| 2016 |
Liu, X., Deng, R. H., Choo, K. K. R., & Weng, J. (2016). An efficient privacy-preserving outsourced calculation toolkits with multiple keys. IEEE transactions on information forensics and security, 11(11), 2401-2414. DOI Scopus239 |
| 2016 |
Xu, Z., Zhang, H., Hu, C., Mei, L., Xuan, J., Choo, K. K. R., . . . Zhu, Y. (2016). Building knowledge base of urban emergency events based on crowdsourcing of social media. Concurrency computation, 28(15), 4038-4052. DOI Scopus91 WoS63 |
| 2016 |
Peng, J., Choo, K. K. R., & Ashman, H. (2016). User profiling in intrusion detection: A review. Journal of network and computer applications, 72, 14-27. DOI |
| 2016 |
Yang, T. Y., Dehghantanha, A., Choo, K. K. R., & Muda, Z. (2016). Windows instant messaging app forensics: Facebook and Skype as case studies. PLoS one, 11(3, article no. e0150300), 1-29. DOI |
| 2016 |
Ren, W., Huang, S., Ren, Y., & Choo, K. K. R. (2016). LiPISC: a lightweight and flexible method for privacy-aware intersection set computation. PLoS one, 11(6, article no. e0157752), 1. DOI Scopus8 WoS5 |
| 2016 |
Osanaiye, O., Choo, K. K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of network and computer applications, 67, 147-165. DOI |
| 2016 |
Do, Q., Martini, B., & Choo, K. K. R. (2016). A data exfiltration and remote exploitation attack on consumer 3D printers. IEEE Transactions on Information Forensics and Security, 11(10), 2174-2186. DOI |
| 2016 |
Li, B., Lu, R., Wang, W., & Choo, K. K. R. (2016). DDOA: a dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE transactions on information forensics and security, 11(11), 2415-2425. DOI Scopus84 WoS70 |
| 2016 |
Qureshi, M. A., Noor, R. M., Shamim, A., Shamshirband, S., & Choo, K. K. R. (2016). A lightweight radio propagation model for vehicular communication in road tunnels. Plos one, 11(3, article no. e0152727), 1-15. DOI |
| 2016 |
Peng, J., Choo, K. K. R., & Ashman, H. (2016). Bit-level n-gram based forensic authorship analysis on social media: identifying individuals from linguistic profiles. Journal of network and computer applications, 70, 171-182. DOI |
| 2016 |
Nam, J., Choo, K. K. R., & Paik, J. (2016). A provably-anonymous authentication scheme for roaming services. International journal of security and its applications, 10(3), 193-204. DOI |
| 2016 |
Ficco, M., Esposito, C., Chang, H., & Choo, K. K. R. (2016). Live migration in emerging cloud paradigms. IEEE cloud computing, 3(2), 12-19. DOI |
| 2016 |
Esposito, C., Castiglione, A., & Choo, K. K. R. (2016). Encryption-based solution for data sovereignty in federated clouds. IEEE Cloud Computing, 3(1), 12-17. DOI |
| 2015 |
Choo, K. K. R., & Sarre, R. (2015). Balancing privacy with legitimate surveillance and lawful data access. IEEE cloud computing, 2(4), 8-13. DOI |
| 2015 |
Nepal, S., Ranjan, R., & Choo, R. (2015). Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud computing, 2(2), 78-84. DOI |
| 2015 |
Do, Q., Martini, B., & Choo, K. K. R. (2015). Exfiltrating data from Android devices. Computers and security, 48, 74-91. DOI |
| 2015 |
Nam, J., Choo, K. K. R., Han, S., Kim, M., Paik, J., & Won, D. (2015). Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS one, 10(4, article no. e0116709), 1-21. DOI |
| 2015 |
Wang, S., Zeng, P., Choo, K. K. R., & Wang, H. (2015). A CCA2-secure multi-decrypter encryption scheme without random oracles. Informatica, 26(3), 543-556. DOI |
| 2015 |
Do, Q., Martini, B., & Choo, K. K. R. (2015). A cloud-focused mobile forensics methodology. IEEE Cloud Computing, 2(4), 60-65. DOI |
| 2015 |
Damshenas, M., Dehghantanha, A., Choo, K. K. R., & Mahmud, R. (2015). M0Droid: an Android behavioral-based malware detection model. Journal of information privacy and security, 11(3), 141-157. DOI |
| 2015 |
Do, Q., Martini, B., & Choo, K. K. R. (2015). A forensically sound adversary model for mobile devices. PLOS one, 10(9, article no. e0138449), 1-15. DOI |
| 2015 |
Juliadotter, N. V. J., & Choo, K. K. R. (2015). Cloud attack and risk assessment taxonomy. IEEE Cloud Computing, 2(1), 14-20. DOI |
| 2015 |
Amosun, P. A., Ige, O. A., & Choo, K. K. R. (2015). Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies. Eduction and Information Technologies, 20(3), 505-518. DOI |
| 2015 |
Chin, C. P. Y., Evans, N., & Choo, K. K. R. (2015). Exploring factors influencing the use of enterprise social networks in multinational professional service firms. Journal of organizational computing and electronic commerce, 25(3), 289-315. DOI |
| 2015 |
Borgman, B., Mubarak, S., & Choo, K. K. R. (2015). Cyber security readiness in the South Australian Government. Computer standards & interfaces, 37, 1-8. DOI |
| 2015 |
Ab, R. N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers and security, 49, 45-69. DOI |
| 2015 |
Nam, J., Choo, K. K. R., Sangchul, H., Paik, J., & Won, D. (2015). Two-round password-only authenticated key exchange in the three-party setting. Symmetry, 7(1), 105-124. DOI |
| 2015 |
Nam, J., Choo, K. K. R., Paik, J., & Won, D. (2015). An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting. IEICE transactions on fundamentals of electronics, communications and computer sciences, E98A(1), 424-427. DOI |
| 2014 |
Nam, J., Choo, K. K., Park, M., Paik, J., & Wong, D. (2014). On the security of a simple three-party key exchange protocol without server's public keys. The scientific world journal, 2014, 1-7. DOI |
| 2014 |
Quick, D., & Choo, K. K. R. (2014). Google drive: forensic analysis of data remnants. Journal of network and computer applications, 40(1), 179-193. DOI |
| 2014 |
Choo, K. K. R., Nam, J., & Wong, D. (2014). A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Information sciences, 281, 182-200. DOI |
| 2014 |
Imgraben, J., Engelbrecht, A., & Choo, K. K. R. (2014). Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour and information technology, 33(12), 1347-1360. DOI |
| 2014 |
Nam, J., Choo, K. K. R., Paik, J., & Wong, D. (2014). Password-only authenticated three-party key exchange proven secure against insider dictionary attacks. The scientific world journal, 2014, 1-15. DOI |
| 2014 |
Quick, D., & Choo, K. K. R. (2014). Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digital investigation, 11(4), 273-294. DOI |
| 2014 |
Martini, B., & Choo, K. K. (2014). Distributed filesystem forensics: XtreemFS as a case study. Digital investigation vol. 11, no. 4, pp. 295-313, 11(4), 295-313. DOI |
| 2014 |
Choo, K. K. R. (2014). Mobile cloud storage users. IEEE Cloud Computing, 1(3), 20-23. DOI |
| 2014 |
Wang, H., Zeng, P., & Choo, K. K. R. (2014). MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Security and communication networks, 7(11), 1641-1651. DOI Scopus8 |
| 2014 |
Choo, K. K. R. (2014). A cloud security risk-management strategy. IEEE Cloud Computing, 1(2), 52-56. DOI |
| 2014 |
Irwin, A. S. M., Slay, J., Choo, K. K. R., & Lui, L. (2014). Money laundering and terrorism financing in virtual environments: a feasibility study. Journal of money laundering control, 17(1), 50-75. DOI |
| 2014 |
Mani, D., Choo, K. K. R., & Mubarak, S. (2014). Information security in the South Australian real estate industry: a study of 40 real estate organisations. Information management and computer security, 22(1), 24-41. DOI |
| 2014 |
Martini, B., & Choo, K. K. R. (2014). Cloud forensic technical challenges and solutions: a snapshot. IEEE Cloud Computing, 1(4), 20-25. DOI |
| 2014 |
Hillman, H., Hooper, C., & Choo, K. K. R. (2014). Online child exploitation: challenges and future research directions. Computer law and security review, 30(6), 687-698. DOI |
| 2014 |
Yang, A., Nam, J., Kim, M., & Choo, K. K. (2014). Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols. The scientific world journal, 2014(825984), 1-8. DOI |
| 2014 |
Choo, K. K. R. (2014). Designated non-financial businesses and professionals: a review and analysis of recent financial action task force on money laundering mutual evaluation reports. Security Journal, 27(1), 1-26. DOI |
| 2014 |
Choo, K. K. R. (2014). Legal issues in the cloud. IEEE cloud computing, 1(1), 94-96. DOI |
| 2014 |
Nam, J., Choo, K. K. R., Kim, J., Kang, H. K., Kim, J., Paik, J., & Wong, D. (2014). Password-only authenticated three-party key exchange with provable security in the standard model. The scientific world journal, 2014(825072), 1-11. DOI Scopus15 WoS6 Europe PMC5 |
| 2014 |
Quick, D., & Choo, K. K. R. (2014). Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive. Trends and issues in crime and criminal justice, (480), 1-11. |
| 2013 |
Hooper, C., Martini, B., & Choo, K. K. R. (2013). Cloud computing and its implications for cybercrime investigations in Australia. Computer law and security report, 29(2), 152-163. DOI |
| 2013 |
Tassone, C., Martini, B., Choo, K. K. R., & Slay, J. (2013). Mobile device forensics: a snapshot. Trends and issues in crime and criminal justice, (460), 1-7. |
| 2013 |
Nam, J., Choo, K. K. R., Kim, M., Paik, J., & Wong, D. (2013). Dictionary attacks against password-based authenticated three-party key exchange protocols. Transactions on internet and information systems, 7(12), 3244-3260. DOI WoS12 |
| 2013 |
Choo, K. K. R. (2013). New payment methods : a review of 2010-2012 FATF mutual evaluation reports. Computers and security, 36, 12-26. DOI |
| 2013 |
Martini, B., & Choo, K. K. R. (2013). Cloud storage forensics: ownCloud as a case study. Digital investigation, 10(4), 287-299. DOI |
| 2013 |
Quick, D. P., & Choo, K. K. (2013). Digital droplets: Microsoft SkyDrive forensic data remnants. Future generation computer systems, 29(6), 1378-1394. DOI |
| 2013 |
Irwin, A. S. M., Slay, J., Choo, K. K. R., & Liu, L. (2013). Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective. Journal of money laundering control, 16(1), 6-40. DOI Scopus12 WoS5 |
| 2013 |
Quick, D., & Choo, K. K. (2013). Dropbox analysis: data remnants on user machines. Digital investigation: the international journal of digital forensics & incident response, 10(1), 3-18. DOI |
| 2013 |
Nam, J., Choo, K. K. R., Paik, J., & Wong, D. (2013). Cryptanalysis of server-aided password-based authenticated key exchange protocols. International journal of security and its applications, 7(2), 47-58. |
| 2013 |
Quick, D., & Choo, K. K. R. (2013). Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?. Digital investigation: the international journal of digital forensics & incident response, 10(3), 266-277. DOI |
| 2012 |
Irwin, A. S. M., Choo, K. K. R., & Liu, L. (2012). Modelling of money laundering and terrorism financing typologies. Journal of money laundering control, 15(3), 316-335. DOI Scopus24 WoS15 |
| 2012 |
Irwin, A. S. M., Choo, K. K., & Liu, L. (2012). An analysis of money laundering and terrorism financing typologies. Journal of money laundering control, 15(1), 85-111. DOI WoS33 |
| 2012 |
Martini, B., & Choo, K. K. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital investigation: the international journal of digital forensics & incident response, 9(2), 71-80. DOI |
| 2011 |
Choo, K. K. R. (2011). The cyber threat landscape : challenges and future research directions. Computers and security, 30(8), 719-731. DOI |
| 2011 |
Choo, K. K. R. (2011). Cyber threat landscape faced by financial and insurance industry. Trends and issues in crime and criminal justice, (408), 1-6. |
| 2011 |
Zeng, P., Cao, Z., & Choo, K. K. R. (2011). An ID-based digital watermarking protocol for copyright protection. Computers & electrical engineering, 37(4), 526-531. DOI Scopus9 |
| 2010 |
Zeng, P., Choo, K. K. R., & Sun, D. Z. (2010). On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Transactions on consumer electronics, 56(2), 566-569. DOI |
| 2010 |
Choo, K. K. R. (2010). Challenges in dealing with politically exposed persons. Trends and Issues in Crime and Criminal Justice, (386), 1-6. |
| 2010 |
Choo, K. K. R. (2010). Cloud computing: challenges and future directions. Trends & issues in crime and criminal justice, (400), 1-6. |
| 2010 |
Choo, K. K. R. (2010). High tech criminal threats to the national information infrastructure. Information security technical report, 15(3), 104-111. DOI |
| 2009 |
Zeng, P., Cao, Z., Choo, K. K. R., & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE communications letters, 13(3), 170-171. DOI |
| 2009 |
Wang, S., Cao, Z., Choo, K. K., & Wang, L. (2009). An improved identity-based key agreement protocol and its security proof. Information sciences, 179(3), 307-318. DOI |
| 2009 |
Choo, K. K. R. (2009). Money laundering and terrorism financing risks of prepaid cards instruments?. Asian journal of criminology, 4(1), 11-30. DOI |
| 2009 |
Wang, S., Cao, Z., Cheng, Z., & Choo, K. K. R. (2009). Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science China Information Sciences, 52(8), 1358-1370. DOI |
| 2009 |
Zeng, P., Cao, Z., Choo, K. K. R., & Wang, S. (2009). Security weakness in a dynamic program update protocol for wireless sensor networks. IEEE Communications Letters, 13(6), 426-428. DOI |
| 2009 |
Choo, K. K. R. (2009). Responding to online child sexual grooming: an industry perspective. Trends and issues in crime and criminal justice, (379), 1-6. |
| 2008 |
Choo, K. K. R. (2008). Politically exposed persons (PEPs): risks and mitigation. Journal of Money Laundering Control, 11(4), 371-387. DOI |
| 2008 |
Choo, K. K. R., & Smith, R. (2008). Criminal exploitation of online systems by organised crime groups. Asian journal of criminology, 3(1), 37-59. DOI |
| 2008 |
Choo, K. K. (2008). Organised crime groups in cyberspace: a typology. Trends in Organized Crime, 11(3), 270-295. DOI |
Available For Media Comment.