Prof Raymond Choo

School of Pharmacy and Biomedical Science

College of Health

Eligible to supervise Masters and PhD - email supervisor to discuss availability.

Available For Media Comment.


I currently hold the Cloud Technology Endowed Professorship at The University of Texas at San Antonio (UTSA), USA, with a courtesy appointment at UniSA. I can be contacted at raymond.choo@utsa.edu or raymond.choo@fulbrightmail.org.
I am the founding co-editor-in-chief of ACM Distributed Ledger Technologies: Research & Practice, and founding chair of IEEE Technology and Engineering Management Society (TEMS)’s Technical Committee on Blockchain and Distributed Ledger Technologies.

Date Position Institution name
2024 - ongoing Adjunct Professor Korea University
2016 - ongoing Associate Dean for Graduate Studies, College of AI, Cyber and Computing The University of Texas at San Antonio

Date Institution name Country Title
2003 - 2006 Queensland University of Technology Australia Ph.D.

Year Citation
2024 Choudhury, S. K., Sa, P. K., Choo, K. K. R., & Bakshi, S. (2024). Segmenting foreground objects in a multi-modal background using modified Z-score. Journal of ambient intelligence and humanized computing, 15(2), 1213-1227.
DOI
2023 Chen, Y., Salcic, Z., Wang, H., Choo, K. K. R., & Zhang, X. (2023). NACA: a joint distortion-based non-additive cost assignment method for video steganography. IEEE Transactions on Dependable and Secure Computing, 20(3), 2360-2374.
DOI Scopus10 WoS8
2022 Telikani, A., Gandomi, A. H., Choo, K. K. R., & Shen, J. (2022). A cost-sensitive deep learning based approach for network traffic classification. IEEE Transactions on Network and Service Management, 19(1), 661-670.
DOI
2022 Asikuzzaman, M., Mareen, H., Moustafa, N., Choo, K. K. R., & Pickering, M. R. (2022). Blind camcording-resistant video watermarking in the DTCWT and SVD domain. IEEE Access, 10, 15681-15698.
DOI
2022 Xenofontos, C., Zografopoulos, I., Konstantinou, C., Jolfaei, A., Khan, M. K., & Choo, K. K. R. (2022). Consumer, commercial and industrial IoT (in)security: attack taxonomy and case studies. IEEE Internet of Things Journal, 9(1), 199-221.
DOI Scopus128 WoS98
2022 Sahoo, K. S., Tiwary, M., Luhach, A. K., Nayyar, A., Choo, K. K. R., & Bilal, M. (2022). Demand-supply based economic model for resource provisioning in industrial IoT traffic. IEEE Internet of Things Journal, 9(13), 10529-10538.
DOI
2021 Jahromi, A. N., Karimipour, H., Dehghantanha, A., & Choo, K. K. R. (2021). Toward detection and attribution of cyber-attacks in IoT-enabled cyber-physical systems. IEEE Internet Of Things Journal, 8(17), 13712-13722.
DOI
2021 Fardous, J., Du, J. T., Hansen, P., Choo, K. K. R., & Huang, S. S. (2021). Group trip planning and information seeking behaviours by mobile social media users: a study of tourists in Australia, Bangladesh and China. Journal of Information Science, 47(3), 323-339.
DOI Scopus14
2021 Dai, W., Lv, Y., Choo, K. K. R., Liu, Z., Zou, D., & Jin, H. (2021). CRSA: a cryptocurrency recovery scheme based on hidden assistance relationships. IEEE Transactions on Information Forensics and Security, 16(9511470), 4291-4305.
DOI Scopus3 WoS2
2021 Sun, D., Zhang, X., Choo, K. K. R., Hu, L., & Wang, F. (2021). NLP-based digital forensic investigation platform for online communications. Computers & Security, 104(102210), 1-12.
DOI Scopus35
2021 Tang, X., Guo, C., Choo, K. K. R., Liu, Y., & Li, L. (2021). A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Computer Networks, 200(108540), 1-14.
DOI Scopus37 WoS28
2021 Peng, C., Luo, M., Li, L., Choo, K. K. R., & He, D. (2021). Efficient certificateless online/offline signature scheme for wireless body area networks. IEEE Internet of Things Journal, 8(18), 14287-14298.
DOI Scopus33 WoS25
2020 Chin, P. Y., Evans, N., Liu, C. Z., & Choo, K. K. R. (2020). Understanding factors influencing employees' consumptive and contributive use of enterprise social networks. Information systems frontiers, 22(6), 1357-1376.
DOI WoS35
2020 Saxena, N., Conti, M., Choo, K. K. R., & Chaudhari, N. S. (2020). BAS-VAS: a novel secure protocol for value added service delivery to mobile devices. IEEE Transactions on Information Forensics and Security, 15, 1470-1485.
DOI
2020 Kumar, N., Vasilakos, A. V., Choo, K. K. R., & Yang, L. T. (2020). Energy Management for Cyber-Physical Cloud Systems. Future Generation Computer Systems, 105, 754-756.
DOI Scopus1
2020 Feng, J., Yang, L. T., Zhu, Q., & Choo, K. K. R. (2020). Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Transactions on Dependable and Secure Computing, 17(4), 857-868.
DOI Scopus114
2020 Dai, W., Daia, C., Choo, K. R., Cui, C., Zou, D., & Jin, H. (2020). SDTE: a secure blockchain-based data trading ecosystem. IEEE Transactions on Information Forensics and Security, 15, 725-737.
DOI Scopus228 WoS146
2020 Alkadi, O. S., Moustafa, N., Turnbull, B., & Choo, K. K. R. (2020). An ontological graph identification method for improving localisation of IP prefix hijacking in network systems. IEEE transactions on information forensics and security, 15, 1164-1174.
DOI
2020 Le Khac, N. A., Jacobs, D., Nijhoff, J., Bertens, K., & Choo, K. K. R. (2020). Smart vehicle forensics: challenges and case study. Future generation computer systems, 109, 500-510.
DOI
2020 Yang, J., Jiang, B., Lv, Z., & Choo, K. K. R. (2020). A task scheduling algorithm considering game theory designed for energy management in cloud computing. Future generation computer systems, 105, 985-992.
DOI
2019 Kanwal, T., Shaukat, S. A. A., Anjum, A., Malik, S. U. R., Choo, K. K. R., Khan, A., . . . Khan, S. U. (2019). Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes. Information sciences, 488, 238-256.
DOI Scopus25
2019 Volety, T., Saini, S., McGhin, T., Liu, C. Z., & Choo, K. K. R. (2019). Cracking Bitcoin wallets: I want what you have in the wallets. Future generation computer systems, 91, 136-143.
DOI
2019 Do, Q., Martini, B., & Choo, K. K. R. (2019). The role of the adversary model in applied security research. Computers and Security, 81. pp. 156-181, 156-181.
DOI
2019 Zhang, F., Lee, V. E., Jin, R., Garg, S., Choo, K. K. R., Maasberg, M., . . . Cheng, C. (2019). Privacy-aware smart city: a case study in collaborative filtering recommender systems. Journal of parallel and distributed computing, 127, 145-159.
DOI
2019 Moustafa, N., Choo, K. K. R., Radwan, I., & Camtepe, S. (2019). Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog. IEEE transactions on information forensics and security, 14(8, article no. 8600389), 1975-1987.
DOI
2019 Chaudhary, R., Jindal, A., Aujla, G. S., Aggarwal, S., Kumar, N., & Choo, K. K. R. (2019). BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. Computers and security, 85, 288-299.
DOI
2019 Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2019). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE transactions on emerging topics in computing, 7(2, article no. 7762123), 314-322.
DOI
2019 Aggarwal, S., Chaudhary, R., Aujla, G. S., Kumar, N., Choo, K. K. R., & Zomaya, A. Y. (2019). Blockchain for smart communities: applications, challenges and opportunities. Journal of network and computer applications, 144, 13-48.
DOI
2019 Bewong, M., Liu, J., Liu, L., Li, J., & Choo, K. K. R. (2019). A relative privacy model for effective privacy preservation in transactional data. Concurrency and computation: practice and experience, 31(23, article no. e4923), 1-13.
DOI Scopus8
2019 Esposito, C., Castiglione, A., Frattini, F., Cinque, M., Yang, Y., & Choo, K. K. R. (2019). On data sovereignty in cloud-based computation offloading for smart cities applications. IEEE internet of things journal, 6(3), 4521-4535.
DOI Scopus31
2018 Jia, X., He, D., Li, L., & Choo, K. K. R. (2018). Signature-based three-factor authenticated key exchange for internet of things applications. Multimedia tools and applications, 77(14), 18355-18382.
DOI Scopus36 WoS28
2018 Ding, H., Zhang, Y., Ren, Y., Shi, B., & Choo, R. (2018). Heterogeneous investment in spatial public goods game with mixed strategy. Soft computing, 22(4), 1287-1294.
DOI Scopus24 WoS22
2018 Amin, R., Islam, S. K. H., Kumar, N., & Choo, K. K. R. (2018). An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. Journal of network and computer applications, 104, 133-144.
DOI Scopus74 WoS61
2018 Yang, W., Wang, G., Choo, K. K. R., & Chen, S. (2018). HEPart: A balanced hypergraph partitioning algorithm for big data applications. Future generation computer systems, 83, 250-268.
DOI Scopus25
2018 D'orazio, C. J., & Choo, K. K. R. (2018). Circumventing iOS security mechanisms for APT forensic investigations: a security taxonomy for cloud apps. Future generation computer systems, 79(1), 247-261.
DOI
2018 Heravi, A., Mubarak, S., & Choo, K. K. R. (2018). Information privacy in online social networks: uses and gratification perspective. Computers in human behavior, 84, 441-459.
DOI
2018 Choo, K. K. R., Shi, Y., & Chen, Z. (2018). Measurements and security of complex networks and systems: research advances and challenges. Future generation computer systems, 83, 374-375.
DOI Scopus2
2018 HaddadPajouh, H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future generation computer systems, 85, 1-9.
DOI
2018 Cahyani, N. D. W., Martini, B., Choo, K. K. R., Ab Rahman, N. H., & Ashman, H. (2018). An evidence-based forensic taxonomy of windows phone communication apps. Journal of forensic sciences, 63(3), 868-881.
DOI
2018 Pajouh, H. H., Dehghantanha, A., Khayami, R., & Choo, K. K. R. (2018). Intelligent OS X malware threat detection with code inspection. Journal of computer virology and hacking techniques, 14(3), 213-223.
DOI
2018 Khan, M. K., Zakariah, M., Malik, H., & Choo, K. K. R. (2018). A novel audio forensic data-set for digital multimedia forensics. Australian journal of forensic sciences, 50(2), 525-542.
DOI Scopus25 WoS20
2018 Wang, H., He, D., Sun, Y., Kumar, N., & Choo, K. K. R. (2018). PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. Future generation computer systems, 79(1), 262-270.
DOI Scopus11
2018 Wu, L., Chen, B., Choo, K. K. R., & He, D. (2018). Efficient and secure searchable encryption protocol for cloud-based Internet of Things. Journal of parallel and distributed computing, 111, 152-161.
DOI
2018 Choo, K. K. R., Lu, R., Chen, L., & Yi, X. (2018). A foggy research future: advances and future opportunities in fog computing research. Future generation computer systems, 78(2), 677-679.
DOI Scopus39
2018 Anjum, A., Malik, S. U. R., Choo, K. K. R., Khan, A., Haroon, A., Khan, S., . . . Raza, B. (2018). An efficient privacy mechanism for electronic health records. Computers and security, 72, 196-211.
DOI Scopus62 WoS44
2018 Ma, M., He, D., Kumar, N., Choo, K. K. R., & Chen, J. (2018). Certificateless searchable public key encryption scheme for industrial Internet of Things. IEEE transactions on industrial informatics, 14(2), 759-767.
DOI
2018 Cahyani, N. D. W., Choo, K. K. R., Ab Rahman, N. H., & Ashman, H. (2018). An evidence-based forensic taxonomy of windows phone dating apps. Journal of forensic sciences, 64(1), 243-253.
DOI
2018 Zhou, L., Su, C., Sun, X., Zhao, X., & Choo, K. K. R. (2018). Stag hunt and trust emergence in social networks. Future generation computer systems, 88, 168-172.
DOI Scopus11
2018 He, D., Kumar, N., Wang, H., Wang, L., Choo, K. K. R., & Vinel, A. (2018). A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE transactions on dependable and secure computing, 15(4), 633-645.
DOI Scopus129
2018 Zhang, F., Lee, V. E., & Choo, K. K. R. (2018). Jo-DPMF: differentially private matrix factorization learning through joint optimization. Information sciences, 467, 271-281.
DOI
2018 Quick, D., & Choo, K. K. R. (2018). IoT Device Forensics and Data Reduction. IEEE Access, 6, 47566-47574.
DOI
2018 Fang, H., Xu, L., Zou, Y., Wang, X., & Choo, K. K. R. (2018). Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE transactions on vehicular technology, 67(11), 10788-10799.
DOI
2018 Do, Q., Martini, B., & Choo, K. K. R. (2018). Cyber-physical systems information gathering: A smart home case study. Computer networks, 138, 1-12.
DOI
2018 Xu, Z., Luo, X., Liu, Y., Choo, K. K. R., Sugumaran, V., Yen, N., . . . Hu, C. (2018). From latency, through outbreak, to decline: detecting different states of emergency events using web resources. IEEE transactions on big data, 4(2), 245-257.
DOI WoS12
2018 Quick, D., & Choo, K. K. R. (2018). Digital forensic intelligence: data subsets and open source intelligence (DFINT+OSINT): a timely and cohesive mix. Future generation computer systems, 78(2), 558-567.
DOI
2018 Jabbarpour, M. R., Zarrabi, H., Khokhar, R. H., Shamshirband, S., & Choo, K. K. R. (2018). Applications of computational intelligence in vehicle traffic congestion problem: a survey. Soft computing, 22(7), 2299-2320.
DOI
2018 Radhakrishna, V., Aljawarneh, S. A., Kumar, P. V., & Choo, K. K. R. (2018). A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft computing, 22(6), 1903-1919.
DOI Scopus114
2018 Chanajitt, R., Viriyasitavat, W., & Choo, K. K. R. (2018). Forensic analysis and security assessment of Android m-banking apps. Australian journal of forensic sciences, 50(1), 3-19.
DOI
2018 Ahmad, I., Abbas, H., Raza, A., Choo, K. K. R., Sajid, A., Pasha, M., & Khan, F. A. (2018). Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis. Australian journal of forensic sciences, 50(2), 183-208.
DOI
2018 Liu, X., Choo, K. K. R., Deng, R. H., Lu, R., & Weng, J. (2018). Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE transactions on dependable and secure computing, 15(1), 27-39.
DOI Scopus169
2018 Jiang, R., Lu, R., & Choo, K. K. R. (2018). Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future generation computer systems, 78(1), 392-401.
DOI
2017 D'orazio, C. J., Choo, K. K. R., & Yang, L. T. (2017). Data exfiltration from Internet of Things devices: iOS devices as case studies. IEEE internet of things journal, 4(2), 524-535.
DOI Scopus112
2017 Cahyani, N. D. W., Martini, B., Choo, K. K. R., & Al Azhar, A. K. B. P. M. N. (2017). Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study. Concurrency and computation: practice and experience, 29(14, article no. e3855), 1-16.
DOI
2017 Ab, R. N. H., Cahyani, N. D. W., & Choo, K. K. R. (2017). Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency and computation, 29(14, article no. e3868), 1-16.
DOI
2017 Do, Q., Martini, B., & Choo, K. K. R. (2017). Is the data on your wearable device secure? An Android Wear smartwatch case study. Software: practice and experience, 47(3), 391-403.
DOI
2017 Zheng, X., Xuan, J., Liu, Y., Choo, K. K. R., Mei, L., & Hu, C. (2017). Building spatial temporal relation graph of concepts pair using web repository. Information systems frontiers, 19(5), 1029-1038.
DOI Scopus12 WoS6
2017 Odelu, V., Kumar, D. A., Sreenivasa, R. Y., Kumari, S., Khan, M. K., & Choo, K. K. R. (2017). Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Computer standards & interfaces, 54(1), 3-9.
DOI Scopus85 WoS60
2017 Azfar, A., Choo, K. K. R., & Liu, L. (2017). Forensic taxonomy of android productivity apps. Multimedia tools and applications, 76(3), 3313-3341.
DOI WoS19
2017 D'orazio, C. J., Lu, R., Choo, K. K. R., & Vasilakos, A. V. (2017). A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Applied mathematics and computation, 293, 523-544.
DOI
2017 Zhang, Z., & Choo, K. K. R. (2017). Guest editorial: multimedia social network security and applications. Multimedia tools and applications, 76(3), 3163-3168.
DOI Scopus1
2017 Peng, J., Detchon, S., Choo, K. K. R., & Ashman, H. (2017). Astroturfing detection in social media: a binary n-gram-based approach. Concurrency computation, 29(17, article no. e4013), 1-14.
DOI
2017 Kumari, S., Das, A. K., Wazid, M., Li, X., Wu, F., Choo, K. K. R., & Khan, M. K. (2017). On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurrency and computation, 29(23, article no. e3930), 1-24.
DOI Scopus36 WoS27
2017 Teing, Y. Y., Dehghantanha, A., Choo, K. K. R., & Yang, L. T. (2017). Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Computers and electrical engineering, 58, 350-363.
DOI Scopus46
2017 Chen, Y., Wang, L., Li, F., Du, B., Choo, K. K. R., Hassan, H., & Qin, W. (2017). Air quality data clustering using EPLS method. Information fusion, 36, 225-232.
DOI Scopus37
2017 Ding, Y., Xu, Z., Ye, J., & Choo, K. K. R. (2017). Secure outsourcing of modular exponentiations under single untrusted programme model. Journal of computer and system sciences, 90, 1-13.
DOI Scopus42 WoS28
2017 Liu, J., Yu, X., Xu, Z., Choo, K. K. R., Hong, L., & Cui, X. (2017). A cloud-based taxi trace mining framework for smart city. Software: practice and experience, 47(8), 1081-1094.
DOI Scopus35 WoS23
2017 D'Orazio, C. J., & Choo, K. K. R. (2017). A technique to circumvent SSL/TLS validations on iOS devices. Future generation computer systems, 74, 366-374.
DOI
2017 Tahaei, H., Salleh, R., Khan, S., Izard, R., Choo, K. K. R., & Anuar, N. B. (2017). A multi-objective software defined network traffic measurement. Measurement, 95, 317-327.
DOI WoS36
2017 Kumari, S., Li, X., Wu, F., Das, A. K., Choo, K. K. R., & Shen, J. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future generation computer systems, 68, 320-330.
DOI Scopus143 WoS119
2017 Choo, K. K. R., Abawajy, J., & Islam, R. (2017). Special issue on cyber security in the critical infrastructure: advances and future directions. Journal of computer and system sciences, Special issue, 1-2.
DOI
2017 Chen, Y., Li, F., Chen, J., Du, B., Choo, K. K. R., & Hassan, H. (2017). EPLS: a novel feature extraction method for migration data clustering. Journal of parallel and distributed computing, 103, 96-103.
DOI Scopus9 WoS7
2017 Li, B., Lu, R., Wang, W., & Choo, K. K. R. (2017). Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. Journal of parallel and distributed computing, 103, 32-41.
DOI Scopus129 WoS98
2017 Xu, Z., Wu, L., Khan, M. K., Choo, K. K. R., & He, D. (2017). A secure and efficient public auditing scheme using RSA algorithm for cloud storage. Journal of supercomputing, 73(12), 5285-5309.
DOI Scopus27 WoS15
2017 Eterovic Soric, B., Choo, K. K. R., Mubarak, S., & Ashman, H. L. (2017). Windows 7 antiforensics: a review and a novel approach. Journal of forensic sciences, 62(4), 1054-1070.
DOI
2017 Eterovic Soric, B., Choo, K. K. R., Ashman, H., & Mubarak, S. (2017). Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review. Computers and security, 70, 278-289.
DOI
2017 He, D., Kumar, N., Wang, H., Wang, L., & Choo, K. K. R. (2017). Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Applied mathematics and computation, 314, 31-43.
DOI Scopus65
2017 Bolimos, I. A., & Choo, K. K. R. (2017). Online fraud offending within an Australian jurisdiction. Journal of financial crime, 24(2), 277-308.
DOI
2017 Choo, K. K. R., Rana, O. F., & Rajarajan, M. (2017). Cloud security engineering: theory, practice and future research. IEEE Transactions on Cloud Computing, 5(3), 372-374.
DOI
2017 Quick, D., & Choo, K. K. R. (2017). Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data. Software: practice and experience, 47(8), 1095-1109.
DOI
2017 He, D., Kumar, N., Choo, K. K. R., & Wu, W. (2017). Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Transactions on Information Forensics and Security, 12(2, article no. 7723917), 454-464.
DOI WoS62
2017 Tassone, C. F. R., Martini, B., & Choo, K. K. R. (2017). Visualizing digital forensic datasets: a proof of concept. Journal of forensic sciences, 62(5), 1197-1204.
DOI
2017 Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K. K. R., & Dlodlo, M. (2017). From cloud to fog computing: a review and a conceptual live VM migration framework. IEEE Access, 5(7896564), 8284-8300.
DOI Scopus284 WoS209
2017 Sung, N. W., Pham, N. T., Huynh, T., Hwang, W. J., You, I., & Choo, K. K. R. (2017). Prediction-based association control scheme in dense femtocell networks. PLoS one, 12(3), 1-23.
DOI
2017 Quick, D., & Choo, K. K. R. (2017). Pervasive social networking forensics: intelligence and evidence from mobile device extracts. Journal of network and computer applications, 86, 24-33.
DOI
2017 Liu, P., Choo, K. K. R., Wang, L., & Huang, F. (2017). SVM or deep learning? A comparative study on remote sensing image classification. Soft computing, 21(23), 7053-7065.
DOI Scopus227 WoS101
2017 Wang, L., Zhang, J., Liu, P., Choo, K. K. R., & Huang, F. (2017). Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification. Soft computing, 21(1), 213-221.
DOI Scopus155 WoS124
2017 Yang, W., Wang, G., Bhuiyan, M. Z. A., & Choo, K. K. R. (2017). Hypergraph partitioning for social networks based on information entropy modularity. Journal of network and computer applications, 86, 59-71.
DOI Scopus51
2017 Aburumman, A., Seo, W. J., Esposito, C., Castiglione, A., Islam, R., & Choo, K. K. R. (2017). A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy. Concurrency and computation, 29(23, article no. e3978), 1-16.
DOI WoS7
2017 Pokharel, S., Choo, K. K. R., & Liu, J. (2017). Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication. Concurrency and computation, 29(7), 1-13.
DOI Scopus4 WoS3
2017 Pokharel, S., Choo, K. K. R., & Liu, J. (2017). Mobile cloud security: an adversary model for lightweight browser security. Computer standards and interfaces, 49, 71-78.
DOI Scopus14 WoS11
2017 Meng, W., Li, W., Xiang, Y., & Choo, K. K. R. (2017). A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. Journal of network and computer applications, 78, 162-169.
DOI Scopus69
2017 Huang, C., Lu, R., & Choo, K. K. R. (2017). Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE communications magazine, 55(11), 105-111.
DOI Scopus313 WoS242
2017 Huang, C., Lu, R., & Choo, K. K. R. (2017). Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. Journal of computer and system sciences, 89, 51-63.
DOI Scopus16 WoS12
2017 Teing, Y. Y., Dehghantanha, A., Choo, K. K. R., Dargahi, T., & Conti, M. (2017). Forensic investigation of cooperative storage cloud service: symform as a case study. Journal of forensic sciences, 62(3), 641-654.
DOI Scopus19 Europe PMC2
2017 Luo, M., Zhou, X., Li, L., Choo, K. K. R., & He, D. (2017). Security analysis of two password-authenticated multi-key exchange protocols. IEEE access, 5, 8017-8024.
DOI Scopus3 WoS3
2017 Mansoori, M., Welch, I., Choo, K. K. R., Maxion, R. A., & Hashemi, S. E. (2017). Real-world IP and network tracking measurement study of malicious websites with HAZOP. International journal of computers and applications, 39(2), 106-121.
DOI Scopus3
2017 Cahyani, N. D. W., Martini, B., & Choo, K. K. R. (2017). Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study. Australian journal of forensic sciences, 49(1), 106-122.
DOI
2017 Daryabar, F., Dehghantanha, A., & Choo, K. K. (2017). Cloud storage forensics: MEGA as a case study. Australian journal of forensic sciences, 49(3), 344-357.
DOI
2017 Hu, Y. C., Choo, K. K. R., & Chen, W. L. (2017). Tamper detection and image recovery for BTC-compressed images. Multimedia tools and applications, 76(14), 15435-15463.
DOI Scopus17
2017 Cahyani, N. D. W., Rahman, N. H. A., Glisson, W. B., & Choo, K. K. R. (2017). The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mobile networks and applications, 22(2), 240-254.
DOI
2017 Azfar, A., Choo, K. K. R., & Liu, L. (2017). Forensic taxonomy of Android social apps. Journal of forensic sciences, 62(2), 435-456.
DOI Scopus22 WoS18 Europe PMC2
2016 Esposito, C., Castiglione, A., Martini, B., & Choo, K. K. R. (2016). Cloud manufacturing: security, privacy, and forensic concerns. IEEE cloud computing, 3(4), 16-22.
DOI
2016 Butler, A., & Choo, K. K. R. (2016). IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective. Security Journal, 29(2), 306-325.
DOI
2016 Osanaiye, O., Cai, H., Choo, K. K. R., Dehghantanha, A., Xu, Z., & Dlodlo, M. (2016). Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. Eurasip Journal on Wireless Communications and Networking, 2016(130), 1-10.
DOI Scopus314 WoS190
2016 Ge, M., Choo, K. K. R., Huai, W., & Yong, Y. (2016). Survey on key revocation mechanisms in wireless sensor networks. Journal of Network and Computer Applications, 63, 24-38.
DOI WoS26
2016 Xu, Z., Zhang, H., Sugumaran, V., Choo, K. K. R., Mei, L., & Zhu, Y. (2016). Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media. Eurasip Journal on Wireless Communications and Networking, 2016(44), 1-9.
DOI Scopus93 WoS87
2016 D'Orazio, C., & Choo, K. K. R. (2016). An adversary model to evaluate DRM protection of video contents on iOS devices. Computers and security, 56, 94-110.
DOI
2016 Zhao, L., Chen, L., Ranjan, R., Choo, K. K. R., & He, J. (2016). Geographical information system parallelization for spatial big data processing: a review. Cluster computing, 19(1), 139-152.
DOI Scopus66
2016 Yang, Y., Lu, J., Choo, K. K. R., & Liu, J. (2016). On lightweight security enforcement in cyber-physical systems. Lecture notes in computer science, 9542, 97-112.
DOI Scopus17
2016 Gao, Y., Zeng, P., Choo, K. K. R., & Song, F. (2016). An improved online/offline identity-based signature scheme for WSNs. International journal of network security, 18(6), 1143-1151.
Scopus18
2016 Ab, R. N. H., Glisson, W. B., Yang, Y., & Choo, K. K. R. (2016). Forensic-by-design framework for cyber-physical cloud systems. IEEE cloud computing, 3(1), 50-59.
DOI Scopus153
2016 Li, L., Lu, R., Choo, K. K. R., Datta, A., & Shao, J. (2016). Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Transactions on information forensics and security, 11(8), 1847-1861.
DOI Scopus186
2016 Rahman, S., Prima, A. A., Razzaque, M. A., Hassan, M. M., Alelaiwi, A., Alrubaian, M., & Choo, K. K. R. (2016). Internet data budget allocation policies for diverse smartphone applications. Eurasip journal on wireless communications and networking, 2016(1, article no. 226), 1-12.
DOI Scopus1 WoS2
2016 Daryabar, F., Dehghantanha, A., Eterovic Soric, B., & Choo, K. K. R. (2016). Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices. Australian journal of forensic sciences, 48(6), 615-642.
DOI Scopus56
2016 Shariati, M., Dehghantanha, A., & Choo, K. K. R. (2016). SugarSync forensic analysis. Australian Journal of Forensic Sciences, 48(1), 95-117.
DOI Scopus45
2016 Norouzizadeh, D. F., Dehghantanha, A., Eterovic Soric, B., & Choo, K. K. R. (2016). Investigating social networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Australian journal of forensic sciences, 48(4), 469-488.
DOI Scopus75
2016 Prokhorenko, V., Choo, K., & Ashman, H. (2016). Context-oriented web application protection model. Applied Mathematics and Computation, 285, 59-78.
DOI Scopus26 WoS22
2016 Prokhorenko, V., Choo, K., & Ashman, H. (2016). Web application protection techniques: A taxonomy. Journal of Network and Computer Applications, 60, 95-112.
DOI Scopus82 WoS59
2016 Prokhorenko, V., Choo, K., & Ashman, H. (2016). Intent-based extensible real-time PHP supervision framework. IEEE Transactions on Information Forensics and Security, 11(10), 2215-2226.
DOI Scopus18 WoS14
2016 Ding, H., Cao, L., Ren, Y., Choo, K. K. R., & Shi, B. (2016). Reputation-based investment helps to optimize group behaviors in spatial lattice networks. PLoS ONE, 11(9, article number e0162781), 1-17.
DOI Scopus22 Europe PMC2
2016 Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., & Choo, K. K. R. (2016). Fine-grained database field search using attribute-based encryption for e-healthcare clouds. Journal of medical systems, 40(11, article no. 235), 1-8.
DOI Scopus98 WoS74 Europe PMC7
2016 Lin, C., Zhu, F., Wu, W., Liang, K., & Choo, K. K. R. (2016). A new transitive signature scheme. Lecture notes in computer science, 9955, 156-167.
DOI Scopus7 WoS7
2016 Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., & Choo, K. K. R. (2016). Cloud based data sharing with fine-grained proxy re-encryption. Pervasive and Mobile Computing, 28, 122-134.
DOI Scopus93
2016 Yuan, L., Li, M., Guo, C., Choo, K. K. R., & Ren, Y. (2016). Novel threshold changeable secret sharing schemes based on polynomial interpolation. PLoS One, 11(10), 1-19.
DOI Scopus20 Europe PMC1
2016 Azfar, A., Choo, R., & Liu, L. (2016). Android mobile VoIP apps: a survey and examination of their security and privacy. Electronic commerce research, 16(1), 73-111.
DOI
2016 Hu, Y., Yan, J., & Choo, K. K. R. (2016). PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment. Cluster computing, 19(1), 153-166.
DOI Scopus7 WoS6
2016 Martini, B., Do, Q., & Choo, K. K. R. (2016). Digital forensics in the cloud era: the decline of passwords and the need for legal reform. Trends and issues in crime and criminal justice, (512), 1-16.
2016 Leom, M. D., Choo, K. K. R., & Hunt, R. (2016). Remote wiping and secure deletion on mobile devices: a review. Journal of forensic sciences, 61(6), 1473-1492.
DOI
2016 Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster computing, 19(2), 723-740.
DOI
2016 Bagiwa, M. A., Wahab, A. W. A., Idris, M. Y. I., Khan, S., & Choo, K. K. R. (2016). Chroma key background detection for digital video using statistical correlation of blurring artifact. Digital investigation, 19, 29-43.
DOI Scopus24 WoS18
2016 Afifi, F., Anuar, N. B., Shamshirband, S., & Choo, K. K. R. (2016). DyHAP: dynamic hybrid ANFIS-PSO approach for predicting mobile malware. PLoS ONE, 11(9, article no. e0162627), 1-21.
DOI
2016 Xu, Z., Wei, X., Liu, Y., Mei, L., Hu, C., Choo, K. K. R., . . . Sugumaran, V. (2016). Building the search pattern of web users using conceptual semantic space model. International journal of web and grid services, 12(3), 328-347.
DOI Scopus18 WoS16
2016 Karim, A., Salleh, R., Khan, M. K., Siddiqa, A., & Choo, K. K. R. (2016). On the analysis and detection of mobile botnet applications. Journal of universal computer science, 22(4), 567-588.
DOI Scopus19 WoS15
2016 Teing, Y. Y., Dehghantanha, A., Choo, K. K. R., Muda, Z., Abdullah, M. T., & Chai, W. C. (2016). A closer look at syncany windows and Ubuntu clients' residual artefacts. Lecture notes in computer science, 10067, 342-357.
DOI
2016 Iqbal, S., Mat, K. M. L., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of network and computer applications, 74, 98-120.
DOI Scopus201 WoS146
2016 Al Mayouf, Y. R., Ismail, M., Abdullah, N. F., Wahab, A. W. A., Mahdi, O. A., Khan, S., & Choo, K. K. R. (2016). Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network. PLoS ONE, 11(11, article no. 0165966), 1-24.
DOI WoS27 Europe PMC3
2016 Azfar, A., Choo, K. K. R., & Liu, L. L. (2016). An android communication app forensic taxonomy. Journal of forensic sciences, 61(5), 1337-1350.
DOI WoS32 Europe PMC6
2016 Warif, N. B. A., Wahab, A. W. A., Idris, M. Y. I., Ramli, R., Salleh, R., Shamshirband, S., & Choo, K. K. R. (2016). Copy-move forgery detection: survey, challenges and future directions. Journal of network and computer applications, 75, 259-278.
DOI Scopus193
2016 Liu, X., Deng, R. H., Choo, K. K. R., & Weng, J. (2016). An efficient privacy-preserving outsourced calculation toolkits with multiple keys. IEEE transactions on information forensics and security, 11(11), 2401-2414.
DOI Scopus239
2016 Xu, Z., Zhang, H., Hu, C., Mei, L., Xuan, J., Choo, K. K. R., . . . Zhu, Y. (2016). Building knowledge base of urban emergency events based on crowdsourcing of social media. Concurrency computation, 28(15), 4038-4052.
DOI Scopus91 WoS63
2016 Peng, J., Choo, K. K. R., & Ashman, H. (2016). User profiling in intrusion detection: A review. Journal of network and computer applications, 72, 14-27.
DOI
2016 Yang, T. Y., Dehghantanha, A., Choo, K. K. R., & Muda, Z. (2016). Windows instant messaging app forensics: Facebook and Skype as case studies. PLoS one, 11(3, article no. e0150300), 1-29.
DOI
2016 Ren, W., Huang, S., Ren, Y., & Choo, K. K. R. (2016). LiPISC: a lightweight and flexible method for privacy-aware intersection set computation. PLoS one, 11(6, article no. e0157752), 1.
DOI Scopus8 WoS5
2016 Osanaiye, O., Choo, K. K. R., & Dlodlo, M. (2016). Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of network and computer applications, 67, 147-165.
DOI
2016 Do, Q., Martini, B., & Choo, K. K. R. (2016). A data exfiltration and remote exploitation attack on consumer 3D printers. IEEE Transactions on Information Forensics and Security, 11(10), 2174-2186.
DOI
2016 Li, B., Lu, R., Wang, W., & Choo, K. K. R. (2016). DDOA: a dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE transactions on information forensics and security, 11(11), 2415-2425.
DOI Scopus84 WoS70
2016 Qureshi, M. A., Noor, R. M., Shamim, A., Shamshirband, S., & Choo, K. K. R. (2016). A lightweight radio propagation model for vehicular communication in road tunnels. Plos one, 11(3, article no. e0152727), 1-15.
DOI
2016 Peng, J., Choo, K. K. R., & Ashman, H. (2016). Bit-level n-gram based forensic authorship analysis on social media: identifying individuals from linguistic profiles. Journal of network and computer applications, 70, 171-182.
DOI
2016 Nam, J., Choo, K. K. R., & Paik, J. (2016). A provably-anonymous authentication scheme for roaming services. International journal of security and its applications, 10(3), 193-204.
DOI
2016 Ficco, M., Esposito, C., Chang, H., & Choo, K. K. R. (2016). Live migration in emerging cloud paradigms. IEEE cloud computing, 3(2), 12-19.
DOI
2016 Esposito, C., Castiglione, A., & Choo, K. K. R. (2016). Encryption-based solution for data sovereignty in federated clouds. IEEE Cloud Computing, 3(1), 12-17.
DOI
2015 Choo, K. K. R., & Sarre, R. (2015). Balancing privacy with legitimate surveillance and lawful data access. IEEE cloud computing, 2(4), 8-13.
DOI
2015 Nepal, S., Ranjan, R., & Choo, R. (2015). Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud computing, 2(2), 78-84.
DOI
2015 Do, Q., Martini, B., & Choo, K. K. R. (2015). Exfiltrating data from Android devices. Computers and security, 48, 74-91.
DOI
2015 Nam, J., Choo, K. K. R., Han, S., Kim, M., Paik, J., & Won, D. (2015). Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS one, 10(4, article no. e0116709), 1-21.
DOI
2015 Wang, S., Zeng, P., Choo, K. K. R., & Wang, H. (2015). A CCA2-secure multi-decrypter encryption scheme without random oracles. Informatica, 26(3), 543-556.
DOI
2015 Do, Q., Martini, B., & Choo, K. K. R. (2015). A cloud-focused mobile forensics methodology. IEEE Cloud Computing, 2(4), 60-65.
DOI
2015 Damshenas, M., Dehghantanha, A., Choo, K. K. R., & Mahmud, R. (2015). M0Droid: an Android behavioral-based malware detection model. Journal of information privacy and security, 11(3), 141-157.
DOI
2015 Do, Q., Martini, B., & Choo, K. K. R. (2015). A forensically sound adversary model for mobile devices. PLOS one, 10(9, article no. e0138449), 1-15.
DOI
2015 Juliadotter, N. V. J., & Choo, K. K. R. (2015). Cloud attack and risk assessment taxonomy. IEEE Cloud Computing, 2(1), 14-20.
DOI
2015 Amosun, P. A., Ige, O. A., & Choo, K. K. R. (2015). Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies. Eduction and Information Technologies, 20(3), 505-518.
DOI
2015 Chin, C. P. Y., Evans, N., & Choo, K. K. R. (2015). Exploring factors influencing the use of enterprise social networks in multinational professional service firms. Journal of organizational computing and electronic commerce, 25(3), 289-315.
DOI
2015 Borgman, B., Mubarak, S., & Choo, K. K. R. (2015). Cyber security readiness in the South Australian Government. Computer standards & interfaces, 37, 1-8.
DOI
2015 Ab, R. N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers and security, 49, 45-69.
DOI
2015 Nam, J., Choo, K. K. R., Sangchul, H., Paik, J., & Won, D. (2015). Two-round password-only authenticated key exchange in the three-party setting. Symmetry, 7(1), 105-124.
DOI
2015 Nam, J., Choo, K. K. R., Paik, J., & Won, D. (2015). An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting. IEICE transactions on fundamentals of electronics, communications and computer sciences, E98A(1), 424-427.
DOI
2014 Nam, J., Choo, K. K., Park, M., Paik, J., & Wong, D. (2014). On the security of a simple three-party key exchange protocol without server's public keys. The scientific world journal, 2014, 1-7.
DOI
2014 Quick, D., & Choo, K. K. R. (2014). Google drive: forensic analysis of data remnants. Journal of network and computer applications, 40(1), 179-193.
DOI
2014 Choo, K. K. R., Nam, J., & Wong, D. (2014). A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Information sciences, 281, 182-200.
DOI
2014 Imgraben, J., Engelbrecht, A., & Choo, K. K. R. (2014). Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour and information technology, 33(12), 1347-1360.
DOI
2014 Nam, J., Choo, K. K. R., Paik, J., & Wong, D. (2014). Password-only authenticated three-party key exchange proven secure against insider dictionary attacks. The scientific world journal, 2014, 1-15.
DOI
2014 Quick, D., & Choo, K. K. R. (2014). Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digital investigation, 11(4), 273-294.
DOI
2014 Martini, B., & Choo, K. K. (2014). Distributed filesystem forensics: XtreemFS as a case study. Digital investigation vol. 11, no. 4, pp. 295-313, 11(4), 295-313.
DOI
2014 Choo, K. K. R. (2014). Mobile cloud storage users. IEEE Cloud Computing, 1(3), 20-23.
DOI
2014 Wang, H., Zeng, P., & Choo, K. K. R. (2014). MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Security and communication networks, 7(11), 1641-1651.
DOI Scopus8
2014 Choo, K. K. R. (2014). A cloud security risk-management strategy. IEEE Cloud Computing, 1(2), 52-56.
DOI
2014 Irwin, A. S. M., Slay, J., Choo, K. K. R., & Lui, L. (2014). Money laundering and terrorism financing in virtual environments: a feasibility study. Journal of money laundering control, 17(1), 50-75.
DOI
2014 Mani, D., Choo, K. K. R., & Mubarak, S. (2014). Information security in the South Australian real estate industry: a study of 40 real estate organisations. Information management and computer security, 22(1), 24-41.
DOI
2014 Martini, B., & Choo, K. K. R. (2014). Cloud forensic technical challenges and solutions: a snapshot. IEEE Cloud Computing, 1(4), 20-25.
DOI
2014 Hillman, H., Hooper, C., & Choo, K. K. R. (2014). Online child exploitation: challenges and future research directions. Computer law and security review, 30(6), 687-698.
DOI
2014 Yang, A., Nam, J., Kim, M., & Choo, K. K. (2014). Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols. The scientific world journal, 2014(825984), 1-8.
DOI
2014 Choo, K. K. R. (2014). Designated non-financial businesses and professionals: a review and analysis of recent financial action task force on money laundering mutual evaluation reports. Security Journal, 27(1), 1-26.
DOI
2014 Choo, K. K. R. (2014). Legal issues in the cloud. IEEE cloud computing, 1(1), 94-96.
DOI
2014 Nam, J., Choo, K. K. R., Kim, J., Kang, H. K., Kim, J., Paik, J., & Wong, D. (2014). Password-only authenticated three-party key exchange with provable security in the standard model. The scientific world journal, 2014(825072), 1-11.
DOI Scopus15 WoS6 Europe PMC5
2014 Quick, D., & Choo, K. K. R. (2014). Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive. Trends and issues in crime and criminal justice, (480), 1-11.
2013 Hooper, C., Martini, B., & Choo, K. K. R. (2013). Cloud computing and its implications for cybercrime investigations in Australia. Computer law and security report, 29(2), 152-163.
DOI
2013 Tassone, C., Martini, B., Choo, K. K. R., & Slay, J. (2013). Mobile device forensics: a snapshot. Trends and issues in crime and criminal justice, (460), 1-7.
2013 Nam, J., Choo, K. K. R., Kim, M., Paik, J., & Wong, D. (2013). Dictionary attacks against password-based authenticated three-party key exchange protocols. Transactions on internet and information systems, 7(12), 3244-3260.
DOI WoS12
2013 Choo, K. K. R. (2013). New payment methods : a review of 2010-2012 FATF mutual evaluation reports. Computers and security, 36, 12-26.
DOI
2013 Martini, B., & Choo, K. K. R. (2013). Cloud storage forensics: ownCloud as a case study. Digital investigation, 10(4), 287-299.
DOI
2013 Quick, D. P., & Choo, K. K. (2013). Digital droplets: Microsoft SkyDrive forensic data remnants. Future generation computer systems, 29(6), 1378-1394.
DOI
2013 Irwin, A. S. M., Slay, J., Choo, K. K. R., & Liu, L. (2013). Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective. Journal of money laundering control, 16(1), 6-40.
DOI Scopus12 WoS5
2013 Quick, D., & Choo, K. K. (2013). Dropbox analysis: data remnants on user machines. Digital investigation: the international journal of digital forensics & incident response, 10(1), 3-18.
DOI
2013 Nam, J., Choo, K. K. R., Paik, J., & Wong, D. (2013). Cryptanalysis of server-aided password-based authenticated key exchange protocols. International journal of security and its applications, 7(2), 47-58.
2013 Quick, D., & Choo, K. K. R. (2013). Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?. Digital investigation: the international journal of digital forensics & incident response, 10(3), 266-277.
DOI
2012 Irwin, A. S. M., Choo, K. K. R., & Liu, L. (2012). Modelling of money laundering and terrorism financing typologies. Journal of money laundering control, 15(3), 316-335.
DOI Scopus24 WoS15
2012 Irwin, A. S. M., Choo, K. K., & Liu, L. (2012). An analysis of money laundering and terrorism financing typologies. Journal of money laundering control, 15(1), 85-111.
DOI WoS33
2012 Martini, B., & Choo, K. K. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital investigation: the international journal of digital forensics & incident response, 9(2), 71-80.
DOI
2011 Choo, K. K. R. (2011). The cyber threat landscape : challenges and future research directions. Computers and security, 30(8), 719-731.
DOI
2011 Choo, K. K. R. (2011). Cyber threat landscape faced by financial and insurance industry. Trends and issues in crime and criminal justice, (408), 1-6.
2011 Zeng, P., Cao, Z., & Choo, K. K. R. (2011). An ID-based digital watermarking protocol for copyright protection. Computers & electrical engineering, 37(4), 526-531.
DOI Scopus9
2010 Zeng, P., Choo, K. K. R., & Sun, D. Z. (2010). On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Transactions on consumer electronics, 56(2), 566-569.
DOI
2010 Choo, K. K. R. (2010). Challenges in dealing with politically exposed persons. Trends and Issues in Crime and Criminal Justice, (386), 1-6.
2010 Choo, K. K. R. (2010). Cloud computing: challenges and future directions. Trends & issues in crime and criminal justice, (400), 1-6.
2010 Choo, K. K. R. (2010). High tech criminal threats to the national information infrastructure. Information security technical report, 15(3), 104-111.
DOI
2009 Zeng, P., Cao, Z., Choo, K. K. R., & Wang, S. (2009). On the anonymity of some authentication schemes for wireless communications. IEEE communications letters, 13(3), 170-171.
DOI
2009 Wang, S., Cao, Z., Choo, K. K., & Wang, L. (2009). An improved identity-based key agreement protocol and its security proof. Information sciences, 179(3), 307-318.
DOI
2009 Choo, K. K. R. (2009). Money laundering and terrorism financing risks of prepaid cards instruments?. Asian journal of criminology, 4(1), 11-30.
DOI
2009 Wang, S., Cao, Z., Cheng, Z., & Choo, K. K. R. (2009). Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science China Information Sciences, 52(8), 1358-1370.
DOI
2009 Zeng, P., Cao, Z., Choo, K. K. R., & Wang, S. (2009). Security weakness in a dynamic program update protocol for wireless sensor networks. IEEE Communications Letters, 13(6), 426-428.
DOI
2009 Choo, K. K. R. (2009). Responding to online child sexual grooming: an industry perspective. Trends and issues in crime and criminal justice, (379), 1-6.
2008 Choo, K. K. R. (2008). Politically exposed persons (PEPs): risks and mitigation. Journal of Money Laundering Control, 11(4), 371-387.
DOI
2008 Choo, K. K. R., & Smith, R. (2008). Criminal exploitation of online systems by organised crime groups. Asian journal of criminology, 3(1), 37-59.
DOI
2008 Choo, K. K. (2008). Organised crime groups in cyberspace: a typology. Trends in Organized Crime, 11(3), 270-295.
DOI

Year Citation
2017 Carman, M., & Choo, K. K. R. (2017). Tinder me softly: how safe are you really on tinder?. In R. Deng (Ed.), Source details - Title: Security and Privacy in Communication Networks12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings (pp. 271-286). Netherlands: Springer.
DOI
2017 Walls, J., & Choo, K. K. R. (2017). A study of the effectiveness abs reliability of android free anti-mobile malware apps. In Source details - Title: Mobile security and privacy: advances, challenges and future research directions (pp. 167-203). US: Elsevier.
DOI
2017 Yang, T. Y., Dehghantanha, A., Choo, K. K., & Muda, Z. (2017). Investigating America Online instant messaging application: data remnants on Windows 8.1 client machine. In Source details - Title: Contemporary digital forensic investigations of cloud and mobile applications (pp. 21-39). US: Elsevier.
DOI
2017 Ariffin, A., Choo, K. K., & Yunos, Z. (2017). Forensic readiness: A case study on digital CCTV systems antiforensics. In Source details - Title: Contemporary digital forensic investigations of cloud and mobile applications (pp. 147-162). US: Elsevier.
DOI
2017 Tassone, C., Martini, B., & Choo, K. K. R. (2017). Forensic visualization: survey and future research directions. In Source details - Title: Contemporary digital forensic investigations of cloud and mobile applications (pp. 163-184). US: Elsevier.
DOI
2017 Christopher, L., Choo, K. K., & Dehghantanha, A. (2017). Honeypots for employee information security awareness and education training: a conceptual EASY training model. In K. K. R. Choo, & A. Dehghantanha (Eds.), Source details - Title: Contemporary digital forensic investigations of cloud and mobile applications (pp. 111-129). US: Elsevier.
DOI
2017 Chia, C., Choo, K., & Fehrenbacher, D. (2017). How cyber-savvy are older mobile device users?. In M. H. Au, & K. -K. R. Kessler (Eds.), Source details - Title: Mobile security and privacy: advances, challenges and future research directions (pp. 67-83). US: Elsevier.
DOI
2017 Au, M. H., & Choo, K. (2017). Mobile security and privacy. In M. H. Au, & K. -K. R. Kessler (Eds.), Source details - Title: Mobile security and privacy: advances, challenges and future research directions (pp. 1-4). US: Elsevier.
DOI
2017 Schiliro, F., & Choo, K. (2017). The role of mobile devices in enhancing the policing system to improve efficiency and effectiveness: a practitioner's perspective. In M. H. Au, & K. -K. R. Kessler (Eds.), Source details - Title: Mobile security and privacy: advances, challenges and future research directions (pp. 82-100). US: Elsevier.
DOI
2017 Ab Rahman, N. H., Kessler, G. C., & Choo, K. K. (2017). Implications of emerging technologies to incident handling and digital forensic strategies: a routine activity theory. In Source details - Title: Contemporary digital forensic investigations of cloud and mobile applications (pp. 131-146). US: Elsevier.
DOI
2017 Mohtasebi, S., Dehghantanha, A., & Choo, K. K. R. (2017). Cloud storage forensics: analysis of data remnants on SpiderOak, JustCloud, and pCloud. In Source details - Title: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications (pp. 205-246). US: Elsevier.
DOI
2017 Ogazi Onyemaechi, B., Dehghantanha, A., & Choo, K. K. R. (2017). Performance of android forensics data recovery tools. In Source details - Title: Contemporary digital forensic investigations of cloud and mobile applications (pp. 91-110). US: Elsevier.
DOI
2016 Yu, Y., Li, Y., Au, M. H., Susilo, W., Choo, K. K. R., & Zhang, X. (2016). Public cloud data auditing with practical key update and zero knowledge privacy. In J. K. Liu, & R. Steinfeld (Eds.), Source details - Title: Information Security and Privacy (Vol. 9722, pp. 389-405). Germany: Springer.
DOI Scopus19 WoS14
2015 Choo, R. (2015). Cryptocurrency and virtual currency:corruption and money laundering/terrorism financing risks?. In K. C. Chuen (Ed.), Source details - Title: Handbook of digital currency : bitcoin, innovation, financial instruments, and big data (pp. 283-307). Netherlands: Elsevier.
DOI
2015 Ko, R. K. L., & Choo, R. (2015). Cloud security ecosystem. In R. Ko, & R. Choo (Eds.), Source details - Title: The cloud security ecosystem : technical, legal, business and management issues (pp. 1-14). US: Elsevier.
DOI
2015 Vidal, C., & Choo, K. K. R. (2015). Cloud security and forensic readiness: the current state of an IaaS provider. In R. Ko, & R. Choo (Eds.), Source details - Title: The cloud security ecosystem : technical, legal, business and management issues (pp. 401-428). US: Elsevier.
DOI
2015 Shariati, M., Dehghantanha, A., Martini, B., & Choo, K. K. R. (2015). Ubuntu one investigation: detecting evidences on client machines. In R. Ko, & R. Choo (Eds.), Source details - Title: The cloud security ecosystem : technical, legal, business and management issues (pp. 429-446). US: Elsevier.
DOI
2015 Martini, B., Do, Q., & Choo, K. K. R. (2015). Mobile cloud forensics: an analysis of seven popular Android apps. In R. Ko, & R. Choo (Eds.), Source details - Title: The cloud security ecosystem : technical, legal, business and management issues (pp. 309-345). US: Elsevier.
DOI
2015 Martini, B., Do, Q., & Choo, K. K. R. (2015). Conceptual evidence collection and analysis methodology for Android devices. In R. Ko, & R. Choo (Eds.), Source details - Title: The cloud security ecosystem : technical, legal, business and management issues (pp. 285-307). US: Elsevier.
DOI
2015 Juliadotter, N. V., & Choo, K. K. R. (2015). CATRA: conceptual cloud attack taxonomy and risk assessment framework. In R. Ko, & R. Choo (Eds.), Source details - Title: The cloud security ecosystem : technical, legal, business and management issues (pp. 37-81). US: Elsevier.
DOI
2015 Ab Rahman, N. H., & Choo, K. K. R. (2015). Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model. In R. Ko, & R. Choo (Eds.), Source details - Title: The cloud security ecosystem : technical, legal, business and management issues (pp. 383-400). US: Syngress Publishing.
DOI
2014 Choo, K. K. R. (2014). A conceptual interdisciplinary plug-and-play cyber security framework. In H. Kaur, & X. Tao (Eds.), Source details - Title: ICTs and the millennium development goals: a United Nations perspective (pp. 81-99). US: Springer.
2014 Simon, M. P., & Choo, K. K. (2014). Digital forensics: challenges and future research directions. In I. Kim, & J. Liu (Eds.), Event/exhibition information: The 4th Annual Conference of the Asian Criminological Society, Seoul, South Korea, 07/04/2014
Source details - Title: Contemporary Trends in Asian Criminal Justice: Paving the Way for the Future (pp. 105-146). Republic of Korea: Korean Institute of Criminology.
2014 Choo, K. K. R., & Grabosky, P. (2014). Cyber Crime. In L. Paoli (Ed.), Source details - Title: Oxford handbook of organised crime (pp. 483-499). UK: Oxford University Press.
2011 Broadhurst, R., & Choo, K. K. R. (2011). Cybercrime and online safety in cyberspace. In C. Smith, S. Zhang, & R. Barberet (Eds.), Source details - Title: Routledge handbook of international criminology (pp. 153-165). Abingdon, England: Routledge.

Year Citation
2018 Vidal, C., & Choo, K. K. R. (2018). Situational crime prevention and the mitigation of cloud computing threats. In X. Lin (Ed.), Security and privacy in communication networks (pp. 218-233). Switzerland: Springer International Publishing.
DOI
2018 Mink, D., Glisson, W. B., Benton, R., & Choo, K. K. R. (2018). Manipulating the five V's in the next generation air transportation system. In X. Lin (Ed.), Security and privacy in communication networks (pp. 271-282). Switzerland: Springer International Publishing.
DOI
2018 Cahyani, N. D. W., Martini, B., Choo, K. K. R., & Ahsman, H. (2018). Event reconstruction of Indonesian E-Banking services on windows phone devices. In SecureComm 2018: Security and Privacy in Communication Networks (pp. 507-521). Singapore: Springer.
DOI
2018 Cahyani, N. D. W., Martini, B., Choo, K. K. R., & Ashman, H. (2018). An approach to enhance understanding of digital forensics technical terms in the presentation phase of a digital investigation using multimedia presentations. In R. Beyah, B. Chang, & Y. Li (Eds.), International conference on security and privacy in communication systems: SecureComm 2018: security and privacy in communication networks (pp. 488-506). Germany: Springer.
DOI
2018 Carman, M., Koerber, M., Li, J., Choo, K. K. R., & Ashman, H. (2018). Manipulating visibility of political and apolitical threads on reddit via score boosting. In Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 (pp. 184-190). US: IEEE.
DOI Scopus22
2017 Fardous, J., Du, J. T., Choo, K. K. R., & Huang, S. S. (2017). Investigating mobile social media users' behaviors in tourism collaborative information seeking. In Proceedings of the 2017 conference on Conference Human Information Interaction and Retrieval (CHIIR '17) (pp. 395-397). United States: ACM.
DOI Scopus6 WoS3
2017 Fardous, J., Du, J. T., Choo, K. K. R., Huang, S. S., & Hansen, P. (2017). Exploring collaborative information search behavior of mobile social media users in trip planning. In Proceedings of iConference 2017 (pp. 435-444). US: University of Illinois.
DOI
2017 Osanaiye, O., Choo, K. K. R., & Dlodlo, M. (2017). Change-point cloud DDoS detection using packet inter-arrival time. In 2016 8th Computer Science and Electronic Engineering Conference, CEEC 2016 - Conference Proceedings (pp. 204-209). US: IEEE.
DOI
2017 Heravi, A., Mani, D., Choo, K. K. R., & Mubarak, S. (2017). Making decisions about self-disclosure in online social networks. In Proceedings of the 50th Hawaii International Conference on System Sciences (pp. 1922-1931). Hawaii: Hawaii International Conference on System Sciences (HICSS).
2017 Bewong, M., Liu, J., Liu, L., Li, J., & Choo, K. K. R. (2017). A relative privacy model for effective privacy preservation in transactional data. In Proceedings 16th IEEE International Conference on Trust Security and Privacy in Computing and Communications 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems Trustcom Bigdatase Icess 2017 (pp. 394-401). US: IEEE.
DOI Scopus6
2016 Yang, Y., Cai, H., Wei, Z., Lu, H., & Choo, K. K. R. (2016). Towards lightweight anonymous entity authentication for IoT applications. In Information security and privacy Vol. 9722 (pp. 265-280). Germany: Springer.
DOI Scopus45 WoS32
2016 Heravi, A., Mubarak, S., & Choo, K. K. R. (2016). Online social networking has a greater effect on others than on me: a third-person effect perspective. In Proceedings of the Australasian Conference on Information Systems Conference (pp. 1-14). Australia: University of South Australia.
2016 Cahyani, N. D. W., Martini, B., & Choo, K. K. R. (2016). Using multimedia presentations to improve digital forensic understanding: a pilot study. In Proceedings of the Australasian Conference on Information Systems (pp. 1-10). Australia: University Of South Australia.
2016 Lai, S., Liu, J. K., Choo, K. K. R., & Liang, K. (2016). Secret picture: an efficient tool for mitigating deletion delay on OSN. In S. Qing (Ed.), Lecture notes in computer science Vol. 9543 (pp. 467-477). China: Springer.
DOI
2016 Alcaraz, C., Lopez, J., & Choo, K. K. R. (2016). Dynamic restoration in interconnected RBAC-based cyber-physical control systems. In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications Vol. 4 (pp. 19-27). US: SciTePress.
2016 Esposito, C., Castiglione, A., Palmieri, F., Ficco, M., & Choo, K. K. R. (2016). A publish/subscribe protocol for event-driven communications in the Internet of Things. In Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data Intelligence and Computing, DataCom 2016 and 2016 IEEE Cyber Science and Technology Congress, CyberSciTech 2016, DASC-PICom-DataCom-CyberSciTech 2016 (pp. 376-383). US: IEEE.
DOI
2016 Mansoori, M., Welch, I., Choo, K. K. R., & Maxion, R. A. (2016). Application of HAZOP to the design of cyber security experiments. In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA) (pp. 790-799). US: IEEE.
DOI
2016 Cahyani, N. D. W., Martini, B., & Choo, K. K. R. (2016). Using multimedia presentations to enhance the judiciary's technical understanding of digital forensic concepts: an Indonesian case study. In Proceedings of the Annual Hawaii International Conference on System Sciences (pp. 5617-5626). US: IEEE.
DOI
2016 Bao, Q., Hou, M., & Choo, K. K. R. (2016). A one-pass identity-based authentication and key agreement protocol for wireless roaming. In 2016 Sixth International Conference on Information Science and Technology (ICIST) (pp. 443-447). United States: IEEE.
DOI
2016 Amjad, H. A. R., Naeem, U., Zaffar, M. A., Muhammad, F. Z., & Choo, K. K. R. (2016). Improving security awareness in the government sector. In Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 1-7). US: ACM.
DOI
2016 Mink, D. M., Yasinsac, A., Choo, K. K. R., & Glisson, W. B. (2016). Next generation aircraft architecture and digital forensic. In AMCIS 2016 proceedings (pp. 1-10). US: Association for Information Systems.
2016 Mansoori, M., Hirose, Y., Welch, I., & Choo, K. K. R. (2016). Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery. In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (pp. 941-948). US: IEEE.
DOI
2016 Azfar, A., Choo, K. K. R., & Liu, L. (2016). An android social app forensics adversary model. In Proceedings of the Annual Hawaii International Conference on System Sciences Vol. 2016 (pp. 5597-5606). US: IEEE.
DOI WoS25
2016 Peng, J., Choo, K. K. R., & Ashman, H. (2016). Astroturfing detection in social media: Using binary n-gram analysis for authorship attribution. In Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 (pp. 121-128). US: IEEE.
DOI
2016 Glisson, W. B., & Choo, K. K. R. (2016). Cybercrimes, cyber-physical innovations, and emerging investigation challenges minitrack. In 2016 49th Hawaii International Conference on System Sciences (HICSS) ) (pp. 5478). United States: IEEE.
DOI
2015 Di Leom, M., D'Orazio, C. J., Deegan, G., & Choo, K. K. R. (2015). Forensic collection and analysis of thumbnails in android. In IEEE TrustCom-15 (pp. 1059-1066). US: IEEE.
DOI
2015 Aburumman, A., & Choo, K. K. R. (2015). A domain-based multi-cluster SIP solution for mobile Ad Hoc network. In J. Tian, J. Jing, & M. Srivatsa (Eds.), 10th International ICST Conference, SecureComm 2014 (pp. 267-281). US: Springer.
DOI
2015 Chin, P. Y., Evans, N., Choo, R., & Tan, F. (2015). What influences employees to use enterprise social networks? A socio-technical perspective. In Proceedings of 19th Pacific Asia Conference on Information Systems (PACIS 2015) (pp. 1-12). Singapore: AIS Electronic Library.
2015 Farnden, J., Martini, B., & Choo, K. K. R. (2015). Privacy risks in mobile dating apps. In AMCIS 2015 Proceedings (pp. 1-15). US: Association for Information Systems.
2015 Rahman, N. H. A., & Choo, K. K. R. (2015). Factors influencing the adoption of cloud incident handling strategy: a preliminary study in Malaysia. In Twenty-first Americas Conference on Information Systems (pp. 1-15). US: Association for Information Systems.
2015 Mani, D., Heravi, A., Mubarak, S., & Choo, K. K. R. (2015). Employee's intended information security behaviour in real estate organisations: a protection motivation perspective. In Twenty-first Americas Conference on Information Systems (pp. 1-19). US: Association for Information Systems.
2015 Azfar, A., Choo, K. K. R., & Liu, L. (2015). Forensic taxonomy of popular Android mHealth apps. In AMCIS 2015 Proceedings: Healthcare Information Systems and Technology (SIGHealth) (pp. 1-19). US: Association for Information Systems.
Scopus29 WoS4
2015 Chin, P. Y., Evans, N., & Choo, R. (2015). Enterprise social networks: a successful implementation within a telecommunication company. In Twenty-first Americas Conference on Information Systems (pp. 1-11). US: Association for Information Systems.
2015 Walls, J., & Choo, K. K. R. (2015). A Review of free cloud-based anti-malware apps for android. In IEEE TrustCom-15 (pp. 1053-1058). United States: IEEE.
DOI
2015 Immanuel, F., Martini, B., & Choo, K. K. R. (2015). Android cache taxonomy and forensic process. In IEEE TrustCom-15 (pp. 1094-1101). US: IEEE.
DOI
2015 D'Orazio, C., & Choo, K. K. R. (2015). A generic process to identify vulnerabilities and design weaknesses in iOS healthcare apps. In Proceedings of 48th Annual Hawaii International Conference on System Sciences 2015 (pp. 5175-5184). US: IEEE.
DOI
2015 Mani, D., Heravi, A., Choo, K. K. R., & Mubarak, S. (2015). Information privacy concerns of real estate customers and information security in the real estate industry : an empirical analysis. In Proceedings of the 13th Australasian information security conference (AISC 2015) Vol. 161 (pp. 53-56). Australia: Australian Computer Society.
2015 Aburumman, A., Seo, W. J., Islam, R., Khan, M. K., & Choo, K. K. R. (2015). A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering. In Security and Privacy in Communication Networks Vol. 164 (pp. 649-664). US: Springer.
DOI Scopus21
2015 Tep, K. S., Martini, B., Hunt, R., & Choo, K. K. R. (2015). A taxonomy of cloud attack consequences and mitigation strategies: the role of access control and privilege access management. In IEEE TrustCom 2015 (pp. 1073-1080). US: IEEE.
2014 Gao, Y., Zeng, P., & Choo, K. K. R. (2014). Multi-Sender Broadcast Authentication in Wireless Sensor Networks. In 2014 Tenth International Conference on Computational Intelligence and Security (CIS) (pp. 633-637). US: IEEE.
DOI Scopus12 WoS9
2014 Do, Q., Martini, B., Looi, J., Wang, Y., & Choo, K. K. (2014). Windows event forensic process. In G. Peterson, & S. Shenoi (Eds.), Advances in digital forensics X: 10th IFIP WG 11.9 international conference Vol. 433 (pp. 87-100). Germany: Springer.
DOI Scopus7
2014 Martini, B., & Choo, K. K. R. (2014). Building the next generation of cyber security professionals. In Proceedings of the European Conference on Information Systems (ECIS) 2014 (pp. 1-13). US: Association for Information Systems.
2014 Mani, D., Mubarak, S., & Choo, K. K. (2014). Selection of information security controls based on AHP and GRA. In Proceedings of the international workshop of information technology and internet finance (pp. 1-12). China: Pacific Asia Conference on Information Systems.
2014 Mani, D., Mubarak, S., & Choo, K. K. R. (2014). Understanding the information security awareness process in real estate organizations using the SECI model. In AMCIS 2014 proceedings : information systems security, assurance and privacy (pp. 1-11). US: Association for Information Systems.
2014 Quick, D., Tassone, C., & Choo, K. K. R. (2014). Forensic analysis of Windows thumbcache files. In AMCIS 2014 proceedings : information systems security, assurance and privacy (pp. 1-13). US: Association for Information Systems.
2014 Ge, M., & Choo, K. K. (2014). A novel hybrid key revocation scheme for wireless sensor networks. In M. H. Au, B. Carminati, & C. C. J. Kuo (Eds.), Network and Security Systems - Proceedings of the 8th International Conference on Network and System Security - NSS 2014 (pp. 462-475). Switzerland: Springer.
DOI
2014 Do, Q., Martini, B., & Choo, K. K. R. (2014). Enhancing user privacy on Android mobile devices via permissions removal. In R. H. Sprague (Ed.), Proceedings of the 47th Annual Hawaii International Conference on System Sciences (pp. 5070-5079). US: IEEE.
DOI
2014 Martini, B., & Choo, K. K. R. (2014). Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 935-942). US: IEEE.
DOI
2014 D'Orazio, C., Mohd Ariffin, A., & Choo, K. K. R. (2014). iOS anti-forensics : how can we securely conceal, delete and insert data?. In R. H. Sprague (Ed.), Proceedings of the 47th Annual Hawaii International Conference on System Sciences (pp. 4838-4847). Washington, DC: IEEE Computer Society.
DOI
2014 Azfar, A., Choo, K. K. R., & Liu, L. (2014). A study of ten popular Android mobile VoIP applications: are the communications encrypted?. In R. H. Sprague (Ed.), Proceedings of the 47th Annual Hawaii International Conference on System Sciences (pp. 4858-4867). US: IEEE.
DOI
2014 Do, Q., Martini, B., & Choo, K. K. R. (2014). Enforcing file system permissions on Android external storage: Android File system Permissions (AFP) prototype and ownCloud. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 949-954). US: IEEE.
DOI
2014 O'Malley, S. J., & Choo, K. K. R. (2014). Bridging the air gap : inaudible data exfiltration by insiders. In AMCIS 2014 proceedings : information systems security, assurance and privacy (pp. 1-12). US: Association for Information Systems.
2014 Jones, D., & Choo, K. K. R. (2014). Should there be a new body of law for cyber space?. In Proceedings of the European Conference on Information Systems (ECIS) (pp. 1-7). US: Association for Information Systems.
2013 Ariffin, A., Slay, J., & Choo, K. K. (2013). Data recovery from proprietary-formatted CCTV hard disks. In G. Peterson, & S. Shenoi (Eds.), Advances in digital forensics IX (pp. 213-223). US: Springer.
DOI
2013 Ariffin, A., Choo, K. K. R., & Slay, J. (2013). Digital camcorder forensics. In C. Thomborson, & U. Parampalli (Eds.), AISC '13 Proceedings of the Eleventh Australasian Information Security Conference (pp. 39-47). Australia: Australian Computer Society.
2013 Aburumman, A., Choo, K. K. R., & Lee, I. (2013). Nomination-based session initiation protocol service for mobile ad hoc networks. In P. Gaertner (Ed.), 22nd National Conference of the Australian Society for Operations Research (ASOR 2013) (pp. 149-155). Australia: The Australian Society for Operations Research.
2013 Ariffin, A., D'Orazio, C. J., Choo, K. K., & Slay, J. (2013). iOS forensics: how can we recover deleted image files with timestamp in a forensically sound manner?. In Proceedings: 2013 International Conference on Availability, Reliability and Security: ARES 2013 (pp. 375-382). US: IEEE Press.
DOI
2013 Alwadiych, E. S., Aburumman, A., & Choo, K. K. (2013). Interference-aware multipath routing protocols for mobile ad hoc networks. In P. Gaertner (Ed.), Proceedings of the 22nd National Conference of the Australian Society for Operations Research (pp. 156-162). Australia: Australian Society for Operations Research.
2013 Martini, B., Quick, D. P., & Choo, K. K. (2013). Cloud computing and digital forensics. In World Crime Forum 2013: Information Society and Cybercrime: Challenges for Criminology and Criminal Justice (pp. 111-125). Korea: Korean Institute of Criminology.
2010 Teo, J. C. M., & Choo, K. K. (2010). Security improvements to anonymous ID-based group key agreement for wireless networks. In ITNG '10 Proceedings of the 2010 Seventh International Conference on Information Technology: New Generations (pp. 732-737). Washington: IEEE Computer Society.
DOI

Date Role Research Topic Program Degree Type Student Load Student Name
2024 Co-Supervisor - Doctor of Philosophy Doctorate Full Time Mr Mulugeta Kalayou
2017 Co-Supervisor - Doctor of Philosophy Doctorate Full Time Mr Mark Carman
2017 Co-Supervisor - Doctor of Philosophy Doctorate Full Time Mr Mahdi Shafiei

Date Role Editorial Board Name Institution Country
2022 - ongoing Editor-In-chief ACM Distributed Ledger Technologies: Research and Practice ACM United States

Connect With Me

External Profiles

Other Links