Publications

Authored Research Books

1.      Quick D, Martini B and Choo K-KR 2013. Cloud storage forensics. Syngress, an Imprint of Elsevier.  http://www.sciencedirect.com/science/book/9780124199705

2.      Choo K-KR, Smith RG, Walters J and Bricknell S 2013. Perceptions of money laundering and financing of terrorism in the Australian legal profession. Research and Public Policy No 122(1), Canberra, ACT: Australian Institute of Criminology. http://www.aic.gov.au/media_library/publications/rpp/122/rpp122part1.pdf

3.      Walters J, Chadwick H, Choo K-KR and Smith RG 2013. Industry perspectives on money laundering and financing of terrorism risks in non-financial sector businesses and professions. Research and Public Policy No 122(2), Canberra, ACT: Australian Institute of Criminology. http://www.aic.gov.au/media_library/publications/rpp/122/rpp122part2.pdf

4.      Walters J, Smith RG, Davis D, Choo K-K R and Chadwick H 2012. The anti-money laundering and counter-terrorism financing regime in Australia: Perceptions of regulated businesses in Australia. Research and public policy No 117, Canberra, ACT: Australian Institute of Criminology. http://www.aic.gov.au/media_library/publications/rpp/117/rpp117.pdf   

5.      Walters J, Budd C, Smith RG, Choo K-K R, McCusker R and Rees D 2012. Anti-money laundering and counter-terrorism financing across the globe: A comparative study of regulatory action. Research and public policy No 113, Canberra, ACT: Australian Institute of Criminology. http://www.aic.gov.au/media_library/publications/rpp/113/rpp113.pdf  

6.      Choo K-K R 2009. Online child grooming: A literature review on the misuse of social networking sites for grooming children for sexual offences. Research and public policy No 103, Canberra, ACT: Australian Institute of Criminology. ISBN: 9781921532337. http://www.aic.gov.au/publications/current%20series/rpp/100-120/rpp103.html 

7.      Choo K-K R 2008. Secure Key Establishment. Advances in Information Security Book series Volume 41. Springer Science+Business Media, LLC. ISBN: 9780387879680. http://dx.doi.org/10.1007/978-0-387-87969-7 

8.      Urbas G and Choo K-K R 2008. Resource materials on technology-enabled crime. Technical and background paper No 28, Canberra, ACT: Australian Institute of Criminology. ISBN: 978192118570 0. http://www.aic.gov.au/publications/current%20series/tbp/21-40/tbp028.html  

9.      Choo K-K R, Smith R G and McCusker R 2007. Future directions in technology-enabled crime : 2007-2009. Research and public policy No 78, Canberra: Australian Institute of Criminology. ISBN: 9781921185441. http://www.aic.gov.au/publications/current%20series/rpp/61-80/rpp78.html

 

Edited Books

1.      Au M H, Castiglione A, Choo K-KR, Palmieri F and Li K C 2017. Green, Pervasive, and Cloud Computing, Lecture Notes in Computer Science 10232/2017, Springer. http://dx.doi.org/10.1007/978-3-319-57186-7

2.      Au M H and Choo K-KR 2017. Mobile Security and Privacy: Advances, Challenges and Future Research Directions. Syngress, an Imprint of Elsevier. http://www.sciencedirect.com/science/book/9780128046296

3.      Choo K-KR and Dehghantanha A 2017. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Syngress, an Imprint of Elsevier. http://www.sciencedirect.com/science/book/9780128053034   

4.      Park K, Chen S C and Choo K-KR 2017. Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering 448/2017, Springer. http://dx.doi.org/10.1007/978-981-10-5041-1

5.      Ko R and Choo K-KR 2015. Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress, an Imprint of Elsevier. http://www.sciencedirect.com/science/book/9780128015957

 

Scholarly Book Chapters

1.      Choo K-K R (in press – expected 2018). Cloud Computing. In Bruce Arrigo (Ed.). The SAGE encyclopedia of surveillance, security, and privacy (Vol. x, pp. xx-xx). Thousand Oaks, CA: Sage

2.      Au M H and Choo K-K R 2017. Mobile Security and Privacy. In M H Au and Choo K-K R A, editors, Mobile Security and Privacy: Advances, Challenges and Future Research Directions, pp. 1–4, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-804629-6.00001-8

3.      Chia C, Choo K-K R and Fehrenbacher D 2017. How Cyber-Savvy are Older Mobile Device Users?. In Au M H and Choo K-K R, editors, Mobile Security and Privacy: Advances, Challenges and Future Research Directions, pp. 67–84, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-804629-6.00004-3 

4.      Schiliro F and Choo K-K R 2017. The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practitioner’s Perspective. In Au M H and Choo K-K R, editors, Mobile Security and Privacy: Advances, Challenges and Future Research Directions, pp. 85–99, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-804629-6.00005-5

5.      Walls J and Choo K-K R 2017. A Study of the Effectiveness abs Reliability of Free Antimobile Malware Tools for Android. In Au M H and Choo K-K R, editors, Mobile Security and Privacy: Advances, Challenges and Future Research Directions, pp. 167–203, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-804629-6.00008-5

6.      Ab Rahman N H, Kessler G and Choo K-K R 2017. Implications of emerging technologies to incident handling and digital forensic strategies: A Routine Activity Theory. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 131–146, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00009-5

7.      Ariffin A, Choo K-K R and Yunos Z 2017. CCTV Forensic Readiness: A Case Study on Digital CCTV Systems. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 147–162, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00010-1

8.      Choo K-K R and Dehghantanha A 2017. Contemporary Digital Forensics Investigations of Cloud and Mobile Applications. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 1–6, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00001-0

9.      Christopher K, Choo K-K R and Dehghantanha A 2017. Honeypots for employee information security awareness and education training: A conceptual EASY training model. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 111–129, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00008-3

10.   Ogazi-Onyemaechi B C, Dehghantanha A and Choo K-K R 2017. Performance of Android Forensics Data Recovery Tools. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 91–110, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00007-1

11.   Mohtasebi H, Dehghantanha A and Choo K-K R 2017. Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 205–246, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00013-7

12.   Tassone C, Martini B and Choo K-K R 2017. Forensic Visualization: Survey and Future Research Directions. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 163–184, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00011-3

13.   Yang T Y, Dehghantanha A, Choo K-K R and Muda Z 2017. Investigating American Online Instant Messaging Application: Data remnants on Windows 8.1 Client Machine. In Choo K-K R and Dehghantanha A, editors, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 21–39, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-805303-4.00003-4

14.   Ab Rahman N H and Choo K-K R 2015. Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model. In Ko R and Choo K-K R, editors, Cloud Security Ecosystem, pp. 383–400, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-801595-7.00017-3

15.   Choo K-K R 2015. Current Situation and Modi Operandi of Cybercrime. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders Resource Material Series No 97: 3–14, Tokyo, Japan: United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders. http://unafei.or.jp/english/pdf/RS_No97/No97_00All.pdf

16.   Choo K-K R 2015. Contemporary Digital Forensic Investigations. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders Resource Material Series No 97: 15–26, Tokyo, Japan: United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders. http://unafei.or.jp/english/pdf/RS_No97/No97_00All.pdf

17.   Juliadotter N V and Choo K-K R 2015. CATRA: Conceptual cloud attack taxonomy and risk assessment framework. In Ko R and Choo K-K R, editors, Cloud Security Ecosystem, pp. 37–81, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-801595-7.00003-3

18.   Martini B, Do Q and Choo K-K R 2015. Conceptual evidence collection and analysis methodology for Android devices. In Ko R and Choo K-K R, editors, Cloud Security Ecosystem, pp. 285–307, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-801595-7.00014-8

19.   Martini B, Do Q and Choo K-K R 2015. Mobile cloud forensics: An analysis of seven popular Android apps. In Ko R and Choo K-K R, editors, Cloud Security Ecosystem, pp. 309–345, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-801595-7.00015-X

20.   Shariati M, Dehghantanha A, Martini B and Choo K-K R 2015. Ubuntu One Investigation: Detecting Evidences on Client Machines. In Ko R and Choo K-K R, editors, Cloud Security Ecosystem, pp. 429–446, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-801595-7.00019-7

21.   Vidal C and Choo K-K R 2015. Cloud Security and Forensic Readiness: The Current State of an IaaS Provider. In Ko R and Choo K-K R, editors, Cloud Security Ecosystem, pp. 401–428, Syngress, an Imprint of Elsevier. http://dx.doi.org/10.1016/B978-0-12-801595-7.00018-5 

22.   Choo K-K R 2015. Cryptocurrency and Virtual Currency: Corruption and Money Laundering/Terrorism Financing Risks?. In Lee D K C, editor, Handbook of Digital Currency, pp. 283–307, New York, USA: Elsevier. http://dx.doi.org/10.1016/B978-0-12-802117-0.00015-1   

23.   Choo K-K R 2014. A conceptual interdisciplinary plug-and-play cyber security framework. In Kaur H & Tao X, editors, ICTs and the Millennium Development Goals – A United Nations Perspective, pp. 81–99, New York, USA: Springer. http://dx.doi.org/10.1007/978-1-4899-7439-6_6   

24.   Choo K-K R and Grabosky P 2014. Cyber crime. In Letizia Paoli, editor, Oxford Handbook of Organized Crime, pp. 482–499, New York: Oxford University Press. http://dx.doi.org/10.1093/oxfordhb/9780199730445.013.003  

25.   Simon M and Choo K-K R 2014. Digital forensics: Challenges and future research directions. In Il-Su Kim and Jianhong Liu (editors), Contemporary Trends in Asian Criminal Justice: Paving the Way for the Future, pp. 105–146, Seoul: South Korea, Korean Institute of Criminology. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2421339  

26.   Martini B, Quick D and Choo K-K R 2013. Cloud Computing and Digital Forensics. In Kim, I-S, editor, Information Society and Cybercrime: Challenges for Criminology and Criminal Justice, Research Report Series 13-B-01: 111–125, Korean Institute of Criminology. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2365631   

27.   Broadhurst R and Choo K-K R 2011. Cybercrime and on-line safety in cyberspace. In Smith C., S. Zhang & R. Barberet, editors, Routledge International Handbook of Criminology, 153–165, Routledge: NY. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2171559  

28.   Choo K-K R 2011. Harnessing information and communications technologies in community policing, in Judy Putt, editor, Community policing in Australia, Research and public policy No 111: 67–75, Canberra: Australian Institute of Criminology. http://www.aic.gov.au/publications/current%20series/rpp/100-120/rpp111.html     

29.   Choo K-K R 2009. Zombies and Botnets. In Shweta Puneet, editor, Botnets: A Cyber Threat, ICFAI Press, February

30.   Choo K-K R and Smith RG 2009. Criminal Exploitation of Online Systems by Organised Crime Groups, in Yvonne Jewkes, editor, Crime and Media Volume 3: Emerging New Media and Crime, SAGE Publishing, March

 

Refereed Journal Articles

1.      Ab Rahman N H, Cahyani N D W and Choo K-K R. Cloud incident handling and forensic-by-design: Cloud storage as a case study. Concurrency and Computation: Practice and Experience [In press; 2016 Google Scholar H-5 Index: 29; 2015 Impact Factor: 0.942]. http://dx.doi.org/10.1002/cpe.3868

2.      Aburumman A, Seo W Y, Esposito C, Castiglione A, Islam R and Choo K-K R. A Secure and Resilient Cross-Domain SIP Solution for MANETs using Dynamic Clustering and Joint Spatial and Temporal Redundancy. Concurrency and Computation: Practice and Experience [In press; 2016 Google Scholar H-5 Index: 29; 2015 Impact Factor: 0.942]. http://dx.doi.org/10.1002/cpe.3978 

3.      Ahmad J, Abbas H, Raza A, Choo K-K R and Khan F A. Electronic Crime Investigations in a Virtualized Environment: A Forensic Process and Prototype for Evidence Collection and Analysis. Australian Journal of Forensic Sciences [In press; 2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2016.1229814

4.      Alcaraza C, Lopez J and Choo K-K R. Resilient interconnection in cyber-physical control systems. Computers & Security [In press; 2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2017.03.004

5.      Cahyani N D W, Martini B, Choo K-K R and Al-Azhar M H. Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study. Concurrency and Computation: Practice and Experience [In press; 2016 Google Scholar H-5 Index: 29; 2015 Impact Factor: 0.942]. http://dx.doi.org/10.1002/cpe.3855

6.      Chanajitt R, Viriyasitavat W and Choo K-K R. Forensic analysis and security assessment of Android m-banking apps. Australian Journal of Forensic Sciences. [In press; 2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2016.1182589

7.      Chen H Y, Choo K-K R and Chen W U. Tamper detection and image recovery for BTC-compressed images. Multimedia Tools and Applications [In press; 2016 Google Scholar H-5 Index: 35 (Ranks 4 in Multimedia); 2015 Impact Factor: 1.331 (Quartile 2; Ranks 31/106)]. http://dx.doi.org/10.1007/s11042-016-3847-7

8.      Choudhury S K, Sa P K, Choo K-K R and Bakshi S. Segmenting foreground objects in a multi-modal background using modified Z-score. Journal of Ambient Intelligence and Humanized Computing [In press; 2016 Google Scholar H-5 Index: 16; 2015 Impact Factor: 0.835] http://dx.doi.org/10.1007/s12652-017-0480-x

9.      D'Orazio C and Choo K-K R. Circumventing iOS Security Mechanisms for APT Forensic Investigations: A Security Taxonomy for Cloud Apps. Future Generation Computer Systems [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.11.010

10.   Ding H, Zhang Y, Ren Y, Shi B and Choo K-K R. Heterogeneous investment in spatial public goods game with mixed strategy. Soft Computing [In press; 2016 Google Scholar H-5 Index: 36 (Ranks 6 in Fuzzy Systems); 2015 Impact Factor: 1.630 (Quartile 2; Ranks 56/130)]. http://dx.doi.org/10.1007/s00500-016-2415-4

11.   Ding Y, Xu X, Ye K and Choo K-K R. Secure outsourcing of modular exponentiations under single untrused programme model. Journal of Computer and System Sciences [In Press; 2016 Google Scholar H-5 Index: 34 (Ranks 8 in Theoretical Computer Science); 2015 Impact Factor: 1.334]. http://dx.doi.org/10.1016/j.jcss.2016.11.005

12.   Doshi N, Kumari S, Mishra D, Li X, Choo K-K R and Sangaiah A K. A password based authentication scheme for wireless multimedia systems. Multimedia Tools and Applications [In press; 2016 Google Scholar H-5 Index: 35 (Ranks 4 in Multimedia); 2015 Impact Factor: 1.331 (Quartile 2; Ranks 31/106)]. http://dx.doi.org/10.1007/s11042-017-4701-2

13.   Eterovic-Soric B, Choo K-K R, Mubarak S, and Ashman H. Windows 7 Antiforensics: A Review and a Novel Approach. Journal of Forensic Sciences [In press, accepted 13 October 2016; 2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13393

14.   Jabbarpour M R, Zarrabi H, Khokhar R H, ShamshirbandJiang S and Choo K-K R. Applications of Computational Intelligence in Vehicle Traffic Congestion Problem: A Survey. Soft Computing [In press; 2016 Google Scholar H-5 Index: 36 (Ranks 6 in Fuzzy Systems); 2015 Impact Factor: 1.630 (Quartile 2; Ranks 56/130)]. http://dx.doi.org/10.1007/s00500-017-2492-z

15.   Jiang R, Lu R and Choo K-K R. Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Generation Computer Systems. [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.05.005

16.   Khan M K, Zakariah M, Malik H and Choo K-K R. A novel audio forensic data-set for digital multimedia forensics. Australian Journal of Forensic Sciences [In press; 2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2017.1296186

17.   Kumari S, Das A K, WazidM, Li X, Wu F, Choo K-K R and Khan M K. On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience [In press; 2016 Google Scholar H-5 Index: 29; 2015 Impact Factor: 0.942]. http://dx.doi.org/10.1002/cpe.3930

18.   He D, Kumar N, Wang H, Wang L, Choo K-K R and Vinel A. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Transactions on Dependable and Secure Computing [In press; 2016 Google Scholar H-5 Index: 41 (Ranks 9 in Computer Security & Cryptography); 2015 Impact Factor: 1.592]. http://dx.doi.org/10.1109/TDSC.2016.2596286

19.   Hu Y, Kong W, Ren Y and Choo K-K R. A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution. IEEE Access [In press; 2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.270 (Quartile 2; Ranks 68/144)]. https://doi.org/10.1109/ACCESS.2017.2706943

20.   Huang C, Lu R and Choo K-K R. Secure and Flexible Cloud-Assisted Association Rule Mining over Horizontally Partitioned Databases. Journal of Computer and System Sciences [In Press; 2016 Google Scholar H-5 Index: 34 (Ranks 8 in Theoretical Computer Science); 2015 Impact Factor: 1.334]. http://dx.doi.org/10.1016/j.jcss.2016.12.005

21.   Li W, Xu Z, Li T, Sun G and Choo K-K R. An optimized approach for massive web page classification using entity similarity based on semantic network. Future Generation Computer Systems. [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2017.03.003

22.   Li X, Niu J, Kumari S, Wu F and Choo K-K R. A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Generation Computer Systems. [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2017.04.012

23.   Li Y, Yu Y, Min G, Susilo W, Ni J and Choo K-K R. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. IEEE Transactions on Dependable and Secure Computing [In press; 2016 Google Scholar H-5 Index: 41 (Ranks 9 in Computer Security & Cryptography); 2015 Impact Factor: 1.592]. https://doi.org/10.1109/TDSC.2017.2662216

24.   Li X, Peng J, Kumari Sm Wu F, Karuppiah M and Choo K-K R. An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Computers & Electrical Engineering [In press; 2016 Google Scholar H-5 Index: 27; 2015 Impact Factor: 1.084 (Quartile 2 – 24/51)]. http://dx.doi.org/10.1016/j.compeleceng.2017.02.011

25.   Li X, Ibrahim M H, Kumari S, Sangaiah A K, Gupta V and Choo K-K R. Anonymous Mutual Authentication and Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks. Computer Networks [In Press; 2016 Google Scholar H-5 Index: 50 (Ranks 14 in Computer Networks & Wireless Communication); 2015 Impact Factor: 1.446 (Quartile 2; Ranks 16/51)]. http://dx.doi.org/10.1016/j.comnet.2017.03.013

26.   Liu J, Yu X, Xu Z, Choo K-K R, Hong L and Cui X. A cloud-based taxi trace mining framework for smart city. Software: Practice and Experience. [In press; 2016 Google Scholar H-5 Index: 28 (Ranks 19 in Software Systems); 2015 Impact Factor: 0.652]. http://dx.doi.org/10.1002/spe.2435

27.   Liu P, Choo K-K R, Wang L and Huang F. SVM or Deep Learning? A Comparative Study on Remote Sensing Image Classification. Soft Computing [In press; 2016 Google Scholar H-5 Index: 36 (Ranks 6 in Fuzzy Systems); 2015 Impact Factor: 1.630 (Quartile 2; Ranks 56/130)]. http://dx.doi.org/10.1007/s00500-016-2247-2

28.   Liu X, Choo K-K R, Deng R H, Weng J. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Transactions on Dependable and Secure Computing [In press; 2016 Google Scholar H-5 Index: 41 (Ranks 9 in Computer Security & Cryptography); 2015 Impact Factor: 1.592]. http://dx.doi.org/10.1109/TDSC.2016.2536601

29.   Liu Z, Choo K-K R, Zhao M. Practical-oriented protocols for privacy-preserving outsourced big data analysis: challenges and future research directions. Computers & Security [In press; 2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2016.12.006

30.   Luo M, Zhou X, Li L, Choo K-K R, and He D. Security analysis of two Password-authenticated Multi-Key Exchange Protocols. IEEE Access [In press; 2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.270 (Quartile 2; Ranks 68/144)]. https://doi.org/10.1109/ACCESS.2017.2698390

31.   Ma M, He D, Kumar N, Choo K-K R, and Chen J. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things. IEEE Transactions on Industrial Informatics [In press; 2016 Google Scholar H-5 Index: 68; 2015 Impact Factor: 4.108 (Quartile 1; Ranks 3/104)]. http://dx.doi.org/10.1109/TII.2017.2703922

32.   Milosevic N, Dehghantanha A and Choo K-K R. Machine learning aided Android malware classification. Computers & Electrical Engineering [In press; 2016 Google Scholar H-5 Index: 27; 2015 Impact Factor: 1.084 (Quartile 2 – 24/51)]. http://dx.doi.org/10.1016/j.compeleceng.2017.02.013

33.   Osanaiye O, Chen S, Yan Z, Lu R, Choo K-K R, and Dlodlo M. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access [In press; 2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.270 (Quartile 2; Ranks 68/144)]. https://doi.org/10.1109/ACCESS.2017.2692960

34.   Pajouh H H, Javidan R, Khaymi R, Dehghantanha A and Choo K-K R. A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Transactions on Emerging Topics in Computing [In press]. http://dx.doi.org/10.1109/TETC.2016.2633228 

35.   Peng J, Detchon S Choo K-K R and Ashman H. Astroturfing detection in social media: a binary n-gram–based approach. Concurrency and Computation: Practice and Experience [In press; 2016 Google Scholar H-5 Index: 29; 2015 Impact Factor: 0.942]. http://dx.doi.org/10.1002/cpe.4013

36.   Quick D and Choo K-K R. Big Forensic Data Management in Heterogeneous Distributed Systems: Quick Analysis of Multimedia Forensic Data. Software: Practice and Experience. [In press; 2016 Google Scholar H-5 Index: 28 (Ranks 19 in Software Systems); 2015 Impact Factor: 0.652]. http://dx.doi.org/10.1002/spe.2429

37.   Quick D and Choo K-K R. Digital Forensic Intelligence: Data Subsets and Open Source Intelligence (DFINT+OSINT): a Timely and Cohesive Mix. Future Generation Computer Systems. [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.12.032

38.   Radhakrishna V, Aljawarneh S A, Aljawarneh P V and Choo K-K R. A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Computing [In press; 2016 Google Scholar H-5 Index: 36 (Ranks 6 in Fuzzy Systems); 2015 Impact Factor: 1.630 (Quartile 2; Ranks 56/130)]. http://dx.doi.org/10.1007/s00500-016-2445-y

39.   Rout J K, Choo K-K R, Dash A K, Bakshi S, Jena S K andWilliams K L. A Model for Sentiment and Emotion Analysis of Unstructured Social Media Text. Electronic Commerce Research [In press; 2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.275]. http://dx.doi.org/10.1007/s10660-017-9257-8

40.   Sun S, Song W, Zomaya A Y, Xiang Y, Choo K-K R, Shah T, and Wang  L. Associative Retrieval in Spatial Big Data based on Spreading Activation with Semantic Ontology. Future Generation Computer Systems. [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.10.018

41.   Tian T, Zhang Y, Choo K-K R and Song W. A biologically inspired spatio-chromatic feature for color object recognition. Multimedia Tools and Applications. [In press; 2016 Google Scholar H-5 Index: 35 (Ranks 4 in Multimedia); 2015 Impact Factor: 1.331 (Quartile 2; Ranks 31/106)]. http://dx.doi.org/10.1007/s11042-016-4252-y 

42.   Tassone C, Martini B and Choo K-K R. Visualizing Digital Forensic Datasets: A Proof of Concept. Journal of Forensic Sciences [In press; 2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13431

43.   Teing YY, Dehghantanha A, Choo K-K R, Abdullah MA, and Muda Z. Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study. IEEE Transactions on Sustainable Computing [In press]. http://dx.doi.org/10.1109/TSUSC.2017.2687103

44.   Usman N, Javaid O, Akhunzada A,  Choo K-K R,  Usman S, Sher A; Ilahi M, and Alam M. A Novel Internet of Things-centric Framework to Mine Malicious Frequent Patterns. IEEE Access [In press; 2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.270 (Quartile 2; Ranks 68/144)]. https://doi.org/10.1109/ACCESS.2017.2690456

45.   Wang H, He D, Sun Y, Kumar N and Choo K-K R. PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. Future Generation Computer Systems [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.12.005

46.   Wang L, Liu P, Song W and Choo K-K R. DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image. Soft Computing [In press; 2016 Google Scholar H-5 Index: 36; 2015 Impact Factor: 1.630 (Quartile 2; Ranks 56/130)]. http://dx.doi.org/10.1007/s00500-017-2568-9

47.   Wu F, Xu L, Kumari S, Li X, Shen J Choo K-K R, Wazid M and Das A K. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. Journal of Network and Computer Applications [In press; 2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.12.008

48.   Xiong L, Choo K-K R, and Vasilakos A V. Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing. IEEE Transactions on Big Data [In press]. https://doi.org/10.1109/TBDATA.2017.2697448

49.   Xu Z, Luo X, Liu Y, Choo K-K R, Sugumaran V, Yen N, Mei L and Hu C. From Latency, through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources. IEEE Transactions on Big Data [In press]. http://dx.doi.org/10.1109/TBDATA.2016.2599935

50.   Xu Z, Xuan J, Liu Y, Choo K-K R, Mei L, and Hu C. Building Spatial Temporal Relation Graph of Concepts Pair using Web Repository. Information Systems Frontiers [In press; 2016 Google Scholar H-5 Index: 25; 2015 Impact Factor: 1.450 (Quartile 2; Ranks 29/105)]. http://dx.doi.org/10.1007/s10796-016-9676-4

51.   Xu Z, Yen N, Lu Z, Choo K-K R, Mei L and Luo X. Social Sensors Based Online Attention Computing of Public Safety Events. IEEE Transactions on Emerging Topics in Computing [In press]. https://doi.org/10.1109/TETC.2017.2684819

52.   Yang J, Jiang B, Lv Z and Choo K-K R. A task scheduling algorithm considering game theory designed for energy management in cloud computing. Future Generation Computer Systems [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2017.03.024

53.   Yan J, Ma Y, Wang L, Choo K-K R, and Jie W. A Cloud-based Remote Sensing Data Production System. Future Generation Computer Systems [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2017.02.044

54.   Yang Y, W Z, Zhang U, Lu H, Choo K-K R, and Cai H. V2X Security: A Case Study of Anonymous Authentication. Pervasive and Mobile Computing [In press; 2016 Google Scholar H-5 Index: 34; 2015 Impact Factor: 1.719 (Quartile 2; Ranks 23/81)]. http://dx.doi.org/10.1016/j.pmcj.2017.03.009

55.   Zhang S, Xu Z, Choo K-K R, Liu Y, Wei X, Luo X, Mei L and Hu C. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web. IEEE Transactions on Industrial Informatics [In press; 2016 Google Scholar H-5 Index: 68; 2015 Impact Factor: 4.108 (Quartile 1; Ranks 3/104)]. https://dx.doi.org/10.1109/TII.2017.2647986  

56.   Abdelaziz A, Fong A T, Gani A, Garba U, Khan S, Akhunzada A, Talebian H and Choo K-K R 2017. Distributed controller clustering in software defined networks. PLOS ONE 12(4): e0174715 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0174715

57.   Alam Q, Malik S U R, Akhunzada A, Choo K-K R, Tabbasum S and Alam M 2017. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification. IEEE Transactions on Information Forensics and Security 12(6): 1259–1268 [2016 Google Scholar H-5 Index: 61 (Ranks 2 in Computer Security & Cryptography); 2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. https://dx.doi.org/10.1109/TIFS.2016.2646639   

58.   Azfar A, Choo K-K R and Liu L 2017. Forensic Taxonomy of Android Social Apps. Journal of Forensic Sciences 62(2): 435–456 [2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13267

59.   Azfar A, Choo K-K R and Liu L 2017. Forensic Taxonomy of Android Productivity Apps. Multimedia Tools and Applications 76(3): 3313–3341 [In press; 2016 Google Scholar H-5 Index: 35 (Ranks 4 in Multimedia); 2015 Impact Factor: 1.331 (Quartile 2; Ranks 31/106)]. http://dx.doi.org/10.1007/s11042-016-3718-2

60.   Bolimos I A and Choo K-K R 2017. Online fraud offending within an Australian jurisdiction. Journal of Financial Crime 24(2): 277–308 [2016 Google Scholar H-5 Index: 11]. http://dx.doi.org/10.1108/JFC-05-2016-0029

61.   Cahyani N D W, Ab Rahman N H, Glisson W B and Choo K-K R 2017. The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mobile Networks and Applications 22(2): 240–254 [2016 Google Scholar H-5 Index: 27; 2015 Impact Factor: 1.538]. http://dx.doi.org/10.1007/s11036-016-0791-8

62.   Cahyani N D W, Martini B and Choo K-K R 2017. Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: A pilot study. Australian Journal of Forensic Sciences 49(1): 106–122 [2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2015.1128968

63.   Chen Y, Li F, Chen J, Du B, Choo K-K R and Hassanand H 2017. EPLS: A novel feature extraction method for migration data clustering. Journal of Parallel and Distributed Computing 103: 96–103 [2016 Google Scholar H-5 Index: 36 (Ranks 19 in Computing Systems); 2015 Impact Factor: 1.320]. http://dx.doi.org/10.1016/j.jpdc.2016.11.008

64.   Chen Y, Wang L, Li F, Du B, Choo K-K R, Hassan H and Qin Q 2017. Air Quality Data Clustering using EPLS Method. Information Fusion 36: 225–232 [2016 Google Scholar H-5 Index: 34; 2015 Impact Factor: 4.353 (Quartile 1; Ranks 4/105)]. http://dx.doi.org/10.1016/j.inffus.2016.11.015

65.   Daryabar D, Dehghantanha A and Choo K-K R 2017. Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences 49(3): 344-357 [2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2016.1153714

66.   D'Orazio C and Choo K-K R 2017. A Technique to Circumvent SSL/TLS Validations on iOS Devices. Future Generation Computer Systems 74: 366–374. [2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.08.019

67.   D'Orazio C, Choo K-K R and Yang L T 2017. Data Exfiltration from Internet of Things Devices: iOS Devices as Case Studies. IEEE Internet of Things Journal 4(2): 524–535 [2016 Google Scholar H-5 Index: 18]. http://dx.doi.org/10.1109/JIOT.2016.2569094 

68.   D'Orazio C, Lu R, Choo K-K R and Vasilakos A V 2017. A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Applied Mathematics and Computation 293: 523–544 [2016 Google Scholar H-5 Index: 57 (Ranks 3 in Computational Mathematics); 2015 Impact Factor: 1.345 (Quartile 1; Ranks 54/254)]. http://dx.doi.org/10.1016/j.amc.2016.08.051

69.   Do Q, Martini B and Choo K-K R 2017. Is the data on your wearable device secure? An Android Wear smartwatch case study. Software: Practice and Experience 47(3): 391–403 [2016 Google Scholar H-5 Index: 28 (Ranks 19 in Software Systems); 2015 Impact Factor: 0.652]. http://dx.doi.org/10.1002/spe.2414

70.   Esposito C, Castiglione A, Pop F and Choo K-K R 2017. Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective. IEEE Cloud Computing 4(2): 13–17. https://doi.org/10.1109/MCC.2017.30

71.   Fang H, Xu L and Choo K-K R 2017. Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Applied Mathematics and Computation 296: 153–167 [2016 Google Scholar H-5 Index: 57 (Ranks 3 in Computational Mathematics); 2015 Impact Factor: 1.345 (Quartile 1; Ranks 54/254)]. http://dx.doi.org/10.1016/j.amc.2016.10.022

72.   Fang H, Xu L, Li J and Choo K-K R 2017. An Adaptive Trust-Stackelberg Game Model for Security and Energy Efficiency in Dynamic Cognitive Radio Networks. Computer Communications [2016 Google Scholar H-5 Index: 49 (Ranks 16 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.099 (Quartile 1; Ranks 28/143)]. http://dx.doi.org/10.1016/j.comcom.2016.11.012 

73.   Kumari S, Xiong L, Wu F, Das A K, Choo K-K R and Shen J 2017. Design of a Provably Secure Biometrics-based Multi-cloud-server Authentication Scheme. Future Generation Computer Systems 68: 320–330 [2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.10.004

74.   He D, Kumar N, Choo K-K R and Wu W 2017. Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System. IEEE Transactions on Information Forensics and Security 12(2): 454–464 [2016 Google Scholar H-5 Index: 61 (Ranks 2 in Computer Security & Cryptography); 2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2622682

75.   Hua J, Tang A, Pan Q, Choo K-K R, Ding H and Ren Y 2017. Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. Security and Communication Networks 2017), Article ID 9532163 [2016 Google Scholar H-5 Index: 21; 2015 Impact Factor: 0.806]. https://doi.org/10.1155/2017/9532163

76.   Jitendra R, Anmol Dalmia, Choo K-K R, Sambit B and Sanjay J 2017. Revisiting Semi-supervised Learning for Online Deceptive Review Detection. IEEE Access 5: 1319–1327 [2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.270 (Quartile 2; Ranks 68/144)]. http://dx.doi.org/10.1109/ACCESS.2017.2655032

77.   Li B, Lu R, Wang W and Choo K-K R 2017. Distributed Host-based Collaborative Detection for False Data Injection Attacks in Smart Grid Cyber-Physical System. Journal of Parallel and Distributed Computing 103: 32-41 [2016 Google Scholar H-5 Index: 36 (Ranks 19 in Computing Systems); 2015 Impact Factor: 1.320]. http://dx.doi.org/10.1016/j.jpdc.2016.12.012

78.   Mansoori M, Welch W, Choo K-K R, Maxion R A, and Hashemi S E 2017. Real-world IP and network tracking measurement study of malicious websites with HAZOP. International Journal of Computers and Applications 39(2): 106–121 [2016 Google Scholar H-5 Index: 4; 2015 Impact Factor: 1.270 (Quartile 2; Ranks 68/144)]. http://dx.doi.org/10.1080/1206212X.2017.1283910

79.   Meng W, Li W, Kwok L F and Choo K-K R 2017. Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Computers & Security 65: 213–229 [2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2016.11.010   

80.   Meng W, Li W, Xiang Y and Choo K-K R 2017. A Bayesian Inference-based Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications 78: 162–169 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.11.012

81.   Odelu V, Das A K, Khan M K, Choo K-K R and Jo M 2017. Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keys and Ciphertexts. IEEE Access 5(1): 3273–3283 [2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.270 (Quartile 2; Ranks 68/144)]. https://doi.org/10.1109/ACCESS.2017.2669940

82.   Odelu V, Das A K, Rao Y S, Kumari S, Khan M L and Choo K-K R 2017. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Computer Standards & Interfaces 54(1): 3–9 [2016 Google Scholar H-5 Index: 25; 2015 Impact Factor: 1.268 (Quartile 2; Ranks 18/51)]. http://dx.doi.org/10.1016/j.csi.2016.05.002

83.   Poh G S, Chin J-J, Yau W-C, Choo K-K R and Mohamad M S 2017. Searchable Symmetric Encryption: Designs and Challenges. ACM Computing Surveys 50(3): Article 40 (37 pages) [2016 Google Scholar H-5 Index: 61; 2015 Impact Factor: 5.423 (Quartile 1; Ranks 2/105)]. http://dx.doi.org/10.1145/3064005

84.   Pokharel S, Choo K-K R and Liu J 2017. Can Android VoIP Voice Conversations be Decoded? I can eavesdrop on your Android VoIP communication. Concurrency and Computation: Practice and Experience 29(7): e3845 [2016 Google Scholar H-5 Index: 29; 2015 Impact Factor: 0.942]. http://dx.doi.org/10.1002/cpe.3845

85.   Pokharel S, Choo K-K R and Liu J 2017. Mobile cloud security: An adversary model for lightweight browser security. Computer Standards & Interfaces 49: 71–78 [2016 Google Scholar H-5 Index: 25; 2015 Impact Factor: 1.268 (Quartile 2; Ranks 18/51)]. http://dx.doi.org/10.1016/j.csi.2016.09.002

86.   Quick D and Choo K-K R 2017. Pervasive Social Networking Forensics: Intelligence and Evidence from Mobile Device Extracts. Journal of Network and Computer Applications 86: 24-33 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.11.018

87.   Ren R, Liu R, Lei M and Choo K-K R 2017. SeGoAC: A Tree-based Model for Self-Defined, Proxy-Enabled and Group-Oriented Access Control in Mobile Cloud Computing. Computer Standards & Interfaces 54(1): 29–35 [2016 Google Scholar H-5 Index: 25; 2015 Impact Factor: 1.268 (Quartile 2; Ranks 18/51)]. http://dx.doi.org/10.1016/j.csi.2016.09.001 

88.   Roopaei M, Rad P and Choo K-K R. Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging. IEEE Cloud Computing 4(1): 10–15 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2017.5

89.   Song J, Yang F, Choo K-K R, Zhuang Z and Wang L 2017. SIPF: A Secure Installment Payment Framework for Drive-Thru Internet. ACM Transactions on Embedded Computing Systems 16(2): Article No. 52 [2016 Google Scholar H-5 Index: 23; 2015 Impact Factor: 0.714]. http://dx.doi.org/10.1145/3014584  

90.   Sung N K, Pham N T, Huynh T, Hwang W J, You I and Choo K-K R 2017. Prediction-Based Association Control Scheme in Dense Femtocell Networks. PLOS ONE 12(3): e0174220 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0174220   

91.   Tahaei H, Salleh R, Khan S, Izard R, Choo K-K R, and Anuar N B 2017. A Multi-objective Software Defined Network Traffic Measurement. Measurement 95: 317–327 [2016 Google Scholar H-5 Index: 40; 2015 Impact Factor: 1.742 (Quartile 2; Ranks 22/85)]. http://dx.doi.org/10.1016/j.measurement.2016.10.026

92.   Teing YY, Dehghantanha A, Choo K-K R, Dargahi T and Conti M 2017. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study. Journal of Forensic Sciences 62(3): 641–654 [2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13271

93.   Teing YY, Dehghantanha A, Choo K-K R and Yang L T 2017. Forensic Investigation of P2P Cloud Storage Services and Backbone for IoT Networks: BitTorrent Sync as a Case Study. Computers & Electrical Engineering 58: 350–363 [2016 Google Scholar H-5 Index: 27; 2015 Impact Factor: 1.084]. http://dx.doi.org/10.1016/j.compeleceng.2016.08.020

94.   Wang L, Zhang J, Liu P, Choo K-K R and Huang F 2017. Spectral-spatial multi-feature based deep learning for hyperspectral remote sensing image classification. Soft Computing 21(1): 213 – 221 [2016 Google Scholar H-5 Index: 36; 2015 Impact Factor: 1.630 (Quartile 2; Ranks 56/130)]. http://dx.doi.org/10.1007/s00500-016-2246-3

95.   Wu L, Zhang Y, Choo K-K R, and He D 2017. Efficient and Secure Identity-based Encryption Scheme with Equality Test in Cloud Computing. Future Generation Computer Systems 73: 22–31 [2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2017.03.007

96.   Yang W, Wang G, Bhuiyan M Z A and Choo K-K R 2017. Hypergraph Partitioning for Social Networks Based on Information Entropy Modularity. Journal of Network and Computer Applications 86: 59–71 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.10.002

97.   Yeh K H, Su C, Choo K-K R, and Chiu W 2017. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things. Sensors 17(5) [2016 Google Scholar H-5 Index: 69; 2015 Impact Factor: 1.548 (Quartile 2; Ranks 36/75)]. http://dx.doi.org/10.3390/s17051001

98.   Zhang S, Lin Y, Liu Q, Jiang J, Yin B and Choo K-K R 2017. Secure Hitch in Location Based Social Networks. Computer Communications 100: 65-77 [2016 Google Scholar H-5 Index: 49 (Ranks 16 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.099 (Quartile 1; Ranks 28/143)]. http://dx.doi.org/10.1016/j.comcom.2017.01.011

99.   Ab Rahman N H, Glisson W B, Yang Y and Choo K-K R 2016. Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Computing 3(1): 50–59 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2016.5   

100.                        Abd Warif N B, Wahab A W A, Idris M Y I, Ramli R, Salleh R, Shamshirband A and Choo K-K R 2016. Copy-Move Forgery Detection: Survey, Challenges and Future Directions. Journal of Network and Computer Applications 75: 259–278 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.09.008

101.                        Afifi F, Anuar N B, Shamshirband S and Choo K-K R 2016. DyHAP: Dynamic Hybrid ANFIS-PSO approach for predicting mobile malware. PLOS ONE 11(9): e0162627 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0162627

102.                        Al-Mayouf Y R B, Ismail M, Abdullah N F, Mahdi O A, Khan S and Choo K-K R 2016. An Efficient and Stable Routing Algorithm based on User Mobility and Node Density in Urban Vehicular Network. PLOS ONE 11(11): e0165966 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0165966

103.                        Azfar A, Choo K-K R and Liu L 2016. An Android Communication App Forensic Taxonomy. Journal of Forensic Sciences 61(5): 1337–1350 [2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13164

104.                        Azfar A, Choo K-K R and Liu L 2016. Android mobile VoIP apps: A survey and examination of their security and privacy. Electronic Commerce Research 16(1): 73–111 [2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 1.275]. http://dx.doi.org/10.1007/s10660-015-9208-1

105.                        Bagiwa M A, Wahab A W A, Idris M Y I, Khan S and Choo K-K R 2016. Chroma key background detection for digital video using statistical correlation of blurring artifact. Digital Investigation 19: 29–43 [2016 Google Scholar H-5 Index: 26 (Ranks 6 in Forensic Science); 2015 Impact Factor: 1.211 (Quartile 2; Ranks 68/143)]. http://dx.doi.org/10.1016/j.diin.2016.09.001

106.                        Butler A and Choo K-K R 2016. IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective. Security Journal 29(2): 306–325 [2016 Google Scholar H-5 Index: 14; 2015 Impact Factor: 0.867]. http://dx.doi.org/10.1057/sj.2013.29

107.                        Casola V, Castiglione A, Choo K-K R and Esposito C 2016. Healthcare-Related Data in the Cloud: Challenges and Opportunities. IEEE Cloud Computing 3(6): 10–14 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2016.139   

108.                        Castiglione A, Palmieri F and Choo K-K R 2016. Enhanced Network Support for Federated Cloud Infrastructures. IEEE Cloud Computing 3(3): 16 –23 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2016.59

109.                        Daryabar D, Dehghantanha A, Eterovic-Soric B and Choo K-K R 2016. Forensic Investigation of OneDrive, Box, GoogleDrive and Dropbox Applications on Android and iOS Devices. Australian Journal of Forensic Sciences 48(6): 615–642 [2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2015.1110620

110.                      D'Orazio C and Choo K-K R 2016. An adversary model to evaluate DRM protection of video contents on iOS devices. Computers & Security 56: 94–110 [2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2015.06.009  

111.                      Ding H, Cao L, Ren Y, Choo K-K R and Shi B 2016. Reputation-based Investment Helps to Optimize Group Behaviors in Spatial Lattice Networks. PLOS ONE 11(9): e0162781 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0162781

112.                        Do Q, Martini B and Choo K-K R 2016. A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers. IEEE Transactions on Information Forensics and Security 11(10): 2174–2186 [2016 Google Scholar H-5 Index: 61 (Ranks 2 in Computer Security & Cryptography); 2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2578285

113.                        Esposito C, Castiglione A and Choo K-K R 2016. Encryption-Based Solution for Data Sovereignty in Federated Clouds. IEEE Cloud Computing 3(1):12 –17 [2016 Google Scholar H-5 Index: 9]. http://doi.org/10.1109/MCC.2016.18

114.                        Esposito C, Castiglione A, Martini B and Choo K-K R 2016. Cloud Manufacturing: Security, Privacy and Forensic Concerns. IEEE Cloud Computing 3(4):16 –22 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2016.79

115.                        Ficco M, Esposito C, Chang H and Choo K-K R 2016. Live Migration in Emerging Cloud Paradigms. IEEE Cloud Computing 3(2):12 –19 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2016.48

116.                        Gao Y, Zeng P, Choo K-K R, Song F 2016. An Improved Online/Offline Identity-Based Signature Scheme for WSNs. International Journal of Network Security 18(6): 1143–1151 [2016 Google Scholar H-5 Index: 20]

117.                        Ge M, Choo K-K R, Wu H, Yu Y 2016. Survey on Key Revocation Mechanisms in Wireless Sensor Networks. Journal of Network and Computer Applications 63: 24–38 [2016 Google Scholar H-5 Index: 26 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.01.012

118.                        Guo C, Zhuang R, Jie Y, Ren Y, Wu T and Choo K-K R 2016. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds. Journal of Medical Systems 40(11). Article 235 [2016 Google Scholar H-5 Index: 43 (Ranks 5 in Medical Informatics); 2014 Impact Factor: 2.213 (Quartile 2; Ranks 7/24)]. http://dx.doi.org/10.1007/s10916-016-0588-0

119.                        Hu Y, Yan J and Choo K-K R 2016. PEDAL: A Dynamic Analysis Tool for Efficient Concurrency Bug Reproduction in Big Data Environment. Cluster Computing 19(1): 153–166 [2016 Google Scholar H-5 Index: 20; 2015 Impact Factor: 1.514 (Quartile 2)]. http://dx.doi.org/10.1007/s10586-016-0537-1

120.                        Iqbal S, Kiah M L M, Dhaghighi B, Hussain M, Khan S, Khan M K and Choo K-K R 2016. On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service. Journal of Network and Computer Applications 74: 98–120 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.08.016

121.                        Karim A, Salleh R, Khan M K, Siddiqa A and Choo K-K R 2016. On the Analysis and Detection of Mobile Botnet Applications. Journal of Universal Computer Science 22(4): 567–588 [2016 Google Scholar H-5 Index: 22; 2015 Impact Factor: 0.546]. http://www.jucs.org/jucs_22_4/on_the_analysis_and

122.                        Leom M D, Choo K-K R and Hunt R 2016. Remote wiping and secure deletion on mobile devices: A review. Journal of Forensic Sciences 61(6): 1473–1492 [2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13203

123.                        Li L, Lu R, Choo K-K R, Datta A, Shao J 2016. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases. IEEE Transactions on Information Forensics and Security 11(8): 1847–1861 [2016 Google Scholar H-5 Index: 61 (Ranks 2 in Computer Security & Cryptography); 2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://doi.org/10.1109/TIFS.2016.2561241

124.                        Li B, Lu R, Wang W, Choo K-K R 2016. DDOA: A Dirichlet-based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System. IEEE Transactions on Information Forensics and Security 11(11): 2415–2425 [2016 Google Scholar H-5 Index: 61 (Ranks 2 in Computer Security & Cryptography); 2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2576898

125.                        Liu X, Deng R H, Choo K-K R and Weng J 2016. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys. IEEE Transactions on Information Forensics and Security 11(11): 2401–2414 [2016 Google Scholar H-5 Index: 61 (Ranks 2 in Computer Security & Cryptography); 2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2573770

126.                        Martini B, Do Q and Choo K-K R 2016. Digital forensics in the cloud era: The decline of passwords and the need for legal reform. Trends & Issues in Crime and Criminal Justice 512: 1–16. http://aic.gov.au/media_library/publications/tandi_pdf/tandi512.pdf

127.                        Nam J, Choo K-K R, and Paik J 2016. A Provably-Anonymous Authentication Scheme for Roaming Services. International Journal of Security & Its Applications 10(3): 193–204 [2016 Google Scholar H-5 Index: 15]. http://dx.doi.org/10.14257/ijsia.2016.10.3.18

128.                        Norouzi F, Dehghantanha A, Eterovic-Soric B and Choo K-K R 2016. Investigating Social Networking Applications on Smartphones: Detecting Facebook, Twitter, LinkedIn, and Google+ Artifacts on Android and iOS Platforms. Australian Journal of Forensic Sciences 48(4): 469–488 [2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2015.1066854

129.                        Osanaiye O, Cai H, Choo K-K R, Dehghantanha A, Xu Z and Dlodlo M 2016. Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing. EURASIP Journal on Wireless Communications and Networking 2016. Article 130. [2016 Google Scholar H-5 Index: 33; 2015 Impact Factor: 0.627]. http://dx.doi.org/10.1186/s13638-016-0623-3

130.                        Osanaiye O, Choo K-K R and Dlodlo M 2016. Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework. Journal of Network and Computer Applications 67: 147–165 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.01.001

131.                        Peng J, Choo K-K R, Ashman H 2016. User Profiling in Intrusion Detection: A Review. Journal of Network and Computer Applications 72: 14–27 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.06.012

132.                        Peng J, Choo K-K R, Ashman H 2016. Bit-Level N-Gram Based Forensic Authorship Analysis on Social Media: Identifying Individuals from Linguistic Profiles. Journal of Network and Computer Applications 70: 171–182 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.04.001

133.                        Prokhorenko V, Choo K-K R and Ashman H 2016. Context-oriented Web Application Protection Model. Applied Mathematics and Computation 286: 59–78 [2016 Google Scholar H-5 Index: 57 (Ranks 3 in Computational Mathematics); 2015 Impact Factor: 1.345 (Quartile 1; Ranks 54/254)]. http://dx.doi.org/10.1016/j.amc.2016.03.026 

134.                        Prokhorenko V, Choo K-K R and Ashman H 2016. Intent-based Extensible Real-time PHP Supervision Framework. IEEE Transactions on Information Forensics and Security 11(10): 1847–1861 [2016 Google Scholar H-5 Index: 61 (Ranks 2 in Computer Security & Cryptography); 2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2569063 

135.                        Prokhorenko V, Choo K-K R and Ashman H 2016. Web Application Protection Techniques: A Taxonomy. Journal of Network and Computer Applications 60: 95–112 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2015.11.017  

136.                        Quick D and Choo K-K R 2016. Big Forensic Data Reduction: Digital Forensic Images and Electronic Evidence. Cluster Computing 19(2): 723–740 [2016 Google Scholar H-5 Index: 20; 2015 Impact Factor: 1.514 (Quartile 2)]. http://dx.doi.org/10.1007/s10586-016-0553-1

137.                        Qureshi M A, Md Noor R, Shamim A, Shamshirband S and Choo K-K R 2016. A Lightweight Radio Propagation Model for Vehicular Communication in Road Tunnels. PLOS ONE 11(3): e0152727 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0152727

138.                        Rahman S, Prima A A, Razzaque M A, Hassan M H and Choo K-K R 2016. Internet Data Budget Allocation Policies for Diverse Smartphone Applications. EURASIP Journal on Wireless Communications and Networking [2016 Google Scholar H-5 Index: 33; 2015 Impact Factor: 0.627]. http://dx.doi.org/10.1186/s13638-016-0727-9

139.                        Ren W, Huang S, Ren Y and Choo K-K R 2016. LiPISC: A Lightweight and Flexible Method for Privacy-aware Intersection Set Computation. PLOS ONE 11(6): e0157752 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0157752

140.                        Shariati M, Dehghantanha A and Choo K-K R 2016. SugarSync Forensic Analysis. Australian Journal of Forensic Sciences 48(1): 95–117. [2016 Google Scholar H-5 Index: 12 (Ranks 17 in Forensic Science); 2015 Impact Factor: 0.833]. http://dx.doi.org/10.1080/00450618.2015.1021379

141.                        Wang M, Dai G, Choo K-K R, Jayaraman P P and Ranjan R 2016. LiPISC: Constructing pairing-friendly elliptic curves under embedding degree 1 for Securing Critical Infrastructures. PLOS ONE 11(8): e0161857. [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0161857 .

142.                        Xu Z, Wei X, Liu Y, Mei L, Hu C, Choo K-K R, Zhu Y, Sugumaran V 2016. Building the search pattern of web users using conceptual semantic space model. International Journal of Web and Grid Services 12(3): 328–347. http://dx.doi.org/10.1504/IJWGS.2016.079158

143.                        Xu Z, Zhang H, Hu C, Mei L, Xuan J, Choo K-K R, Sugumaran V and Zhu Y 2016. Building Knowledge Base of Urban Emergency Events based on Crowdsourcing of Social Media. Concurrency and Computation: Practice and Experience 28(15): 4038 – 4052 [2016 Google Scholar H-5 Index: 29; 2015 Impact Factor: 0.942]. http://dx.doi.org/10.1002/cpe.3780

144.                        Xu Z, Zhang H, Sugumaran V, Choo K-K R, Mei L, Xuan J and Zhu Y 2016. Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media. EURASIP Journal on Wireless Communications and Networking 2016. Article 44 [2016 Google Scholar H-5 Index: 33; 2015 Impact Factor: 0.627]. http://dx.doi.org/10.1186/s13638-016-0553-0  

145.                        Yang T Y, Dehghantanha A, Choo K-K R and Muda Z 2016. Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies. PLOS ONE 11(3): e0150300 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://doi.org/10.1371/journal.pone.0150300

146.                        Yang Y, Zhu H, Lu H, Weng J, Zhang Y, and Choo K-K R 2016. Secure Cloud Based Data Sharing with Fine-grained Proxy Re-encryption. Pervasive and Mobile Computing 28: 122–134 [2016 Google Scholar H-5 Index: 34; 2015 Impact Factor: 1.719 (Quartile 2; Ranks 23/81)]. http://dx.doi.org/10.1016/j.pmcj.2015.06.017

147.                        You I, Sharma V, Atiquzzaman M and Choo K-K R 2016. GDTN: Genome-Based Delay Tolerant Network Formation in Heterogeneous 5G Using Inter-UA Collaboration. PLOS ONE 11(12): e0167913 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0167913

148.                        Yuan L, Li M, Guo C, Choo K-K R and Ren Y 2016. Novel Threshold Changeable Secret Sharing Schemes based on Polynomial Interpolation. PLOS ONE (10): e0165512 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0165512

149.                        Zhao L, Chen L, Ranjan R, Choo K-K R and He J 2016. Geographical information system parallelization for spatial big data processing: a review. Cluster Computing 19(1): 139–152 [2016 Google Scholar H-5 Index: 20; 2015 Impact Factor: 1.514 (Quartile 2)]. http://dx.doi.org/10.1007/s10586-015-0512-2

150.                        Ab Rahman N H and Choo K-K R 2015. A survey of information security incident handling in the cloud. Computers & Security 49: 45–69. [2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2014.11.006 

151.                        Amosun P A, Ige O A and Choo K-K R 2015. Impact of a participatory cyber crime prevention programme on secondary school students’ attainment in crime prevention concepts in civic education and social studies. Education and Information Technologies 20(3): Volume 20, Issue 3, pp 505–518 [2016 Google Scholar H-5 Index: 20]. http://dx.doi.org/10.1007/s10639-013-9298-0

152.                        Borgman B, Mubarak D and Choo K-K R 2015. Cyber Security Readiness in the South Australian Government. Computer Standards & Interfaces 37:1–8 [2016 Google Scholar H-5 Index: 25; 2015 Impact Factor: 1.268 (Quartile 2; Ranks 18/51)]. http://dx.doi.org/10.1016/j.csi.2014.06.002

153.                        Chin P Y, Evans N and Choo K-K R 2015. Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms. Journal of Organizational Computing and Electronic Commerce 25(3): 289-315. [2015 Impact Factor: 0.944]. http://dx.doi.org/10.1080/10919392.2015.1058118

154.                        Damshenas M, Dehghantanha A, Choo K-K R and Mahmud R 2015. M0DROID, Android behavioral-based malware detection model. Journal of Information Privacy and Security 11(3): 141–157 [2016 Google Scholar H-5 Index: 6]. http://dx.doi.org/10.1080/15536548.2015.1073510

155.                        Do Q, Martini B and Choo K-K R 2015. Exfiltrating Data from Android Devices. Computers & Security 48: 74–91 [2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2014.10.016

156.                        Do Q, Martini B and Choo K-K R 2015. A Forensically Sound Adversary Model for Mobile Devices. PLOS ONE 10(9): e0138449 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0138449  

157.                        Do Q, Martini B and Choo K-K R 2015.A Cloud-Focused Mobile Forensics Methodology. IEEE Cloud Computing 2(4): 60–65 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2015.71

158.                        Juliadotter N V and Choo K-K R 2015. Cloud Attack and Risk Assessment Taxonomy. IEEE Cloud Computing 2(1): 14–20 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2015.2

159.                        Nam J, Choo K-K R, Kim M, Paik J and Won D 2015. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. PLOS ONE 10(4): e0116709 [2016 Google Scholar H-5 Index: 166 (Ranks 25 in Top Publications – English); 2015 Impact Factor: 3.057 (Quartile 1; Ranks 11/63)]. http://dx.doi.org/10.1371/journal.pone.0116709

160.                        Nam J, Choo K-K R, Han S, Paik J and Won D 2015. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting. Symmetry 7(1): 105–124 [2016 Google Scholar H-5 Index: 16; 2014 Impact Factor: 0.841 (Quartile 2; Ranks 31/63)]. http://dx.doi.org/10.3390/sym7010105 

161.                        Nam J, Choo K-K R, Paik J and Won D 2015. An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98-A(1), pp. 424–427 [2016 Google Scholar H-5 Index: 14; 2015 Impact Factor: 0.236]. http://dx.doi.org /10.1587/transfun.E98.A.424

162.                        Nepal S, Ranjan R and Choo K-K R 2015. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds. IEEE Cloud Computing 2(2):78–84 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2015.36 

163.                        Wang S, Zeng P, Choo K-K R, and Wang H 2015. A CCA2-Secure Multi-Decrypter Encryption Scheme without Random Oracles. Informatica 26(3): 543–556 [2016 Google Scholar H-5 Index: 14; 2015 Impact Factor: 1.386 (Quartile 1; Ranks 47/254)]. http://dx.doi.org/10.15388/Informatica.2015.63 

164.                        Choo K-K R 2014. Mobile cloud storage users. IEEE Cloud Computing 1(3): 20–23 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2014.61

165.                        Choo K-K R 2014. A cloud security risk management strategy. IEEE Cloud Computing 1(2): 52–56 [2016 Google Scholar H-5 Index: 9]. http://dx.doi.org/10.1109/MCC.2014.27

166.                        Choo K-K R 2014. Legal issues in the cloud. IEEE Cloud Computing 1(1): 94–96 [2016 Google Scholar H-5 Index: 9]. http://doi.ieeecomputersociety.org/10.1109/MCC.2014.14

167.                        Choo K-K R 2014. Designated Non-Financial Businesses and Professionals: A Review and Analysis of recent Financial Action Task Force on Money Laundering Mutual Evaluation Reports. Security Journal 27(1): 1–26 [2016 Google Scholar H-5 Index: 14; 2015 Impact Factor: 0.867]. http://dx.doi.org/10.1057/sj.2012.9

168.                        Choo K-K R, Nam J and Won D 2014. A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Information Sciences 281:182–200 [2016 Google Scholar H-5 Index: 81 (Ranks 5 in Engineering & Computer Science (general)); 2015 Impact Factor: 3.364 (Quartile 1; Ranks 8/143)]. http://dx.doi.org/10.1016/j.ins.2014.05.041

169.                        Hillman H, Hooper C and Choo K-K R 2014. Online child exploitation: Challenges and future research directions. Computer Law & Security Review 30(6): 687–698 [2016 Google Scholar H-5 Index: 20 (Ranks 2 in Technology Law); 2015 Impact Factor: 0.373]. http://dx.doi.org/10.1016/j.clsr.2014.09.007 

170.                        Imgraben J, Engelbrecht A and Choo K-K R 2014. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour & Information Technology 33(12): 1347– 1360 [2016 Google Scholar H-5 Index: 30; 2015 Impact Factor: 1.211]. http://dx.doi.org/10.1080/0144929X.2014.934286

171.                        Mani D, Choo K-K R and Mubarak S 2014. Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations. Information Management & Computer Security 22(1): 24–41 [2016 Google Scholar H-5 Index: 14]. http://dx.doi.org/10.1108/IMCS-10-2012-0060

172.                        Martini B and Choo K-K R 2014. Distributed Filesystem Forensics: XtreemFS as a case study. Digital Investigation 11(4): 295–313 [2016 Google Scholar H-5 Index: 26 (Ranks 6 in Forensic Science); 2015 Impact Factor: 1.211 (Quartile 2; Ranks 68/143)]. http://dx.doi.org/10.1016/j.diin.2014.08.002

173.                        Martini B and Choo K-K R 2014. Cloud forensic technical challenges and solutions: A snapshot. IEEE Cloud Computing 1(4): 20–25. http://dx.doi.org/10.1109/MCC.2014.69  

174.                        Nam J, Choo K-K R, Paik J and Won D. Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks. The Scientific World Journal 2014. Article ID 802359, 15 pages, 2014 [2016 Google Scholar H-5 Index: 46; 2013 Impact Factor: 1.219 (Quartile 2; Ranks 16/55)]. http://dx.doi.org/10.1155/2014/802359

175.                        Nam J, Choo K-K R, Park M, Paik J and Won D 2014. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys. The Scientific World Journal Volume 2014. Article ID 479534, 7 pages, 2014 [2016 Google Scholar H-5 Index: 46; 2013 Impact Factor: 1.219 (Quartile 2; Ranks 16/55)]. http://dx.doi.org/10.1155/2014/479534

176.                        Nam J, Choo K-K R, Kim J, Kang H, Kim J, Paik J and Won D 2014. Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model. The Scientific World Journal 2014. Article ID 825072, 11 pages, 2014 [2016 Google Scholar H-5 Index: 46; 2013 Impact Factor: 1.219 (Quartile 2; Ranks 16/55)]. http://dx.doi.org/10.1155/2014/825072    

177.                        Irwin ASM, Slay J, Choo K-K R and Liu L 2014. Money laundering and terrorism financing in virtual environments: A feasibility study. Journal of Money Laundering Control 17(1): 50–75 [2016 Google Scholar H-5 Index: 10]. http://dx.doi.org/10.1108/JMLC-06-2013-0019 

178.                        Quick D and Choo K-K R 2014. Data reduction and data mining framework for digital forensic evidence: Storage, intelligence, review, and archive. Trends & Issues in Crime and Criminal Justice 480: 1–11. http://aic.gov.au/media_library/publications/tandi_pdf/tandi480.pdf

179.                        Quick D and Choo K-K R 2014. Impacts of Increasing Volume of Digital Forensic Data: A Survey and Future Research Challenges. Digital Investigation 11(4): 273–294 [2016 Google Scholar H-5 Index: 26 (Ranks 6 in Forensic Science); 2015 Impact Factor: 1.211 (Quartile 2; Ranks 68/143)]. http://dx.doi.org/10.1016/j.diin.2014.09.002

180.                        Quick D and Choo K-K R 2014. Google Drive: Forensic Analysis of Cloud Storage Data Remnants. Journal of Network and Computer Applications 40: 179–193 [2016 Google Scholar H-5 Index: 56 (Ranks 13 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2013.09.016  

181.                        Wang H, Zeng P, and Choo K-K R 2014. MDMR-IBE: Efficient Multiple Domain Multi-Receiver Identity-Based Encryption. Security and Communication Networks 7(11): 1641 – 1651 [2016 Google Scholar H-5 Index: 21; 2015 Impact Factor: 0.806]. http://dx.doi.org/10.1002/sec.861

182.                        Yang A, Nam J, Kim M and Choo K-K R 2014. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols. The Scientific World Journal 2014, Article ID 825984, 8 pages, 2014 [2016 Google Scholar H-5 Index: 46; 2013 Impact Factor: 1.219 (Quartile 2; Ranks 16/55)]. http://dx.doi.org/10.1155/2014/825984   

183.                        Choo K-K R 2013. New payment methods: A Review of 2010-2012 FATF Mutual Evaluation Reports. Computers & Security 36: 12–26 [2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2013.01.009

184.                        Hooper C, Martini B and Choo K-K R 2013. Cloud computing and its implications for cybercrime investigations in Australia. Computer Law & Security Review 29(2): 152–163 [2016 Google Scholar H-5 Index: 20 (Ranks 2 in Technology Law); 2015 Impact Factor: 0.373]. http://dx.doi.org/10.1016/j.clsr.2013.01.006 

185.                        Irwin ASM, Slay J, Choo K-K R and Liu L 2013. Are the financial transactions conducted inside virtual environments truly anonymous?:  An experimental research from an Australian perspective. Journal of Money Laundering Control 16(1): 6–40 [2016 Google Scholar H-5 Index: 10]. http://dx.doi.org/10.1108/13685201311286832

186.                        Martini B and Choo K-K R 2013. Cloud Storage Forensics: ownCloud as a Case Study. Digital Investigation 10(4): 287–299 [2016 Google Scholar H-5 Index: 26 (Ranks 6 in Forensic Science); 2015 Impact Factor: 1.211 (Quartile 2; Ranks 68/143)]. http://dx.doi.org/10.1016/j.diin.2013.08.005

187.                        Nam J, Choo K-K R, Paik J and Won D 2013. Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols. International Journal of Security and Its Applications 7(2): 47–57 [2016 Google Scholar H-5 Index: 15]. http://www.sersc.org/journals/IJSIA/vol7_no2_2013/4.pdf

188.                        Nam J, Choo K-K R, Kim M, Paik J and Won D 2013. Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols. KSII Transactions on Internet & Information Systems 7(12): 3244–3260 [2016 Google Scholar H-5 Index: 14; 2015 Impact Factor: 0.365]. http://dx.doi.org/10.3837/tiis.2013.12.015

189.                        Quick D and Choo K-K R 2013. Digital Droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems 29(6): 1378–1394 [2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2013.02.001

190.                        Quick D and Choo K-K R 2013. Dropbox Analysis: Data Remnants on User Machines. Digital Investigation 10(1): 3–18 [2016 Google Scholar H-5 Index: 26 (Ranks 6 in Forensic Science); 2015 Impact Factor: 1.211 (Quartile 2; Ranks 68/143)]. http://dx.doi.org/10.1016/j.diin.2013.02.003

191.                        Quick D and Choo K-K R 2013. Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digital Investigation 10(3): 266–277 [2016 Google Scholar H-5 Index: 26 (Ranks 6 in Forensic Science); 2015 Impact Factor: 1.211 (Quartile 2; Ranks 68/143)]. http://dx.doi.org/10.1016/j.diin.2013.07.001

192.                        Tassone C, Martini B, Choo K-K R and Slay J 2013. Mobile device forensics: A snapshot. Trends & Issues in Crime and Criminal Justice no. 460: 1–7. http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi460.pdf

193.                        Martini B and Choo K-K R 2012. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 9(2): 71–80 [2016 Google Scholar H-5 Index: 26 (Ranks 6 in Forensic Science); 2015 Impact Factor: 1.211 (Quartile 2; Ranks 68/143)]. http://dx.doi.org/10.1016/j.diin.2012.07.001

194.                        Irwin ASM, Choo K-K R and Liu L 2012. Modelling of money laundering and terrorism financing typologies. Journal of Money Laundering Control 15(3): 316–335 [2016 Google Scholar H-5 Index: 10]. http://dx.doi.org/10.1108/13685201211238061 

195.                        Irwin ASM, Choo K-K R and Liu L 2012. An analysis of money laundering and terrorism financing typologies. Journal of Money Laundering Control 15(1): 85–111 [2016 Google Scholar H-5 Index: 10]. http://dx.doi.org/10.1108/13685201211194745

196.                        Choo K-K R 2011. The cyber threat landscape: Challenges and future research directions. Computers & Security 30(8): 719–731 [2016 Google Scholar H-5 Index: 32 (Ranks 13 in Computer Security & Cryptography); 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2011.08.004

197.                        Choo K-K R 2011. Cyberthreat landscape faced by financial and insurance industry. Trends & Issues in Crime and Criminal Justice no 408: 1–6. http://www.aic.gov.au/publications/current%20series/tandi/401-420/tandi408.html

198.                        Zeng P, Cao Z and Choo K-K R 2011. An ID-based digital watermarking protocol for copyright protection. Computers & Electrical Engineering 37(4): 526-531 [2016 Google Scholar H-5 Index: 27; 2015 Impact Factor: 1.084 (Quartile 2 – 24/51)]. http://dx.doi.org/10.1016/j.compeleceng.2011.04.014

199.                        Choo K-K R 2010. High tech criminal threats to the national information infrastructure. Information Security Technical Report 15(3): 104–111. http://dx.doi.org/10.1016/j.istr.2009.09.001 

200.                        Choo K-K R 2010. Cloud computing: Challenges and future directions. Trends & Issues in Crime and Criminal Justice no 400: 1–6. http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi400.pdf

201.                        Choo K-K R 2010. Challenges in dealing with politically exposed persons. Trends & Issues in Crime and Criminal Justice no 386: 1–6. http://www.aic.gov.au/publications/current%20series/tandi/381-400/tandi386.html

202.                        Zeng P, Choo K-K R and Sun D-Z 2010. On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks. IEEE Transactions on Consumer Electronics 56(2): 566–569 [2016 Google Scholar H-5 Index: 36; 2014 Impact Factor: 1.120 (Quartile 2; Ranks 40/82)]. http://dx.doi.org/10.1109/TCE.2010.5505971

203.                        Wang S, Cao Z, Cheng Z and Choo K-K R 2009. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science China Information Sciences 52(8): 1358–1370 [2016 Google Scholar H-5 Index: 26; 2015 Impact Factor: 0.885]. http://dx.doi.org/10.1007/s11432-009-0135-4

204.                        Zeng P, Cao Z, Choo K-K R and Wang S 2009. Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Communications Letters 13(6): 426-428 [2016 Google Scholar H-5 Index: 50 (Ranks 3 in Information Theory); 2015 Impact Factor: 1.291 (Quartile 2; Ranks 34/82)]. http://dx.doi.org/10.1109/LCOMM.2009.082215

205.                        Zeng P, Cao Z, Choo K-K R and Wang S 2009. On the Anonymity of Some Authentication Schemes for Wireless Communications. IEEE Communications Letters 13(3): 170-171 [2016 Google Scholar H-5 Index: 50 (Ranks 3 in Information Theory); 2015 Impact Factor: 1.291 (Quartile 2; Ranks 34/82)]. http://dx.doi.org/10.1109/LCOMM.2009.081821

206.                        Wang S, Cao Z, Choo K-K R and Wang L 2009. An Improved Identity-Based Key Agreement Protocol and Its Security Proof. Information Sciences 179(3): 307–318 [2016 Google Scholar H-5 Index: 81 (Ranks 5 in Engineering & Computer Science (general)); 2015 Impact Factor: 3.364 (Quartile 1; Ranks 8/143)]. http://dx.doi.org/10.1016/j.ins.2008.09.020

207.                        Choo K-K R 2009. Responding to online child sexual grooming: an industry perspective. Trends & Issues in Crime and Criminal Justice no 379: 1–6. http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi379.pdf

208.                        Choo K-K R 2009. Money laundering and terrorism financing risks of prepaid cards instruments?. Asian Journal of Criminology 4(1): 11–30 [2016 Google Scholar H-5 Index: 8]. http://dx.doi.org/10.1007/s11417-008-9051-6

209.                        Choo K-K R 2008. Money laundering risks of prepaid stored value cards. Trends & Issues in Crime and Criminal Justice no 363: 1–6. http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi363.pdf

210.                        Choo K-K R 2008. Organised crime groups in cyberspace: a typology. Trends in Organized Crime 11(3): 270 – 295 [2016 Google Scholar H-5 Index: 13]. http://doi.org/10.1007/s12117-008-9038-9

211.                        Choo K-K R and Smith RG 2008. Criminal exploitation of online systems by organised crime groups. Asian Journal of Criminology 3(1): 37–59 [2016 Google Scholar H-5 Index: 8]. http://doi.org/10.1007/s11417-007-9035-y  

212.                        Choo K-K R 2008. Politically exposed persons (PEPs): risk and mitigation. Journal of Money Laundering Control 11(4): 371–387 [2016 Google Scholar H-5 Index: 10]. http://dx.doi.org/10.1108/13685200810910439

213.                        Choo K-K R 2008. Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols. International Journal of Network Security 7(1): 15–24 [2016 Google Scholar H-5 Index: 20]. http://ijns.femto.com.tw/contents/ijns-v7-n1/ijns-2008-v7-n1-p15-23.pdf

214.                        Choo K-K R 2007. An Integrative Framework to Protocol Analysis and Repair: Bellare--Rogaway Model + Planning + Model Checker. Informatica 18(4): 567–568 [2016 Google Scholar H-5 Index: 14; 2015 Impact Factor: 1.386 (Quartile 1; Ranks 47/254)]. http://content.iospress.com/articles/informatica/inf18-4-04

215.                        Choo K-K R 2007. A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal 50(5): 591-601, Oxford University Press [2016 Google Scholar H-5 Index: 26; 2015 Impact Factor: 1.000]. http://dx.doi.org/10.1093/comjnl/bxm019

216.                        Choo K-K R, Smith R G and McCusker R 2007. The future of technology-enabled crime in Australia. Trends & Issues in Crime and Criminal Justice 341: 1–6. http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi341.pdf

217.                        Choo K-K R 2007. Zombies and botnets. Trends & Issues in Crime and Criminal Justice 333: 1–6. http://aic.gov.au/media_library/publications/tandi_pdf/tandi333.pdf

218.                        Choo K-K R 2006. On the Security Analysis of Lee, Hwang, & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. Informatica 17(4): 467-480 [2016 Google Scholar H-5 Index: 14; 2015 Impact Factor: 1.386 (Quartile 1; Ranks 47/254)]. http://content.iospress.com/articles/informatica/inf17-4-01

219.                        Choo K-K R 2006. Issue Report on Business Adoption of Microsoft Passport. Information Management & Computer Security 14(3): 218-234 [2016 Google Scholar H-5 Index: 14]. http://dx.doi.org/10.1108/09685220610670387 

220.                        Choo K-K R, Boyd C and Hitchcock Y 2006. The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Formal Analysis of Jan--Chen, Yang--Shen--Shieh, Kim--Huh--Hwang--Lee, Lin--Sun--Hwang, & Yeh--Sun Protocols. Computer Communications 29(15): 2788-2797 [2016 Google Scholar H-5 Index: 49 (Ranks 16 in Computer Networks & Wireless Communication); 2015 Impact Factor: 2.099 (Quartile 1; Ranks 28/143)]. http://dx.doi.org/10.1016/j.comcom.2005.10.030

221.                        Choo K-K R 2006. On the (In)Security of Lee, Kim, Kim, & Oh (2006) Key Agreement Protocol. International Journal of Network Security 3(1): 85-94 [2016 Google Scholar H-5 Index: 20]. http://ijns.femto.com.tw/contents/ijns-v3-n1/ijns-2006-v3-n1-p85-94.pdf

222.                        Choo K-K R 2006. Revisiting Lee, Kim, & Yoo (2005) Authenticated Key Agreement Protocol. International Journal of Network Security 2(1): 64-68 [2016 Google Scholar H-5 Index: 20]. http://ijns.femto.com.tw/contents/ijns-v2-n1/ijns-2006-v2-n1-p64-68.pdf

223.                        Choo K-K R 2006. Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. International Journal of Network Security 1(3): 154-160 [2016 Google Scholar H-5 Index: 20]. http://ijns.femto.com.tw/contents/ijns-v1-n3/ijns-2005-v1-n3-p154-160.pdf

 

Refereed Conference Papers

1.  Bewong M, Liu J, Liu L, Li J and Choo K-K R 2017. A Relative Privacy Model for Effective Privacy Preservation in Transactional Data. In Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), 1–7 August 2017, IEEE Computer Society Press.

2.  Fardous J, Du T, Choo K-K R and Huang S 2017. Investigating mobile social media users’ behaviors in tourism collaborative information seeking. In Proceedings of ACM SIGIR Conference on Human Information Interaction & Retrieval (CHIIR 2017), Oslo, Norway, pp. 395–397, 7–11 March. http://dx.doi.org/10.1145/3020165.3022167

3.  Fardous J, Du T, Choo K-K R, Huang S and Hansen P 2017. Exploring collaborative information search behavior of mobile social media users in trip planning. In Proceedings of iConference 2017, Wuhan, China, 22–25 March.

4.  Grispos G, Glisson W B and Choo K-K R 2017. Medical Cyber-Physical Systems Development: A Forensics-Driven Approach. In Proceedings of IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE 2017), Philadelphia, Pennsylvania, USA, 17–19 July.

5.  Heravi A, Mani D, Choo K-K R and Mubarak S 2017. Making Decisions about Self-Disclosure in Online Social Networks. In Proceedings of 50th Annual Hawaii International Conference on System Sciences (HICSS 2017), pp. 1922–1931, 4–7 January 2017. http://hdl.handle.net/10125/41387

6.  Jacobs D, Choo K-K R, Le Khac N H 2017. Volkswagen Car Entertainment System Forensics. In Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), 1–7 August 2017, IEEE Computer Society Press.

7.  Liu C Z, Jozani M M and Choo K-K R 2017. The Effect of the Recommendation System in the Mobile App Market. In Proceedings of 23rd Americas Conference on Information Systems (AMCIS 2017), 10–12 August 2017, Association for Information Systems.

8.  Pan B, Zeng P and Choo K-K R 2017. An Efficient Privacy-Preserving Aggregation Scheme for Smart Grids with High Practicability. In Proceedings of International Conference on Emerging Internetworking, Data and Web Technologies (EIDWT 2017) , Wuhan, China, 10–11 June.

9.  Saini S, Grispos G, Liu C Z and Choo K-K R 2017. Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications. In Proceedings of 23rd Americas Conference on Information Systems (AMCIS 2017), 10–12 August 2017, Association for Information Systems.

10.   van der Meer W, Choo K-K R, Le Khac N H 2017 and Kechadi M T. Investigation and Automating Extraction of Thumbnails Produced by Image viewers. In Proceedings of 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), 1–7 August 2017, IEEE Computer Society Press.

11.   Alcaraz C, Lopez and Choo K-K R 2016. Dynamic Restoration in Interconnected RBAC-based Cyber-Physical Control Systems. In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, pp. 19–27, 26 – 28 July 2016. http://dx.doi.org/10.5220/0005942000190027

12.   Azfar A, Choo K-K R and Liu L 2016. An Android Social App Forensics Adversary Model. In Proceedings of 49th Annual Hawaii International Conference on System Sciences (HICSS 2016), pp. 5597–5606, 5–8 January 2016, IEEE Computer Society Press.  http://dx.doi.org/10.1109/HICSS.2016.693

13.   Bao Q, Hou M and Choo K-K R 2016. A One-Pass Identity-Based Authentication and Key Agreement Protocol for Wireless Roaming. In Proceedings of International Conference on Information Science and Technology (ICIST 2016), 6 – 8 May 2016, IEEE Press. http://dx.doi.org/10.1109/ICIST.2016.7483455

14.   Bhuiyanyz M K A, Wang G and Choo K-K R 2016. Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System. In Proceedings of 18th IEEE International Conference on High Performance Computing and Communications (HPCC 2016), pp. 1226–1231, 12–14 December, Sydney, Australia, IEEE Press. https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0171

15.   Cahyani N D W, Ab Rahman N H, Xu Z and Choo K-K R 2016. The role of mobile forensics in terrorism investigations involving the use of cloud apps. In Proceedings of the 9th International Conference on Mobile Multimedia Communications (MOBIMEDIA 2016), pp. 199–204, Xi'an, China, 18-19 June, ACM International Conference Proceeding Series. http://dx.doi.org/10.4108/eai.18-6-2016.2264416

16.   Cahyani N D W, Martini B and Choo K-K R 2016. Do Multimedia Presentations Enhance Judiciary's Technical Understanding of Digital Forensic Concepts? An Indonesian Case Study. In Proceedings of 49th Annual Hawaii International Conference on System Sciences (HICSS 2016), pp. 5617–5626, 5–8 January 2016, IEEE Computer Society Press. http://dx.doi.org/10.1109/HICSS.2016.695

17.   Carman M and Choo K-K R 2016. Tinder me softly – How safe are you really on Tinder?. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer-Verlag.

18.   Chen S, Zhen P and Choo K-K R 2016. A provably secure blind signature based on coding theory. In Proceedings of IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016), pp. 376–382, 13 – 16 July 2016, IEEE Computer Society Press. https://doi.org/10.1109/ICPADS.2016.0058

19.   Chen S, Zhen P, Wang Q and Choo K-K R 2016. An efficient ring signature scheme based on syndrome decoding problem. In Proceedings of 2016 International Conference on Computational Intelligence and Security (CIS 2016), pp. 228–232, 16 – 19 December 2016, IEEE Computer Society Press. https://doi.org/10.1109/CIS.2016.0060

20.   Esposito C, Castiglione A, Palmieri F, Ficco M and Choo K-K R 2016. A publish/subscribe protocol for event-driven communications in the Internet of Things. In Proceedings of 14th IEEE International Conference on Dependable Autonomic and Secure Computing (DASC 2016), pp. 376–383, 8 – 12 August 2016, IEEE Computer Society Press. http://dx.doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.79  

21.   Li X, Niu J and Choo K-K R 2016. A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks. In Proceedings of Proceedings of 12th Workshop on RFID and IoT Security – RFIDSec 2016, City University of Hong Kong, Hong Kong, Lecture Notes in Computer Science, Springer-Verlag, 30 November–2 December.

22.   Lin C, Zhu F, Wu W, Liang K and Choo K-K R 2016. A New Transitive Signature Scheme. In Proceedings of International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, Volume 9955/2016 of Lecture Notes in Computer Science (pp. 156–167), Springer-Verlag, 28–30 September. http://dx.doi.org/10.1007/978-3-319-46298-1_11

23.   Ma J, Choo K-K R, Hsu H, Jin Q, Liu W, Wang K, Wang Y and Zhou X 2016. Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds. In Proceedings of 14th IEEE International Conference on Dependable Autonomic and Secure Computing (DASC 2016), pp. 1–9, 8 – 12 August 2016, IEEE Computer Society Press. http://dx.doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.17    

24.   Mansoori M, Welch I, Choo K-K R and Maxion R A 2016. Application of HAZOP to the Design of Cyber Security Experiments. In Proceedings of 30th IEEE International Conference on. Advanced Information Networking and Applications (AINA 2016), pp. 790–799, 23–25 March 2016, IEEE Computer Society Press. http://dx.doi.org/10.1109/AINA.2016.115 

25.   Mansoori M, Welch I, Hirose Y and Choo K-K R 2016. Empirical Analysis of Impact of HTTP Referer upon Malicious Website Behaviour and Delivery. In Proceedings of 30th IEEE International Conference on. Advanced Information Networking and Applications (AINA 2016), pp. 941–948, 23–25 March 2016, IEEE Computer Society Press. http://dx.doi.org/10.1109/AINA.2016.113

26.   Manzano L G, De Fuentes J M Choo K-K R 2016. ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer-Verlag.

27.   Mink D, Yasinsac A, Glisson W B and Choo K-K R 2016. Next Generation Aircraft Architecture and Digital Forensic. In Proceedings of 22nd Americas Conference on Information Systems (AMCIS 2016), 11–16 August 2016, Association for Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1288&context=amcis2016 

28.   Naeem U, Amjad A, Zaffar A, Zaffar F and Choo K-K R 2016. Improving security awareness in the government sector. In Proceedings of 17th Annual International Conference on Digital Government Research (dg.o 2016), 8–10 June 2016, ACM. http://dx.doi.org/10.1145/2912160.2912186

29.   Osanaiye O, Choo K-K R and Dlodlo M 2016. Analysing Feature Selection and Classification Techniques for DDoS Detection in Cloud. In Proceedings of Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2016), pp. 198–203, 3–7 September 2016. http://www.satnac.org.za/proceedings/2016/SATNAC%202016%20Proceedings%20Final.pdf

30.   Osanaiye O, Choo K-K R and Dlodlo M 2016. Change-Point Cloud DDoS Detection Using Packet Inter-Arrival Time. In Proceedings of IEEE Computer Science & Electronic Engineering Conference (IEEE CEEC 2016), pp. 204–200, 28–30 September 2016 [In press] https://doi.org/10.1109/CEEC.2016.7835914

31.   Peng J, Choo K-K R, Ashman H 2016. Astroturfing detection in social media: Using binary n-gram analysis for authorship attribution. In Proceedings of 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), pp. 121–128, 23–26 August 2016, IEEE Computer Society Press. https://doi.org/10.1109/TrustCom.2016.0054

32.   Teing YY, Dehghantanha A, Choo K-K R, Muda Z, Abdullah M T, Chai W C. A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts. In Proceedings of 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016), Zhangjiajie, China, Volume 10067/2016 of Lecture Notes in Computer Science (pp. 342–357), Springer-Verlag, 16-18 November. http://dx.doi.org/10.1007/978-3-319-49145-5_34

33.   Yang X, Jiang H, Xu Q, Hou M, Wei X, Zhao M and Choo K-K R 2016. A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. In Proceedings of 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), pp. 670–677, 23–26 August 2016, IEEE Computer Society Press. https://doi.org/10.1109/TrustCom.2016.0124

34.   Yang Y, Cai H, Wei Z, Lu H and Choo K-K R 2016. Towards Lightweight Anonymous Entity Authentication for IoT Applications. In Proceedings of 21st Australasian Conference on Information Security and Privacy (ACISP 2016), Melbourne, Australia, Volume 9722/2016 of Lecture Notes in Computer Science (pp. 265–280), Springer-Verlag, 4–6 July. http://dx.doi.org/10.1007/978-3-319-40253-6_16

35.   Yu Y, Li Y, Au M H, Susilo W, Choo K-K R and Zhang X 2016. Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. In Proceedings of 21st Australasian Conference on Information Security and Privacy (ACISP 2016), Melbourne, Australia, Volume 9722/2016 of Lecture Notes in Computer Science (pp. 385–405), Springer-Verlag, 4–6 July. http://dx.doi.org/10.1007/978-3-319-40253-6_24   

36.   Ab Rahman N H and Choo K-K R 2015. Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia. In Proceedings of 21st Americas Conference on Information Systems (AMCIS 2015), 13–15 August 2015, Association for Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1431&context=amcis2015

37.   Aburumman A and Choo K-K R 2015. A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network. In Proceedings of 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014), Volume 153/2015 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (pp. 267–281), Springer-Verlag. http://doi.org/10.1007/978-3-319-23802-9_21

38.   Aburumman A, Seo W J, Islam R, Khan M K and Choo K-K R 2015. A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network using Dynamic Clustering. In Proceedings of 11th International Conference on Security and Privacy in Communication Networks (SecureComm 2015), Volume 164/2016 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (pp. 649–664), Springer-Verlag. http://doi.org/10.1007/978-3-319-28865-9_43

39.   Aburumman A, Seo W J, Yang A, Choo K-K R and Almomani I M. A Distributed Session Initiation Protocol Solution for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. In Proceedings of 21st International Congress on Modelling and Simulation (MODSIM 2015), Queensland, Australia, 29 November – Friday 4 December 2015, pp. 648–654. http://www.mssanz.org.au/modsim2015/C5/aburumman.pdf 

40.   Azfar A, Choo K-K R and Liu L 2015. Forensic Taxonomy of Popular Android mHealth Apps. In Proceedings of 21st Americas Conference on Information Systems (AMCIS 2015), 13–15 August 2015, Association for Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1217&context=amcis2015

41.   Cahyani N D W, Martini B and Choo K-K R 2015. Using Multimedia Presentation to Improve Digital Forensic Understanding: A Pilot Study. In Proceedings of 26th Australasian Conference on Information Systems (ACIS 2015), 30 November – 4 December 2015

42.   Chin C P-Y, Evans N and Choo K-K R 2015. Enterprise Social Networks: A Successful Implementation within a Telecommunication Company. In Proceedings of 21st Americas Conference on Information Systems (AMCIS 2015), 13–15 August 2015, Association for Information Systems.  http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1273&context=amcis2015/

43.   Chin C P-Y, Evans N, Choo K-K R and Tan F B 2015. What influences employees to use enterprise social networks? A socio-technical perspective. In Proceedings of 19th Pacific Asia Conference on Information Systems (PACIS 2015), 5–9 July 2015. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1202&context=pacis2015

44.   D’Orazio C and Choo KKR 2015. A generic process to identify vulnerabilities and design weaknesses in iOS healthcare apps. In Proceedings of 48th Annual Hawaii International Conference on System Sciences (HICSS 2015), pp. 5175–5184, 5–8 January 2015, IEEE Computer Society Press. http://dx.doi.org/10.1109/HICSS.2015.611

45.   Farnden J, Martini B and Choo K-K R 2015. Privacy Risks in Mobile Dating Apps. In Proceedings of 21st Americas Conference on Information Systems (AMCIS 2015), 13–15 August 2015, Association for Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1427&context=amcis2015

46.   Heravi A, Mubarak S and Choo K-K R 2015. Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective. In Proceedings of 26th Australasian Conference on Information Systems (ACIS 2015), 30 November – 4 December 2015

47.   Immanuel F, Martini B and Choo KKR 2015. Android cache taxonomy and forensic process. In Proceedings of 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015), pp. 1094–1101, 20–22 August 2015, IEEE Computer Society Press. http://dx.doi.org/10.1109/Trustcom-BigDataSe-ISPA.2015.488

48.   Lai S, Liu J K, Choo KKR and Kaitai Liang 2015. Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. In Proceedings of 2015 International Conference on Information and Communications Security (ICICS 2015) , Beijing, China, Volume 9543/2016 of Lecture Notes in Computer Science (pp. 467–477), Springer-Verlag, 9–11 September. http://doi.org/10.1007/978-3-319-29814-6_40

49.   Leom M D, D'Orazio C, Deegan G and Choo KKR 2015. Forensic Collection and Analysis of Thumbnails in Android. In Proceedings of 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015), pp. 1059–1066, 20–22 August 2015, IEEE Computer Society Press. http://dx.doi.org/10.1109/Trustcom-BigDataSe-ISPA.2015.483

50.   Mani D, Heravi A, Choo KKR and Mubarak S 2015. Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. In Proceedings of Australasian Information Security Conference (ACSW-AISC 2015), pp. 53–56,  Sydney, New South Wales, Volume 161 of the ACS Conferences in Research and Practice in Information Technology (CRPIT) series, Australian Computer Society, 27 – 30 January. http://crpit.com/confpapers/CRPITV161Mani.pdf

51.   Mani D, Heravi A, Mubarak S and Choo K-K R 2015. Employees’ Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective. In Proceedings of 21st Americas Conference on Information Systems (AMCIS 2015), 13–15 August 2015, Association for Information Systems. http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1443&context=amcis2015

52.   Tep K S, Martini B, Hunt R and Choo KKR 2015. A Taxonomy of Cloud Attack Consequences and Mitigation Strategies. In Proceedings of 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015), pp. 1075–1080, 20–22 August 2015, IEEE Computer Society Press. http://dx.doi.org/10.1109/Trustcom-BigDataSe-ISPA.2015.485

53.   Walls J and Choo KKR 2015. A Review of Free Cloud-Based Anti-Malware Apps for Android. In Proceedings of 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2015), pp. 1053–1058, 20–22 August 2015, IEEE Computer Society Press. http://dx.doi.org/10.1109/Trustcom-BigDataSe-ISPA.2015.482

54.   Yang Y, Liu J, Liang A, Choo KKR and Zhou J 2015. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption. In Proceedings of 20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria, Volume 9327/2015 of Lecture Notes in Computer Science (pp. 146 - 166), Springer-Verlag, 21–25 September [Best Research Paper Award]. http://dx.doi.org/10.1007/978-3-319-24177-7_8

55.   Yang Y, Lu J, Choo KKR and Liu J 2015. On Lightweight Security Enforcement in Cyber-physical Systems. In Proceedings of International Workshop on Lightweight Cryptography for Security & Privacy (LightSec 2015), Bochum, Germany, Volume 9542/2016 of Lecture Notes in Computer Science (pp. 97–112), Springer-Verlag. http://doi.org/10.1007/978-3-319-29078-2_6 

56.   Azfar A, Choo K-K R and Liu L 2014. A study of ten popular Android mobile VoIP applications: Are the communications encrypted?. In Proceedings of 47th Annual Hawaii International Conference on System Sciences (HICSS 2014), pp. 4858–4867, 6–9 January 2014, IEEE Computer Society Press. http://dx.doi.org/10.1109/HICSS.2014.596

57.   Do Q, Martini B and Choo K-K R 2014. Enforcing File System Permissions on Android External Storage. In Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), pp. 949–954, 24–26 September 2014, IEEE Computer Society Press. http://dx.doi.org/10.1109/TrustCom.2014.53

58.   Do Q, Martini B and Choo K-K R 2014. Enhancing User Privacy on Android Mobile Devices via Permissions Removal. In Proceedings of 47th Annual Hawaii International Conference on System Sciences (HICSS 2014), pp. 5070–5079, 6–9 January 2014, IEEE Computer Society Press. http://dx.doi.org/10.1109/HICSS.2014.623

59.   Do Q, Martini B, Looi J M J, Wang Y and Choo K-K R 2014. Windows Event Forensic Process. In Proceedings of IFIP WG 11.9 International Conference on Digital Forensics, Vienna University of Technology, Vienna, Austria, Volume 433/2014 of IFIP Advances in Information and Communication Technology (pp. 87–100), Springer-Verlag, 8 – 10 January. http://dx.doi.org/10.1007/978-3-662-44952-3_7

60.   D’Orazio C, Ariffin A and Choo K-K R 2014. iOS anti-forensics: How can we securely conceal, delete and insert data?. In Proceedings of 47th Annual Hawaii International Conference on System Sciences (HICSS 2014), pp. 4838–4847, 6–9 January 2014, IEEE Computer Society Press. http://dx.doi.org/10.1109/HICSS.2014.594

61.   Gao Y, Zeng P and Choo K-K R 2014. Multi-Sender Broadcast Authentication in Wireless Sensor Networks. In Proceedings of International Conference on Computational Intelligence and Security (CIS 2014), pp. 633–637, Kunming, China, 15–16 November 2014, IEEE Computer Society Press. http://doi.org/10.1109/CIS.2014.147 

62.   Ge M and Choo K-K R 2014. A novel hybrid key revocation scheme for wireless sensor networks. In Proceedings of 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, Volume 8792/2014 of Lecture Notes in Computer Science (pp. 462–475), Springer-Verlag, 15–17 October. http://dx.doi.org/10.1007/978-3-319-11698-3_35

63.   Jones D and Choo K-K R 2014. Should there be a new body of law for cyber space?. In Proceedings of 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9–11 June. http://aisel.aisnet.org/ecis2014/proceedings/track11/4  

64.   Mani D, Mubarak S and Choo K-K R 2014. Selection of information security controls based on AHP and GRA. In Proceedings of International Workshop of Information Technology and Internet Finance, 25 June 2014, Association for Information Systems. 

65.   Mani D, Mubarak S and Choo K-K R 2014. Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model. In Proceedings of 20th Americas Conference on Information Systems (AMCIS 2014), 7–10 August 2014, Association for Information Systems. http://aisel.aisnet.org/amcis2014/ISSecurity/GeneralPresentations/1

66.   Martini B and Choo K-K R 2014. Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. In Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), pp. 935–942, 24–26 September 2014, IEEE Computer Society Press. http://dx.doi.org/10.1109/TrustCom.2014.124

67.   Martini B and Choo K-K R 2014. Building the next generation of cyber security professionals. In Proceedings of 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9–11 June. http://aisel.aisnet.org/ecis2014/proceedings/track14/3

68.   O'Malley S and Choo K-K R 2014. Bridging the Air Gap: Inaudible Data Exfiltration by Insiders. In Proceedings of 20th Americas Conference on Information Systems (AMCIS 2014), 7–10 August 2014, Association for Information Systems. http://aisel.aisnet.org/amcis2014/ISSecurity/GeneralPresentations/12

69.   Quick D, Tassone C and Choo K-K R 2014. Forensic Analysis of Windows Thumbcache files. In Proceedings of 20th Americas Conference on Information Systems (AMCIS 2014), 7–10 August 2014, Association for Information Systems. http://aisel.aisnet.org/amcis2014/ISSecurity/GeneralPresentations/13  

70.   Aburumman A, Choo K-K R and Lee I 2013. Nomination-based session initiation protocol service for mobile ad hoc networks. In Gaertner, P., Bowden, F., Piantadosi, J. and Mobbs, K. (eds), Proceedings of 22nd National Conference of the Australian Society for Operations Research (ASOR 2013). The Australian Society for Operations Research, Adelaide, South Australia, 1–6 December. http://www.asor.org.au/conferences/asor2013/J5/aburumman.pdf

71.   Alwadiyeh ES, Aburumman A and Choo K-K R 2013. Interference-aware multipath routing protocols for mobile ad hoc networks. In Gaertner, P., Bowden, F., Piantadosi, J. and Mobbs, K. (eds), Proceedings of 22nd National Conference of the Australian Society for Operations Research (ASOR 2013). The Australian Society for Operations Research, Adelaide, pp. 156–162, 1–6 December. http://www.asor.org.au/conferences/asor2013/J5/alwadiyeh.pdf

72.   Ariffin A, D'Orazio C, Choo K-K R and Slay J 2013. iOS Forensics: How can we recover deleted image files with timestamp in a forensically sound manner?. In Proceedings of International Conference on Availability, Reliability and Security (ARES 2013) (pp. 375–382), University of Regensburg, Germany, 2–6 September. http://dx.doi.org/10.1109/ARES.2013.50

73.   Ariffin A, Choo K-K R and Slay J 2013. Digital Camcorder Forensics. In Proceedings of Australasian Information Security Conference (ACSW-AISC 2013), Adelaide, South Australia, Volume 138 of the ACS Conferences in Research and Practice in Information Technology (CRPIT) series (pp. 39–47), Australian Computer Society, 29 January – 1 February. http://crpit.com/confpapers/CRPITV138Ariffin.pdf

74.   Ariffin A, Slay J and Choo K-K 2013. Data recovery from proprietary formatted CCTV hard disks. In Proceedings of IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, Volume 410/2013 of IFIP Advances in Information and Communication Technology, Springer-Verlag (pp. 213–223), 28–30 January. http://dx.doi.org/10.1007/978-3-642-41148-9_15

75.   Teo JCM and Choo K-K R 2010. Security Improvements to Anonymous ID-based Group Key Agreement for Wireless Network. In Proceedings of 7th International Conference on Information Technology: New Generations (ITNG 2010) (pp. 732 - 737), Las Vegas, Nevada, USA, IEEE Computer Society/CPS (IEEE Conference Publishing Services), 12–14 April. http://doi.ieeecomputersociety.org/10.1109/ITNG.2010.115

76.   Phan R C-W, Choo K-K R and Heng S-W 2007. Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. In Proceedings of International Conference on Provable Security (ProvSec 2007), Wollongong, Australia. Vol. 4784/2007 of Lecture Notes in Computer Science (pp. 169-177), Springer-Verlag, 1–2 November. http://dx.doi.org/10.1007/978-3-540-75670-5_11

77.   Chow SSM and Choo K-K R 2007. Strongly-Secure Identity-based Key Agreement and Anonymous Extension. In Proceedings of 10th International Conference on Information Security 2007 - ISC 2007, Valparaiso, Chile, Volume 4779/2007 of Lecture Notes in Computer Science (pp. 203 - 220), Springer-Verlag, 9–12 October. http://dx.doi.org/10.1007/978-3-540-75496-1_14

78.   Lee B, Choo K-K R, Yang J and Yoo S 2007. Secret Signatures: How to Achieve Business Privacy Efficiently?. In Proceedings of 8th International Workshop on Information Security Applications - WISA 2007, Jeju Island, Korea, Lecture Notes in Computer Science (pp. 30–47), Springer-Verlag, 27–29 August. http://dx.doi.org/10.1007/978-3-540-77535-5_3

79.   Choo K-K R 2006. Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. In Proceedings of 19th IEEE Computer Security Foundations Workshop – CSFW 2006, (pp. 297–308), Venice, Italy, IEEE Computer Society Press, 5–7 July. http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.26

80.   Boyd C, Choo K-K R and Mathuria A 2006. An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. In Proceedings of 11th Australasian Conference on Information Security and Privacy - ACISP 2006 , Melbourne, Australia, Volume 4058/2006 of Lecture Notes in Computer Science (pp. 371–382), Springer-Verlag, 3–5 July. http://dx.doi.org/10.1007/11780656_31

81.   Tang Q and Choo K-K R 2006. Secure Password-based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. In Proceedings of 4th International Conference on Applied Cryptography and Network Security - ACNS 2006 , Singapore, Volume 3989/2006 of Lecture Notes in Computer Science (pp. 162–177), Springer-Verlag, 6–9 June. http://dx.doi.org/10.1007/11767480_11

82.   Ring J, Choo K-K R, Foo E and Looi M 2006. A New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography. In Proceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCERT2006): Refereed R&D Stream (pp. 57–72), Gold Coast, Australia, University of Queensland Publication, 21–26 May. http://eprints.qut.edu.au/4422/

83.   Du R, Foo E, Boyd C and Choo K-K R 2006. Formal Analysis of Secure Contracting Protocol for E-Tendering. In Proceedings of Australasian Information Security Workshop (AISW 2006), Hobart, Australia, Volume 54 - ACSW Frontiers 2004 of the ACS Conferences in Research and Practice in Information Technology (CRPIT) series (pp. 155–164), Australian Computer Society, 16–19 January. http://crpit.com/confpapers/CRPITV54Du.pdf

84.   Choo K-K R, Boyd C and Hitchcock Y 2005. Errors in Computational Complexity Proofs for Protocols. In Proceedings of Advances in Cryptology – Asiacrypt 2005, Chennai, India, Volume 3788/2005 of Lecture Notes in Computer Science (pp. 624–643), Springer-Verlag, 4– 8 December [2016 Google Scholar H-5 Index: 36 (Ranks 11 in Computer Security & Cryptography)]. http://dx.doi.org/10.1007/11593447_34 

85.   Choo K-K R, Boyd C and Hitchcock Y 2005. Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. In Proceedings of Advances in Cryptology – Asiacrypt 2005, Chennai, India, Volume 3788/2005 of Lecture Notes in Computer Science (pp. 585–604), Springer-Verlag, 4–8 December [2016 Google Scholar H-5 Index: 36 (Ranks 11 in Computer Security & Cryptography)]. http://dx.doi.org/10.1007/11593447_32

86.   Boyd C and Choo K-K R 2005. Security of Two-Party Identity-Based Key Agreement. In Proceedings of International Conference on Cryptology in Malaysia - Mycrypt 2005, Kuala Lumpur, Malaysia, Volume 3715/2005 of Lecture Notes in Computer Science (pp. 229–243), Springer-Verlag, 28 September – 01 October. http://dx.doi.org/10.1007/11554868_17 

87.   Choo K-K R, Boyd C and Hitchcock Y 2005. On Session Key Construction in Provably-Secure Key Establishment Protocols. In Proceedings of International Conference on Cryptology in Malaysia – Mycrypt 2005, Kuala Lumpur, Malaysia, Volume 3715/2005 of Lecture Notes in Computer Science (pp. 116–131), Springer-Verlag, 28 September – 01 October. http://dx.doi.org/10.1007/11554868_9 

88.   Choo K-K R and Hitchcock Y 2005. Security Requirements for Key Establishment Proof Models: Revisiting Bellare--Rogaway and Jeong--Katz--Lee Protocols. In Proceedings of 10th Australasian Conference on Information Security and Privacy - ACISP 2005, Brisbane, Australia, Volume 3574/2005 of Lecture Notes in Computer Science (pp. 429 – 442) , Springer-Verlag, 04 – 06 July [Received the Best Student Paper Award]. http://dx.doi.org/10.1007/11506157_36.

89.   Au R, Choo K-K R and Looi M 2005. A Secure Anonymous Authorisation Architecture for E-commerce. In Proceedings of IEEE International Conference on e-Technology, e-Commerce and e-Service - EEE 2005, Hong Kong, China, (pp. 106–111), IEEE Computer Society Press, 29 March – 1 April. http://doi.ieeecomputersociety.org/10.1109/EEE.2005.16

90.   Au R, Vasanta H, Choo K-K R and Looi M 2005. A User-Centric Anonymous Authorisation Framework in E-commerce Environment. In Proceedings of International Conference on Electronic Commerce 2004, Delft, The Netherlands, (pp. 138–147), ACM Press, 25–27 October. http://doi.acm.org/10.1145/1052220.1052238

91.   Choo K-K R, Boyd C, Hitchcock Y and Maitland G 2004. On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. In Proceedings of Conference on Security in Communication Networks - SCN 2004, Amalfi, Italy, Volume 3352/2005 of Lecture Notes in Computer Science (pp. 352–367), Springer-Verlag, 8–10 September. http://dx.doi.org/10.1007/978-3-540-30598-9_25

92.    Choo K-K R, Boyd C, Hitchcock Y and Maitland G 2004. Complementing Computational Protocol Analysis with Formal Specifications. In Proceedings of IFIP TC1 WG1.7 2nd International Workshop on Formal Aspects in Security and Trust – FAST 2004, Toulouse, France, Volume 173/2005 of IFIP International Federation for Information Processing Series, Springer-Verlag (pp. 129–144) , 26–27 August. http://dx.doi.org/10.1007/0-387-24098-5_10

 

Parliamentary Submissions

1.  Rizzi S, Arnold-Moore T, Choo K-K R, McCullagh A and Cornick K 2012. [Confidential Submission] Protecting Privacy, Property, and the National Security in Cyberspace in Australia. Submission to the Parliamentary Joint Committee on Intelligence and Security Inquiry into potential reforms of National Security Legislation.

2.  Australian Computer Society 2012. Response to The Department of the Prime Minister and Cabinet’s Discussion Paper “Connecting with Confidence”. Sydney, NSW: Australian Computer Society 

3.  Procter N, Gale P, Choo K-K R and Patil T 2012. Public Submission: National Anti-Racism Partnership and Strategy. SA, Australia: Human Rights and Security Cluster, University of South Australia

4.  Australian Institute of Criminology 2010. Submission to the Joint Select Committee on Cyber-Safety. Canberra: Australian Institute of Criminology

5.  Australian Institute of Criminology 2010. Submission to the Senate Standing Committee On Legal And Constitutional Affairs Inquiry into the Crimes Legislation Amendment (Sexual Offences Against Children) Bill 2010 (Cth). Canberra: Australian Institute of Criminology

6.  Australian Institute of Criminology 2009. Submission to the House of Representatives Communications Committee’s Inquiry into Cyber Crime. Canberra: Australian Institute of Criminology   

 

Industry Publications

1.  Irwin ASM and Choo K-K R 2014. The future of technology in customer identification & relationship risk. Whitepaper, Thomson Reuters Accelus, pp. 1–13

2.  Choo K-K R 2013. Kaspersky Lab’s “Cyber Security for the Next Generation: Asia-Pacific & MEA Round 2013” Conference: Post-Conference Report. Asia Pacific Security Magazine Issue 48: 4–5

3.  Quick D and Choo K-K R 2013. Cloud Storage Forensics. Asia Pacific Security Magazine Issue 47: 30–31

4.  Choo K-K R 2012. International public-private-research partnerships required to secure our cyber space. Asia Pacific Security Magazine October: 36–39

5.  Choo K-K R 2012. New partnerships required. SC Magazine (US), August issue: 50

6.  Choo K-K R 2011. Cybercrime: The new front line. Security Solutions December/January issue: 79–82

7.  Choo K-K R 2011. Asia-Pacific Regional Workshop on Fighting Cybercrime. Australian Security Magazine October-November Issue: 56–57

8.  Choo K-K R 2011. Cyber threats & the financial industry: a snapshot. e-Finance & Payments Law & Policy 5(5): 9–11, May

 

Non-refereed publications – Guest Editorial

  1. Choo K-K R, Abawajy J and Islam R 2017. Special issue on cyber security in the critical infrastructure: Advances and future directions. Journal of Computer and System 83(1): 1–2. http://dx.doi.org/10.1016/j.jcss.2016.09.001 
  2. Choo K-K R, Fei Y, Xiang Y and Yu Y 2017. Embedded Device Forensics and Security. ACM Transactions on Embedded Computing Systems 16(2): Article no 50. https://doi.org/10.1145/3015662     
  3. Choo K-K R, Kermani M M, Azarderakhsh R and Govindarasu M 2017. Emerging Embedded and Cyber Physical System Security Challenges and Innovations. IEEE Transactions on Dependable and Secure Computing 14(3): 235–236. https://doi.org/10.1109/TDSC.2017.2664183
  4. Xu Z, Liu Y, Choo K-K R and Yen N Y 2017. Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems. Wireless Personal Communications. Wireless Personal Communications. http://dx.doi.org/10.1007/s11277-017-4278-0
  5. Zhang Z and Choo K-K R 2017. Guest Editorial: Multimedia Social Network Security and Applications. Multimedia Tools and Applications 76(3): 3163–3168. http://dx.doi.org/10.1007/s11042-016-4081-z
  6. Bertino E, Choo K-K R, Georgakopoulos D and Nepal S 2016. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Transactions on Internet Technology 16(4): Article no 22. https://doi.org/10.1145/3013520
  7. Choo K-K R, Domingo-Ferrer J and Zhang L 2016. Cloud Cryptography: Theory, Practice and Future Research Directions. Future Generation Computer Systems 62: 51–53. http://dx.doi.org/10.1016/j.future.2016.04.017
  8. Choo K-K R, Herman M, Iorga M and Martini B 2016. Cloud Forensics: State-of-the-Art and Future Directions. Digital Investigation, 18: 77–78. http://dx.doi.org/10.1016/j.diin.2016.08.003
  9. Choo K-K R, Rokach L and Bettini C 2016. Mobile security and privacy: Advances, challenges and future research directions. Pervasive and Mobile Computing 31: 1–2. http://dx.doi.org/10.1016/j.pmcj.2016.10.003
  10. Lin X, Choo K-K R, Lin Y D and Mueller P 2016. Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Network 30(6): 4–5.  http://dx.doi.org/10.1109/MNET.2016.7764272
  11. Choo K-K R and Sarre R 2015. Guest Editors’ Introduction: Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Computing 2(4): 8–13. http://dx.doi.org/10.1109/MCC.2015.84

 

Non-refereed publications – Government / Confidential Reports

  1. Choo K-K R and Slay J 2016 Cloud Authentication and Forensics. Monograph 69, ACT, Australia: National Drug Law Enforcement Research Fund. http://www.ndlerf.gov.au/sites/default/files/publication-documents/monographs/monograph-69.pdf  
  2. Choo K-K R, Hartel P, Joshi A, Karam C, Ng W K, Oberoi M, Pronk P, Schlickmann S, Ulkuniemi K and Vacani M 2015. INTERPOL cyber research agenda workshop report. Singapore: INTERPOL Global Complex for Innovation
  3. Choo K-K R and Slay J 2013. Exploitation of electronic evidence from mobile devices. Report prepared for National Drug Law Enforcement Research Fund, Adelaide: University of South Australia
Comments