Component modeling for SCADA network mapping

Ayodeji James Akande , Colin Fidge , Ernest Foo ,
Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015) [Conferences in Research and Practice in Information Technology, Volume 159] 91 -100

2
2015
Using Coloured Petri Nets to Simulate DoS-resistant Protocols

Suratose Tritilanunt , Ernest Foo , Juan Gonzalez Nieto , Colin Boyd
7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools

9
2006
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.

Suratose Tritilanunt , Colin Boyd , Ernest Foo , Juan Manuel González Nieto
ACSC 191 -200

2007
A New Security Architecture for Protecting the Dynamic Component of Mobile Agents

Ernest Foo , Matthew Henricksen , Minna Yao , Edward Dawson
intelligent agents web technologies and internet commerce

2004
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets

Younes Seifi , Ernest Foo , Suriadi Suriadi , Colin Boyd
information security conference 47 -58

2
2012
Typology of phishing email victims based on their behavioural response

Ibrahim Mohammed Alseadoon , Ernest Foo , Taizan Chan , Mohd Fairuz Iskandar Othman
Science & Engineering Faculty

1
2013
IT governance adoption in Malaysia : a preliminary investigation

Ernest Foo , Taizan Chan , Mohd Fairuz Iskandar Othman
Proceedings of the 22nd Australasian Conference on Information Systems (ACIS) 2011 - Identifying the Information Systems Discipline

3
2011
Electronic Contract Administration - Legal and Security Issues Research Report

Edward P Dawson , Sharon A Christensen , Ernest Foo , Praveen S Gauravaram

2007
Smart Grid Test Bed Design and Implementation

Nishchal Kush , Andrew J Clark , Ernest Foo ,
Faculty of Science and Technology; Information Security Institute

7
2010
Barriers to information technology governance adoption : a preliminary empirical investigation

Ernest Foo , Gregory T. Timbrell , Karen J. Nelson , Taizan Chan
Knowledge Management and Innovation - A Business Competitive Edge Perspective: Proceedings of the 15th International Business Information Management Association Conference

53
2011
Using re-encryption to escrow private information escrow bound to multiple conditions

Ernest Foo , Suriadi Suriadi , Jason Smith
Information Security Institute

2009
1
2011
Private information escrow bound to multiple conditions

Ernest Foo , Suriadi Suriadi , Jason Smith

3
2008
Layered identity infrastructure model for identity meta systems

Ernest Foo , Suriadi Suriadi , Rong Du
information security conference 83 -92

1
2008
Secure data aggregation in wireless sensor network: a survey

Hani Alzaid , Ernest Foo , Juan Gonzalez Nieto
information security conference 93 -105

113
2008
eTendering - Security and Legal Issues

Edward Dawson , Sharon A. Christensen , Bill Duncan , Ernest Foo
CRC Construction Innovation; Faculty of Built Environment and Engineering; Faculty of Law; Faculty of Science and Technology; Information Security Institute; Science & Engineering Faculty

10
2006
Electronic Contract Administration – Legal and Security Issues Literature Review

Audun Josang , Praveen S. Gauravaram , Ernest Foo , Judith McNamara
CRC Construction Innovation; Faculty of Law; Faculty of Science and Technology; Information Security Institute

2006
Secure communication protocol for preserving E-tendering integrity

Rong Du , Ernest Foo , Colin Boyd , Brian F Fitzgerald
Fifth Asia-Pacific Industrial Engineering and Management Systems Conference 1

9
2004
Cost-based and time-based analysis of DoS-resistance in HIP

Suratose Tritilanunt , Colin Boyd , Ernest Foo , Juan Gonzalez Nieto
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62 191 -200

4
2007
An Implementation of the Yao Forward Integrity Protocol for Mobile Agents

Ernest Foo , Matthew Henricksen , Minna Yao
Cryptographic Algorithms and Their Uses 110 -124

2004