Browse By Person: Radke, Kenneth

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 19.

Journal Article

Schmidt, Desmond, Radke, Kenneth, Camtepe, Seyit, Foo, Ernest, & Ren, Michal (2016) A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Computing Surveys, 48(4), Article No. 64.

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Bartlett, Harry (2015) CHURNs : freshness assurance for humans. The Computer Journal, 58(10), pp. 2404-2425.
Number of full-text downloads 30
Number of citations in Web of Science® 1

Conference Paper

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2017) Framework for SCADA cyber-attack dataset creation. In Australasian Computer Science Week Multiconference (ACSW'17), 30 January - 3 February 2017, Geelong, Vic. (Unpublished)

Myers, David, Radke, Kenneth, Suriadi, Suriadi, & Foo, Ernest (2017) Process discovery for industrial control system cyber attack detection. In IFIP Information Security & Privacy Conference 2017, 29-31 May 2017, Rome.
Number of full-text downloads 36

Rahman, Anisur, Xu, Yue, Radke, Kenneth, & Foo, Ernest (2016) Finding anomalies in SCADA logs using rare sequential pattern mining. In 10th International Conference on Network and System Security (NSS 2016), 28-30 September 2016, Taipei, Taiwan.
Number of full-text downloads 5

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2016) DNP3 network scanning and reconnaissance for critical infrastructure. In Australasian Information Security Conference (ACSW-AISC), 2-5 February 2016, Canberra, A.C.T.
Number of full-text downloads 75
Number of citations in Scopus 1

Parry, Jack, Hunter, Daniel, Radke, Kenneth, & Fidge, Colin J. (2016) A network forensics tool for precise data packet capture and replay in cyber-physical systems. In Australasian Computer Science Week Multiconference (ACSC2016), 2-5 February 2016, Canberra, A.C.T.
Number of full-text downloads 97

Snow, Stephen, McMahon, Bronte, McKenzie, Sally, Radke, Kenneth, Verlaat, Ivy, & Buys, Laurie (2015) Designing for collections : Building histories, sharing the spectacle. In Carter, M., Gibbs, M.J., Smith, W.B., Vetere, F., & Ploderer, B. (Eds.) Proceedings of the 27th Australian Computer-Human Interaction Conference (OzCHI 2015), Association for Computing Machinery (ACM), Melbourne, Australia, pp. 299-303.
Number of full-text downloads 10
Number of citations in Scopus 2

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2015) Real-time and interactive attacks on DNP3 critical infrastructure using Scapy. In Welch, Ian & Yi, Xun (Eds.) Australasian Information Security Conference (ACSW-AISC), 27-30 January 2015, Sydney, NSW.
Number of full-text downloads 460
Number of citations in Scopus 1

Myers, David, Foo, Ernest, & Radke, Kenneth (2015) Internet-wide scanning taxonomy and framework. In Welch, Ian & Yi, Xun (Eds.) Proceedings of Australasian Information Security Conference (ACSW-AISC), 27-30 January 2015, Australian Computer Society, Inc, Sydney, NSW.
Number of full-text downloads 172

Snow, Stephen, Radke, Kenneth, Vyas, Dhaval, & Brereton, Margot (2014) Privacy in the new era of visible and sharable energy-use information. In Proceedings of OZCHI 2014 Designing Futures: The Future of Design, ACM (The Association for Computing Machinery), University of Technology, Sydney, Australia, pp. 342-351.
Number of full-text downloads 97

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, Manulis, Mark, & Stebila, Douglas (2014) Formalising human recognition : a fundamental building block for security proofs. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society Inc. , Auckland, New Zealand, pp. 37-45.
Number of full-text downloads 29
Number of citations in Scopus 1

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Buys, Laurie (2013) “Who decides?” Security and privacy in the wild. In Calder, Paul & Shen, Haifeng (Eds.) Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration (OzCHI '13), Assocation for Computing Machinery (ACM), Flinders University, Adelaide, Australia, pp. 27-36.
Number of full-text downloads 89
Number of citations in Scopus 1

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2012) Towards a secure human-and-computer mutual authentication protocol. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc, Melbourne, Vic., pp. 39-46.
Number of full-text downloads 155
Number of citations in Scopus 2

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi, Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 416
Number of citations in Scopus 1

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 180
Number of citations in Scopus 5
Number of citations in Web of Science® 5

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 94
Number of citations in Scopus 2

Ghelawat, Sunil, Radke, Kenneth, & Brereton, Margot (2010) Interaction, privacy and profiling considerations in local mobile social software : a prototype agile ride share system. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland, pp. 376-379.
Number of full-text downloads 184
Number of citations in Scopus 4

QUT Thesis

Radke, Kenneth J. (2013) Security ceremonies : including humans in cryptographic protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 256

This list was generated on Thu Apr 27 20:06:33 2017 AEST.