Browse By Person: Radke, Kenneth

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 16.

Journal Article

Schmidt, Desmond, Radke, Kenneth, Camtepe, Seyit, Foo, Ernest, & Ren, Michal (2016) A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Computing Surveys, 48(4), Article No. 64.

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Bartlett, Harry (2015) CHURNs : freshness assurance for humans. The Computer Journal, 58(10), pp. 2404-2425.
Number of full-text downloads 24

Conference Paper

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2016) DNP3 network scanning and reconnaissance for critical infrastructure. In Australasian Information Security Conference (ACSW-AISC), 2-5 February 2016, Canberra, A.C.T.
Number of full-text downloads 27

Parry, Jack, Hunter, Daniel, Radke, Kenneth, & Fidge, Colin J. (2016) A network forensics tool for precise data packet capture and replay in cyber-physical systems. In Australasian Computer Science Week Multiconference (ACSC2016), 2-5 February 2016, Canberra, A.C.T.
Number of full-text downloads 34

Snow, Stephen, McMahon, Bronte, McKenzie, Sally, Radke, Kenneth, Verlaat, Ivy, & Buys, Laurie (2015) Designing for collections : Building histories, sharing the spectacle. In Carter, M., Gibbs, M.J., Smith, W.B., Vetere, F., & Ploderer, B. (Eds.) Proceedings of the 27th Australian Computer-Human Interaction Conference (OzCHI 2015), Association for Computing Machinery (ACM), Melbourne, Australia, pp. 299-303.
Number of full-text downloads 4

Rodofile, Nicholas, Radke, Kenneth, & Foo, Ernest (2015) Real-time and interactive attacks on DNP3 critical infrastructure using Scapy. In Welch, Ian & Yi, Xun (Eds.) Australasian Information Security Conference (ACSW-AISC), 27-30 January 2015, Sydney, NSW.
Number of full-text downloads 76

Myers, David, Foo, Ernest, & Radke, Kenneth (2015) Internet-wide scanning taxonomy and framework. In Welch, Ian & Yi, Xun (Eds.) Proceedings of Australasian Information Security Conference (ACSW-AISC), 27-30 January 2015, Australian Computer Society, Inc, Sydney, NSW.
Number of full-text downloads 110

Snow, Stephen, Radke, Kenneth, Vyas, Dhaval, & Brereton, Margot (2014) Privacy in the new era of visible and sharable energy-use information. In Proceedings of OZCHI 2014 Designing Futures: The Future of Design, ACM (The Association for Computing Machinery), University of Technology, Sydney, Australia, pp. 342-351.
Number of full-text downloads 83

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, Manulis, Mark, & Stebila, Douglas (2014) Formalising human recognition : a fundamental building block for security proofs. In Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society Inc. , Auckland, New Zealand, pp. 37-45.
Number of full-text downloads 25

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan, & Buys, Laurie (2013) “Who decides?” Security and privacy in the wild. In Calder, Paul & Shen, Haifeng (Eds.) Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration (OzCHI '13), Assocation for Computing Machinery (ACM), Flinders University, Adelaide, Australia, pp. 27-36.
Number of full-text downloads 78
Number of citations in Scopus 1

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2012) Towards a secure human-and-computer mutual authentication protocol. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc, Melbourne, Vic., pp. 39-46.
Number of full-text downloads 140

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi , Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 395

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 162
Number of citations in Scopus 4
Number of citations in Web of Science® 4

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 89
Number of citations in Scopus 1

Ghelawat, Sunil, Radke, Kenneth, & Brereton, Margot (2010) Interaction, privacy and profiling considerations in local mobile social software : a prototype agile ride share system. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland, pp. 376-379.
Number of full-text downloads 170

QUT Thesis

Radke, Kenneth J. (2013) Security ceremonies : including humans in cryptographic protocols. PhD thesis, Queensland University of Technology.
Number of full-text downloads 233

This list was generated on Sat May 28 12:17:18 2016 AEST.