Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DISTRIBUTED COMPUTING (080500) > Networking and Communications (080503)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors/Creators | Item Type
Jump to: A | B | C | D | E | F | G | I | J | L | M | P | R | S | T | W | Y | Z
Number of items at this level: 75.

A

Ahmed, Ejaz, Clark, Andrew J., & Mohay, George M. (2008) A novel sliding window based change detection algorithm for asymmetric traffic. In IFIP International Conference on Network and Parallel Computing, 18-19 October 2008, Shanghai, China.
Number of full-text downloads 492
Number of citations in Scopus 10
Number of citations in Web of Science® 4

Amoah, Raphael, Camtepe, Seyit, & Foo, Ernest (2016) Formal modelling and analysis of DNP3 secure authentication. Journal of Network and Computer Applications, 59, pp. 345-360.
Number of citations in Scopus 1

Ansari, Keyvan, Feng, Yanming, & Tang, Maolin (2015) A runtime integrity monitoring framework for real-time relative positioning systems based on GPS and DSRC. IEEE Transactions on Intelligent Transportation Systems, 16(2), pp. 980-992.
Number of full-text downloads 85
Number of citations in Scopus 1
Number of citations in Web of Science® 1

B

Ben Harush, Orit Rivka (2010) Out of touch? On the lack of emotional support over the mobile phone. Media Asia, 37(4).

Bruns, Axel (2010) New Media and Public Communication: Mapping Australian User-Created Content in Online Social Networks. In Making Connections: Innovations in Research, 10th February 2010, QUT. (Unpublished)

Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.

Bye, Rainer, Luther, Katja, Camtepe, Seyit A., Alpcan, Tansu, Albayrak, Sahin, & Yener, Bulent (2007) Decentralized detector generation in cooperative intrusion detection system. Lecture Notes in Computer Science : Stabilization, Safety, and Security of Distributed Systems, 4838, pp. 37-51.
Number of citations in Scopus 1

C

Caelli, William, Liu, Vicky, & Longley, Dennis (2013) Background to the development of a curriculum for the history of cyber and communications security. In Dodge Jr., R.C. & Futcher, L. (Eds.) Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8 Proceedings [IFIP Advances in Information and Communication Technology, Volume 406], Springer, Auckland, New Zealand, pp. 39-47.
Number of full-text downloads 163

Camtepe, S. A., Yener, B., & Yung, Moti (2006) Expander graph based key distribution mechanisms in wireless sensor networks. In Proceedings of IEEE International Conference on Communications, IEEE Conference Publications , Istanbul Turkey, 2262 -2267.
Number of citations in Scopus 15
Number of citations in Web of Science® 3

Camtepe, Seyit, Tian, Yu-Chu, Jayalath, Dhammika, & Pieprzyk, Josef (2016) Combinatorial Design of Secure Lightweight Data Dispersal Schemes (Work in Progress). (Unpublished)
Number of full-text downloads 12

Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.
Number of full-text downloads 162

Camtepe, Seyit A. & Yener, Bulent (2008) Key Management in Wireless Sensor Networks. In Lopez , Javier & Zhou, Jianying (Eds.) Wireless Sensor Network Security. IOS Press, pp. 110-141.

Caron, David, Stauffer, Beth, Darjany, Lindsay, Oberg, Carl, Pereira, Arvind, Das, Jnaneshwar, et al. (2009) Networked aquatic microbial observing systems: An overview. In Center for Embedded Networked Sensing Annual Research Review,, May 12, 2009, University of California (Los Angeles) [UCLA].
Number of full-text downloads 52

Chen, Xiaoqin, Jayalath, Dhammika, Munasinghe, Gayan, & Ziri-Castro, Karla I. (2011) Analysis of multiple shared channel cooperative routing in OFDM based wireless networks. In Proceedings of IET International Communication Conference on Wireless Mobile & Computing, Institution of Engineering Technology (IET), Blue Palace Hotel, Shanghai, pp. 175-180.

Chen, Yen-Lin, Tian, Guosong, Gao, Jing, & Tian, Yu-Chu (2014) Cross-layer design for traffic management in wireless networked control systems. In Proceedings of the 9th IEEE Conference on Industrial Electronics and Applications (ICIEA 2014), IEEE, Hangzhou, China, pp. 187-192.
Number of full-text downloads 48

Cheung, W.L., Fung, Y.F., & Ho, T.K. (2001) Mobile communication in power distribution application. In 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233), Victoria, British Columbia, pp. 639-642.
Number of full-text downloads 272
Number of citations in Scopus 1

Chin, Yiyong & Jayalath, Dhammika (2012) On the diversity analysis of the sequential slotted amplify-decode-and-forward protocol. In Proceedings of 2012 International Symposium on Communications and Information Technologies (ISCIT), Surfers Paradise, Qld.
Number of full-text downloads 48

Chin, Yiyong, Jayalath, Dhammika, & Senadji, Bouchra (2012) Slotted distributed space-time coding. In Proceedings of Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on, IEEE, Sydney, N.S.W, pp. 783-788.
Number of full-text downloads 42
Number of citations in Scopus 1

Chin, Yiyong, Widanagamage, Anushka, & Jayalath, Dhammika (2012) Sequential slotted amplify-and-forward with partial relay isolation. In On the Proceedings of IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), IEEE, Sydney, Australia, pp. 1377-1382.
Number of full-text downloads 60
Number of citations in Scopus 1

Chin, Yiyong, Widanagamage, Anushka, & Jayalath, Dhammika (2013) Sequential slotted amplify-decode-and-forward. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, Shanghai, Chaina, pp. 2699-2704.
Number of full-text downloads 59
Number of citations in Scopus 1

Choi, Jaz Hee-jeong, Foth, Marcus, Lawson, Shaun, & Hirsch, Tad (2011) Food(ing): between human-computer and human-food-experience. In 5th International Conference on Communities & Technologies (C&T 2011), 29 June - 2 July 2011, State Library of Queensland, Brisbane, QLD.
Number of full-text downloads 117

Choi, Jaz Hee-jeong & Seeburger, Jan (2011) Sapporo World Window : urban interaction through public and private screens. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 25 March 2011, Seattle.
Number of full-text downloads 303
Number of citations in Scopus 5

Cradduck, Lucy, Caelli, Bill, & McCullagh, Adrian (2008) Synopolies: The use of cryptographic technologies to impede competition in multiple jurisdictions. Forum on Public Policy Online, Spring, pp. 1-43.

D

Davis, Jonathan J. & Foo, Ernest (2016) Automated feature engineering for HTTP tunnel detection. Computers & Security, 59, pp. 166-185.

Djamaludin, Chris, Foo, Ernest, Camtepe, Seyit A., & Corke, Peter (2016) Revocation and update of trust in autonomous delay tolerant networks. Computers & Security, 60, pp. 15-36.

E

Edirippulige, Sisira, Martin-Khan, Melinda, Beattie, Elizabeth, Smith, Anthony, & Gray, Leonard (2013) A systematic review of telemedicine services for residents in long term care facilities. Journal of Telemedicine and Telecare, 19(3), pp. 127-132.
Number of citations in Scopus 5
Number of citations in Web of Science® 3

F

Fan, Qingfeng, Zeitouni, Karine, Xiong, Naixue, Wu, Qiongli, Camtepe, Seyit, & Tian, Yu-Chu (2016) Nash equilibrium based semantic cache in mobile sensor grid database systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems. (In Press)

G

Gesche, Astrid (2008) Adapting to virtual third space language learning futures. In Veiga Marriott, R & Torres, P (Eds.) Handbook of Research on E-Learning Methodologies for Language Acquisition. Information Science Reference (IGI Global), United States of America, Pennsylvania, Hershey, pp. 524-538.

Goh, Vik Tor, Zimmermann, Jacob, & Looi, Mark (2010) Experimenting with an intrusion detection system for encrypted networks. International Journal of Business Intelligence and Data Mining, 5(2), pp. 172-191.
Number of full-text downloads 529
Number of citations in Scopus 9

Gui, Li & Tian, Yu-Chu (2011) A conditional retransmission enabled transport protocol for real-time networked control systems. In Pfeifer, Tom, Jayasumana, Anura, & Aschenbruck, Nils (Eds.) Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN 2011), IEEE , Hilton Hotel, Bonn, pp. 235-238.
Number of full-text downloads 81
Number of citations in Scopus 1
Number of citations in Web of Science® 1

I

Igoe, Kevin & Stebila, Douglas (2011) X.509v3 Certificates for Secure Shell authentication. Internet Engineering Task Force.
Number of full-text downloads 201

Ingram, David M.E., Campbell, Duncan A., Schaub, Pascal, & Ledwich, Gerard (2011) Test and evaluation system for multi-protocol sampled value protection schemes. In Proceedings of IEEE PES Trondheim PowerTech 2011, IEEE, Norwegian University of Science and Technology (NTNU), Trondheim, Norway.
Number of full-text downloads 361

Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2012) Performance analysis of IEC 61850 sampled value process bus networks. IEEE Transactions on Industrial Informatics, 9(3), pp. 1445-1454.
Number of full-text downloads 956
Number of citations in Scopus 16
Number of citations in Web of Science® 10

Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2013) System level tests of transformer differential protection using an IEC 61850 process bus. IEEE Transactions on Power Delivery, 29(3), pp. 1382-1389.
Number of full-text downloads 306

Ingram, David M.E., Steinhauser, Fred, Marinescu, Cristian, Taylor, Richard R., Schaub, Pascal, & Campbell, Duncan A. (2012) Direct evaluation of IEC 61850-9-2 process bus network performance. IEEE Transactions on Smart Grid, 3(4), pp. 1853-1854.
Number of full-text downloads 400
Number of citations in Scopus 13
Number of citations in Web of Science® 8

J

Jurdak, Raja, Corke, Peter, Dharman, Dhinesh, & Salagnac, Guillaume (2010) Adaptive GPS duty cycling and radio ranging for energy-efficient localization. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems - SenSys '10, Association for Computing Machinery (ACM), ETH Zurich, Zurich, pp. 57-73.
Number of full-text downloads 433
Number of citations in Scopus 13

L

Lau, Andy, Mason, Richard, Pham, Binh, Richards, Mark, Roe, Paul, & Zhang, Jinglan (2008) Monitoring the environment through acoustics using smartphone-based sensors and 3G networking. In Langendoen, K (Ed.) Proceedings of the Second International Workshop on Wireless Sensor Network Deployments (WiDeploy08); 4th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2008, 11-14 June 2008, Greece, Santorini Island.

Liu, Vicky, Tesfamicael, Aklilu Daniel, Caelli, William, & Sahama, Tony R. (2015) Network security and performance testing for health information system management. In 17th International Conference on E-health Networking, Application & Services (HealthCom2015), 14-17 October 2015, Boston, Mass.
Number of full-text downloads 34

Long, Y.H., Ho, T.K., & Rad, A.B. (2000) Fair flow control of ABR service by per-VC virtual queuing. Computer Communications, 23(1), p. 71.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Long, Y.H., Ho, T.K., & Rad, A.B. (2000) Weighted fairness with MCR guarantee and a general-purpose explicit rate allocation algorithm for ATM ABR service. Computer Communications, 23(13), pp. 1235-1251.
Number of citations in Scopus 1

Long, Y.H., Ho, T.K., & Rad, A.B. (2001) An enhanced explicit rate algorithm for ABR traffic control in ATM networks. International Journal of Communication Systems, 14(10), pp. 909-923.
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Long, Y.H., Ho, T.K., Rad, A.B., & Lam, S.P.S. (1999) A ?GIi/D/1/? queue with heterogeneous input/output slot times. Computer Communications, 22(12), pp. 1136-1149.

Long, Y.H., Ho, T.K., Rad, A.B., & Lam, S.P.S. (1999) A study of the generalised maxmin fair rate allocation for ABR control in ATM. Computer Communications, 22(13), pp. 1247-1259.
Number of citations in Web of Science® 8

Long, Yihong & Ho, T.K. (2000) Efficient algorithm for achieving GWPMM fairness in ATM ABR services. Electronics Letters, 36(8), p. 772.

M

Mathew, Avin D., Purser, Michael, Ma, Lin, & Barlow, Matthew (2010) Open standards-based system integration for asset management decision support. In Kiritsis, Dimitris, Emmanouilidis, Christos, Koronios, Andy, & Mathew, Joseph (Eds.) Proceedings of the Fourth World Congress on Engineering Asset Management (WCEAM) 2009, Springer-Verlag London Limited, Athens, Greece, pp. 221-229.
Number of full-text downloads 1,175

Mohd Yusoh, Zeratul Izzah & Tang, Maolin (2012) Composite SaaS placement and resource optimization in Cloud computing using evolutionary algorithms. In Proceeding of the 2012 IEEE International Conference on Cloud Computing, IEEE Computer Society, Hyatt Regency Waikiki Resort and Spa, Honolulu, Hawaii, pp. 590-597.
Number of full-text downloads 338
Number of citations in Scopus 10

P

Pereira, Arvind, Das, Jnaneshwar, Heidarsson, Hordur, Smith, Ryan N., Stauffer, Beth, Seubert, Erica, et al. (2009) Networked robotic sensor platform deployments for use in coastal environmental assessment in southern California. In Posters for the Center for Embedded Network Sensing, 5 Dec., 2009, University of California Los Angeles, Los Angeles, CA.
Number of full-text downloads 145

Pradittasnee, Lapas, Tian, Yu-Chu, & Jayalath, Dhammika (2012) Efficient route update and maintenance processes for multipath routing in large-scale industrial wireless sensor networks. In 2012 IEEE Australasian Telecommunication Networks and Applications Conference (ATNAC'2012), 7-9 November 2012, Traders Hotel , Brisbane, QLD.
Number of full-text downloads 65

R

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 299
Number of citations in Scopus 5

Ring, Jared W., Foo, Ernest, & Looi, Mark (2007) On ensuring continuity of mobile communications in a disaster environment. In Research Network for a Secure Australia : Security Technology Conference, The Research Network for a Secure Australia (RNSA), Melbourne, pp. 268-278.
Number of full-text downloads 178

S

Schmidt, Desmond, Radke, Kenneth, Camtepe, Seyit, Foo, Ernest, & Ren, Michal (2016) A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Computing Surveys, 48(4). (In Press)

Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Number of citations in Scopus 10
Number of citations in Web of Science® 2

Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2012) Context-aware multicast protocol for emergency message dissemination in vehicular networks. International Journal of Vehicular Technology, 2012.
Number of full-text downloads 86
Number of citations in Scopus 1

Sebastian, Alvin, Tang, Maolin, Feng, Yanming, & Looi, Mark (2010) A multicast routing scheme for efficient safety message dissemination in VANET. In Proceedings of 2010 IEEE Wireless Communications and Networking Conference, IEEE eXpress Conference Publishing, Sydney.
Number of full-text downloads 417
Number of citations in Scopus 4

Shi, Xiaohan, Tian, Guosong, & Tian, Yu-Chu (2012) A reliable real-time transport protocol for control systems over wireless networks. In 2012 IEEE Australasian Telecommunication Networks and Applications Conference (ATNAC'2012), 7-9 November 2012, Traders Hotel , Brisbane, QLD.
Number of full-text downloads 71

Smith, Ryan N. , Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Caron, David A., Jones, Burton H., et al. (2009) Implementation of an embedded sensor network for the coordination of Slocum gliders for coastal monitoring and observation. In WUWNet 09 : Proceedings of the 4th ACM International Workshop on UnderWater Networks, ACM, Bechtel Engineering Center, Berkeley, California, pp. 1-8.
Number of full-text downloads 88

Smith, Ryan N. , Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Cetinic, Ivona, Darjany, Lindsay, et al. (2010) USC CINAPS Builds bridges : observing and monitoring the southern california bight. IEEE Robotics and Automation Magazine, 17(1), pp. 20-30.
Number of full-text downloads 181
Number of citations in Scopus 36
Number of citations in Web of Science® 14

Smith, Ryan N. , Stauffer, Beth, Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Chao, Yi, et al. (2009) Design and implementation of sensor networks for the observation and research of harmful algal blooms in southern California coastal waters. In Proceedings of the 2009 Conference on Coastal Environmental Sensing Networks, Boston Park Plaza & University of Massachusetts, Boston, MA.
Number of full-text downloads 89

Stebila, Douglas & Green, Jon (2009) Elliptic curve algorithm integration in the secure shell transport layer. Internet Engineering Task Force.
Number of full-text downloads 103

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 327
Number of citations in Scopus 8
Number of citations in Web of Science® 3

Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 625
Number of citations in Scopus 4

Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Number of full-text downloads 142
Number of citations in Scopus 1

T

Tang, Maolin (2012) Evolutionary placement of continuously operating reference stations of network Real-Time Kinematic. In Proceeding if the 2012 IEEE World Congress on Computational Intelligence, IEEE Computer Society Press, International Convention Centre, Brisbane, QLD, pp. 1461-1468.
Number of full-text downloads 110

Tang, Maolin (2009) Gateways placement in backbone wireless mesh networks. International Journal of Communications, Network and System Sciences, 2(1), pp. 44-50.

Tang, Maolin (2009) QoS-aware reference station placement for regional network RTK. Journal of Software Engineering and Applications, 2(1), pp. 44-49.

Tang, Maolin & Pan, Shenchen (2015) A hybrid genetic algorithm for the energy-efficient virtual machine placement problem in data centers. Neural Processing Letters, 41(2), pp. 211-221.
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Tian, Guosong, Camtepe, Seyit, & Tian, Yu-Chu (2016) A deadline-constrained 802.11 MAC Protocol with QoS differentiation for soft real-time control. IEEE Transactions on Industrial Informatics, 12(2), pp. 544-554.
Number of full-text downloads 1

Tian, Guosong, Fidge, Colin J., & Tian, Yu-Chu (2009) Hybrid system simulation of computer control applications over communication networks. In Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, 21-23 September 2009, Imperial College, London.
Number of full-text downloads 380

Tian, Guosong & Tian, Yu-Chu (2012) Modelling and performance evaluation of the IEEE 802.11 DCF for real-time control. Computer Networks, 56(1), pp. 435-447.
Number of full-text downloads 216
Number of citations in Scopus 11
Number of citations in Web of Science® 9

Tian, Guosong & Tian, Yu-Chu (2013) QoS differentiation in IEEE 802.11 wireless local area networks for real-time control. In Bertogna, Marko (Ed.) Work-in-Progress Proceedings, RTAS13 19th Real-Time and Embedded Technology and Applications Symposium, RTAS WiP Committee, Philadephia, PA, pp. 33-36.
Number of full-text downloads 109

Tian, Guosong, Tian, Yu-Chu, & Fidge, Colin (2014) Precise relative clock synchronization for distributed control using TSC registers. Journal of Network and Computer Applications, 44, pp. 63-71.

Tian, Guosong, Tian, Yu-Chu, & Fidge, Colin J. (2010) Performance analysis of IEEE 802.11 DCF based WNCS networks. In Proceedings of The 35th IEEE Conference on Local Computer Networks (LCN), IEEE, Sheraton Denver Downtown, Denver, Colorado, pp. 512-519.
Number of full-text downloads 112
Number of citations in Scopus 6

W

Widanagamage, Anushka, Jayalath, Dhammika, & O'Shea, Peter J. (2012) Ergodic capacity of the exponentially correlated slotted amplify and forward relay channel. In Sari, Hikmet (Ed.) Proceedings of IEEE Wireless Communications and Networking Conference, IEEE Communications Society, France, pp. 776-780.
Number of full-text downloads 83

Y

Yildiz, Mursel, Toker, Ahmet Cihat, Sivrikaya, Fikret, Camtepe, Seyit A., & Albayrak, Sahin (2012) User facilitated congestion and attack mitigation. In Pentikousis, Kostas, Aguiar, Rui, Sargento, Susana, & Aguero, Ramon (Eds.) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Networks and Management, Springer Berlin Heidelberg, Aveiro, Portugal, pp. 358-371.

Z

Zhang, Jin, Peng, Chen, Fei, Min-Rui, & Tian, Yu-Chu (2016) Output feedback control of networked systems with a stochastic communication protocol. Journal of the Franklin Institute. (In Press)

This list was generated on Sat Apr 30 13:23:28 2016 AEST.