default search action
Ryan Kok Leong Ko
Person information
- affiliation: The University of Queensland, Brisbane, QLD, Australia
- affiliation (former): University of Waikato, New Zealand
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, Naipeng Dong, Taejun Choi, Yanjun Zhang:
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey. IEEE Commun. Surv. Tutorials 26(2): 930-966 (2024) - [j25]Heemeng Ho, Ryan Kok Leong Ko, Lorraine Mazerolle, John Gilmour, Cheng Miao:
Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. J. Cybersecur. 10(1) (2024) - [c61]Cheng Miao, Heemeng Ho, Elinor Tsen, John Gilmour, Ryan K. L. Ko:
Scp-bp Framework: Situational Crime Prevention for Managing Data Breaches in Business Processes. BPM 2024: 456-473 - [c60]Yanjun Zhang, Ruoxi Sun, Liyue Shen, Guangdong Bai, Minhui Xue, Mark Huasong Meng, Xue Li, Ryan K. L. Ko, Surya Nepal:
Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience. WWW 2024: 2986-2997 - 2023
- [j24]William J. Bingley, Caitlin Curtis, Steven Lockey, Alina Bialkowski, Nicole M. Gillespie, S. Alexander Haslam, Ryan K. L. Ko, Niklas Steffens, Janet Wiles, Peter Worthy:
Where is the human in human-centered AI? Insights from developer priorities and user experiences. Comput. Hum. Behav. 141: 107617 (2023) - [j23]Md. Redowan Mahmud, Joshua D. Scarsbrook, Ryan K. L. Ko, Omar Jarkas, Josh Hall, Stuart Smith, Jonathan Marshall:
Realizing credible remote agricultural auditing with trusted video technology. J. Cybersecur. 9(1) (2023) - [j22]Omar Jarkas, Josh Hall, Stuart Smith, Md. Redowan Mahmud, Parham Khojasteh, Joshua D. Scarsbrook, Ryan K. L. Ko:
ResNet and Yolov5-enabled non-invasive meat identification for high-accuracy box label verification. Eng. Appl. Artif. Intell. 125: 106679 (2023) - [j21]Abigail M. Y. Koay, Ryan K. L. Ko, Hinne Hettema, Kenneth Radke:
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J. Intell. Inf. Syst. 60(2): 377-405 (2023) - [j20]Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Marthie Grobler, Chen Chen, Ryan K. L. Ko:
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks. IEEE Trans. Dependable Secur. Comput. 20(4): 3341-3357 (2023) - [c59]Jeyakumar Samantha Tharani, Ryan K. L. Ko, Vallipuram Muthukkumarasamy:
A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure. BSCI 2023: 44-52 - [c58]Joshua D. Scarsbrook, Mark Utting, Ryan K. L. Ko:
TypeScript's Evolution: An Analysis of Feature Adoption Over Time. MSR 2023: 109-114 - [p6]Richard Bean, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai:
Preserving the Privacy and Cybersecurity of Home Energy Data. Emerging Trends in Cybersecurity Applications 2023: 301-322 - [p5]Richard Bean, Yanjun Zhang, Ryan K. L. Ko, Xinyu Mao, Guangdong Bai:
Preserving the Privacy and Cybersecurity of Home Energy Data. Emerging Trends in Cybersecurity Applications 2023: 323-343 - [i12]Joshua D. Scarsbrook, Mark Utting, Ryan K. L. Ko:
TypeScript's Evolution: An Analysis of Feature Adoption Over Time. CoRR abs/2303.09802 (2023) - 2022
- [j19]Heemeng Ho, Ryan K. L. Ko, Lorraine Mazerolle:
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review. Comput. Secur. 115: 102611 (2022) - [j18]Surya Nepal, Ryan K. L. Ko, Marthie Grobler, L. Jean Camp:
Editorial: Human-Centric Security and Privacy. Frontiers Big Data 5: 848058 (2022) - [j17]Elinor Tsen, Ryan K. L. Ko, Sergeja Slapnicar:
An exploratory study of organizational cyber resilience, its precursors and outcomes. J. Organ. Comput. Electron. Commer. 32(2): 153-174 (2022) - [j16]Laizhong Cui, Yulei Wu, Ryan K. L. Ko, Alex Ladur, Jianping Wu:
Introduction to the Special Section on Resiliency for AI-enabled Smart Critical Infrastructures for 5G and Beyond. ACM Trans. Sens. Networks 18(3): 40e:1-40e:3 (2022) - [j15]Yi Cui, Feifei Bai, Ruifeng Yan, Tapan Kumar Saha, Mehdi Mosadeghy, Hongzhi Yin, Ryan K. L. Ko, Yilu Liu:
Multifractal Characterization of Distribution Synchrophasors for Cybersecurity Defense of Smart Grids. IEEE Trans. Smart Grid 13(2): 1658-1661 (2022) - [j14]Yi Cui, Feifei Bai, Hongzhi Yin, Tong Chen, David Dart, Matthew Zillmann, Ryan K. L. Ko:
Multiscale Adaptive Multifractal Detrended Fluctuation Analysis-Based Source Identification of Synchrophasor Data. IEEE Trans. Smart Grid 13(6): 4957-4960 (2022) - [c57]Liuhuo Wan, Yanjun Zhang, Ruiqing Li, Ryan K. L. Ko, Louw Hoffman, Guangdong Bai:
SATB: A Testbed of IoT-Based Smart Agriculture Network for Dataset Generation. ADMA (1) 2022: 131-145 - [c56]Gayan K. Kulatilleke, Marius Portmann, Ryan K. L. Ko, Shekhar S. Chandra:
FDGATII: Fast Dynamic Graph Attention with Initial Residual and Identity. AI 2022: 73-86 - [c55]Jonathan Wilton, Abigail M. Y. Koay, Ryan K. L. Ko, Miao Xu, Nan Ye:
Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization. NeurIPS 2022 - [c54]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Ryan K. L. Ko, Dan Dongseong Kim:
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. QRS 2022: 276-286 - [e8]Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 [contents] - [i11]Jonathan Wilton, Abigail M. Y. Koay, Ryan K. L. Ko, Miao Xu, Nan Ye:
Positive-Unlabeled Learning using Random Forests via Recursive Greedy Risk Minimization. CoRR abs/2210.08461 (2022) - 2021
- [j13]Yanjun Zhang, Guangdong Bai, Mingyang Zhong, Xue Li, Ryan K. L. Ko:
Differentially Private Collaborative Coupling Learning for Recommender Systems. IEEE Intell. Syst. 36(1): 16-24 (2021) - [j12]Chalee Vorakulpipat, Ryan K. L. Ko, Qi Li, Ahmed Meddahi:
Security and Privacy in Smart Cities. Secur. Commun. Networks 2021: 9830547:1-9830547:2 (2021) - [j11]Yi Cui, Feifei Bai, Ruifeng Yan, Tapan Kumar Saha, Ryan K. L. Ko, Yilu Liu:
Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids. IEEE Trans. Smart Grid 12(5): 4577-4580 (2021) - [c53]Daniel Roodt, Ulrich Speidel, Vimal Kumar, Ryan K. L. Ko:
On Random Editing in LZ-End. DCC 2021: 366 - [c52]Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko:
Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis. ESORICS (2) 2021: 395-416 - [c51]Taejun Choi, Ryan K. L. Ko, Tapan Kumar Saha, Joshua D. Scarsbrook, Abigail M. Y. Koay, Shunyao Wang, Wenlu Zhang, Connor St Clair:
Plan2Defend: AI Planning for Cybersecurity in Smart Grids. ISGT Asia 2021: 1-5 - [c50]Abigail M. Y. Koay, Miao Xie, Ryan K. L. Ko, Charles Sterner, Taejun Choi, Naipeng Dong:
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets. UbiSec 2021: 102-115 - [c49]Kailong Wang, Junzhe Zhang, Guangdong Bai, Ryan K. L. Ko, Jin Song Dong:
It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts. WWW 2021: 2142-2153 - [e7]Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 [contents] - [i10]Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. CoRR abs/2101.11866 (2021) - [i9]Haoxi Tan, Mahin Chandramohan, Cristina Cifuentes, Guangdong Bai, Ryan K. L. Ko:
ColdPress: An Extensible Malware Analysis Platform for Threat Intelligence. CoRR abs/2103.07012 (2021) - [i8]Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Ryan K. L. Ko:
Confined Gradient Descent: Privacy-preserving Optimization for Federated Learning. CoRR abs/2104.13050 (2021) - [i7]Gayan K. Kulatilleke, Marius Portmann, Ryan K. L. Ko, Shekhar S. Chandra:
FDGATII : Fast Dynamic Graph Attention with Initial Residual and Identity Mapping. CoRR abs/2110.11464 (2021) - 2020
- [j10]Takeshi Takahashi, Rodrigo Roman Castro, Bilhanan Silverajan, Ryan K. L. Ko, Said Tabet:
Message from the guest editors. Int. J. Inf. Sec. 19(1): 1-2 (2020) - [c48]Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko:
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. ESORICS (1) 2020: 399-418 - [c47]Farhad Fatehi, Farkhondeh Hassandoust, Ryan K. L. Ko, Saeed Akhlaghpour:
General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts. MIE 2020: 1118-1122 - [c46]Hetong Jiang, Taejun Choi, Ryan K. L. Ko:
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. SSCC 2020: 1-20 - [c45]Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. TrustCom 2020: 827-835 - [e6]Sabu M. Thampi, Gregorio Martínez Pérez, Ryan K. L. Ko, Danda B. Rawat:
Security in Computing and Communications - 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers. Communications in Computer and Information Science 1208, Springer 2020, ISBN 978-981-15-4824-6 [contents] - [e5]Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4 [contents] - [i6]Daniel Roodt, Ulrich Speidel, Vimal Kumar, Ryan K. L. Ko:
Local Editing in LZ-End Compressed Data. CoRR abs/2007.06167 (2020) - [i5]Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko:
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. CoRR abs/2007.06953 (2020) - [i4]Hetong Jiang, Taejun Choi, Ryan K. L. Ko:
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. CoRR abs/2009.11484 (2020) - [i3]Ryan K. L. Ko:
Cyber Autonomy: Automating the Hacker- Self-healing, self-adaptive, automatic cyber defense systems and their impact to the industry, society and national security. CoRR abs/2012.04405 (2020)
2010 – 2019
- 2019
- [j9]Jonathan Chase, Dusit Niyato, Ping Wang, Sivadon Chaisiri, Ryan K. L. Ko:
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 16(4): 565-579 (2019) - [r1]Thye Way Phua, Ryan K. L. Ko:
Data Provenance for Big Data Security and Accountability. Encyclopedia of Big Data Technologies 2019 - 2018
- [c44]Joshua D. Scarsbrook, Ryan K. L. Ko, Bill Rogers, David Bainbridge:
MetropolJS: visualizing and debugging large-scale javascript program structure with treemaps. ICPC 2018: 389-392 - [c43]Jeffery Garae, Ryan K. L. Ko, Mark D. Apperley:
A Full-Scale Security Visualization Effectiveness Measurement and Presentation Approach. TrustCom/BigDataSE 2018: 639-650 - 2017
- [j8]Lan Liu, Ryan K. L. Ko, Guangming Ren, Xiaoping Xu:
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. Secur. Commun. Networks 2017: 2910310:1-2910310:8 (2017) - [c42]Ryan K. L. Ko, Thye Way Phua:
The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance. SpaCCS Workshops 2017: 180-193 - [c41]Mark A. Will, Ryan K. L. Ko:
Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the Cloud. TrustCom/BigDataSE/ICESS 2017: 449-455 - [c40]Mark A. Will, Ryan K. L. Ko, Silvino J. Schlickmann:
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography. TrustCom/BigDataSE/ICESS 2017: 1024-1031 - [c39]Jeffery Garae, Ryan K. L. Ko, Janice Kho, Saidah Suwadi, Mark A. Will, Mark D. Apperley:
Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors. TrustCom/BigDataSE/ICESS 2017: 1123-1130 - [c38]Sam Shute, Ryan K. L. Ko, Sivadon Chaisiri:
Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness Recognition. TrustCom/BigDataSE/ICESS 2017: 1131-1138 - 2016
- [c37]Mark A. Will, Ryan K. L. Ko:
Computing Mod with a Variable Lookup Table. SSCC 2016: 3-17 - [c36]Shaun Stricot-Tarboton, Sivadon Chaisiri, Ryan K. L. Ko:
Taxonomy of Man-in-the-Middle Attacks on HTTPS. Trustcom/BigDataSE/ISPA 2016: 527-534 - [c35]Sivadon Chaisiri, Ryan K. L. Ko:
From Reactionary to Proactive Security: Context-Aware Security Policy Management and Optimization under Uncertainty. Trustcom/BigDataSE/ISPA 2016: 535-543 - [c34]Mark A. Will, Ryan K. L. Ko, Ian H. Witten:
Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates. Trustcom/BigDataSE/ISPA 2016: 900-908 - [c33]Jeffery Garae, Ryan K. L. Ko, Sivadon Chaisiri:
UVisP: User-centric Visualization of Data Provenance with Gestalt Principles. Trustcom/BigDataSE/ISPA 2016: 1923-1930 - [c32]Craig Scoon, Ryan K. L. Ko:
The Data Privacy Matrix Project: Towards a Global Alignment of Data Privacy Laws. Trustcom/BigDataSE/ISPA 2016: 1998-2005 - [e4]Jesús Carretero, Javier García Blas, Ryan K. L. Ko, Peter Mueller, Koji Nakano:
Algorithms and Architectures for Parallel Processing - 16th International Conference, ICA3PP 2016, Granada, Spain, December 14-16, 2016, Proceedings. Lecture Notes in Computer Science 10048, Springer 2016, ISBN 978-3-319-49582-8 [contents] - [e3]Peter Müller, Sabu M. Thampi, Md. Zakirul Alam Bhuiyan, Ryan Kok Leong Ko, Robin Doss, José M. Alcaraz Calero:
Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Communications in Computer and Information Science 625, Springer 2016, ISBN 978-981-10-2737-6 [contents] - 2015
- [c31]Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gillian Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, Geoffrey Holmes:
STRATUS: Towards Returning Data Control to Cloud Users. ICA3PP (Workshops and Symposiums) 2015: 57-70 - [c30]Mark A. Will, Brandon Nicholson, Marc Tiehuis, Ryan K. L. Ko:
Secure Voting in the Cloud Using Homomorphic Encryption and Mobile Agents. ICCCRI 2015: 173-184 - [c29]Sivadon Chaisiri, Ryan K. L. Ko, Dusit Niyato:
A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management. TrustCom/BigDataSE/ISPA (1) 2015: 426-433 - [c28]Mark A. Will, Ryan K. L. Ko, Ian H. Witten:
Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud. TrustCom/BigDataSE/ISPA (1) 2015: 563-570 - [c27]Mohammad M. Bany Taha, Sivadon Chaisiri, Ryan K. L. Ko:
Trusted Tamper-Evident Data Provenance. TrustCom/BigDataSE/ISPA (1) 2015: 646-653 - [c26]Xin Li, Chaitanya Joshi, Alan Yu Shyang Tan, Ryan Kok Leong Ko:
Inferring User Actions from Provenance Logs. TrustCom/BigDataSE/ISPA (1) 2015: 742-749 - [c25]Baden Delamore, Ryan K. L. Ko:
A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications. TrustCom/BigDataSE/ISPA (1) 2015: 1129-1135 - [p4]Ryan K. L. Ko, Kim-Kwang Raymond Choo:
Cloud security ecosystem. The Cloud Security Ecosystem 2015: 1-14 - [p3]Mark A. Will, Ryan K. L. Ko:
A guide to homomorphic encryption. The Cloud Security Ecosystem 2015: 101-127 - [p2]Alan Yu Shyang Tan, Ryan K. L. Ko, Geoff Holmes, Bill Rogers:
Provenance for cloud data accountability. The Cloud Security Ecosystem 2015: 171-185 - [p1]Baden Delamore, Ryan K. L. Ko:
Security as a service (SecaaS) - An overview. The Cloud Security Ecosystem 2015: 187-203 - [e2]Ryan Kok Leong Ko, Kim-Kwang Raymond Choo:
The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues. Elsevier 2015, ISBN 978-0-12-801595-7 [contents] - 2014
- [j7]Nick Papanikolaou, Siani Pearson, Marco Casassa Mont, Ryan K. L. Ko:
A toolkit for automating compliance in cloud computing services. Int. J. Cloud Comput. 3(1): 45-68 (2014) - [j6]Ryan K. L. Ko, Markus Kirchberg, Bu-Sung Lee:
Special issue on trust and security in cloud computing. Secur. Commun. Networks 7(11): 2183-2184 (2014) - [j5]Yulei Wu, Ryan K. L. Ko, Ahmed Yassin Al-Dubai:
Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks. Wirel. Pers. Commun. 75(3): 1587-1589 (2014) - [c24]Ryan Kok Leong Ko, Alan Yu Shyang Tan, Grace P. Y. Ng:
'Time' for Cloud? Design and Implementation of a Time-Based Cloud Resource Management System. IEEE CLOUD 2014: 530-537 - [c23]Ryan K. L. Ko, Mark A. Will:
Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking. IEEE CLOUD 2014: 881-889 - [c22]Alan Yu Shyang Tan, Ryan Kok Leong Ko, Veena B. Mendiratta:
Virtual Numbers for Virtual Machines? IEEE CLOUD 2014: 972-974 - [c21]Alan Yu Shyang Tan, Ryan Kok Leong Ko, Grace P. Y. Ng:
OpenStack Café: A Novel Time-Based User-centric Resource Management Framework in the Cloud. BigData Congress 2014: 422-429 - [c20]Ryan Kok Leong Ko, Alan Yu Shyang Tan, Ting Gao:
A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach. CloudCom 2014: 1033-1039 - [c19]Raja Naeem Akram, Ryan K. L. Ko, Tsz Fung Law:
Consumer-centric protection for online social networks. IRI 2014: 62-67 - [c18]Raja Naeem Akram, Ryan K. L. Ko:
Unified Model for Data Security - A Position Paper. TrustCom 2014: 831-839 - [c17]Raja Naeem Akram, Ryan K. L. Ko:
Digital Trust - Trusted Computing and Beyond: A Position Paper. TrustCom 2014: 884-892 - [c16]Baden Delamore, Ryan K. L. Ko:
Escrow: A Large-Scale Web Vulnerability Assessment Tool. TrustCom 2014: 983-988 - [c15]Raja Naeem Akram, Ryan K. L. Ko:
End-to-End Secure and Privacy Preserving Mobile Chat Application. WISTP 2014: 124-139 - [e1]Gregorio Martínez Pérez, Sabu M. Thampi, Ryan K. L. Ko, Lei Shu:
Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings. Communications in Computer and Information Science 420, Springer 2014, ISBN 978-3-642-54524-5 [contents] - [i2]Mark A. Will, Ryan K. L. Ko:
Computing Mod Without Mod. IACR Cryptol. ePrint Arch. 2014: 755 (2014) - 2013
- [c14]Yu Shyang Tan, Ryan K. L. Ko, Geoff Holmes:
Security and Data Accountability in Distributed Systems: A Provenance Survey. HPCC/EUC 2013: 1571-1578 - [c13]Chun Hui Suen, Ryan K. L. Ko, Yu Shyang Tan, Peter Jagadpramana, Bu-Sung Lee:
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance. TrustCom/ISPA/IUCC 2013: 594-602 - 2012
- [j4]Ryan K. L. Ko, Eng Wah Lee, Stephen Siang Guan Lee:
Business-OWL (BOWL) - A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation. IEEE Trans. Serv. Comput. 5(2): 246-259 (2012) - [c12]Nick Papanikolaou, Siani Pearson, Marco Casassa Mont, Ryan K. L. Ko:
Automating Compliance for Cloud Computing Services. CLOSER 2012: 631-637 - [c11]Markus Kirchberg, Erwin Leonardi, Yu Shyang Tan, Sebastian Link, Ryan K. L. Ko, Bu-Sung Lee:
Formal Concept Discovery in Semantic Web Data. ICFCA 2012: 164-179 - [c10]Ryan K. L. Ko, Markus Kirchberg, Bu-Sung Lee, Elroy Chew:
Overcoming Large Data Transfer Bottlenecks in RESTful Service Orchestrations. ICWS 2012: 654-656 - [c9]Yu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc:
Tracking of Data Leaving the Cloud. TrustCom 2012: 137-144 - [c8]Olive Qing Zhang, Ryan K. L. Ko, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee:
How to Track Your Data: Rule-Based Data Provenance Tracing Algorithms. TrustCom 2012: 1429-1437 - 2011
- [c7]Ryan K. L. Ko, Bu-Sung Lee, Siani Pearson:
Towards Achieving Accountability, Auditability and Trust in Cloud Computing. ACC (4) 2011: 432-444 - [c6]Olive Qing Zhang, Markus Kirchberg, Ryan K. L. Ko, Bu-Sung Lee:
How to Track Your Data: The Case for Cloud Computing Provenance. CloudCom 2011: 446-453 - [c5]Ryan K. L. Ko, Peter Jagadpramana, Miranda Mowbray, Siani Pearson, Markus Kirchberg, Qianhui Liang, Bu-Sung Lee:
TrustCloud: A Framework for Accountability and Trust in Cloud Computing. SERVICES 2011: 584-588 - [c4]Ryan K. L. Ko, Peter Jagadpramana, Bu-Sung Lee:
Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments. TrustCom 2011: 765-771 - [i1]Markus Kirchberg, Ryan K. L. Ko, Bu-Sung Lee:
From Linked Data to Relevant Data -- Time is the Essence. CoRR abs/1103.5046 (2011) - 2010
- [j3]Ryan K. L. Ko:
Cloud computing in plain English. ACM Crossroads 16(3): 5-6 (2010)
2000 – 2009
- 2009
- [j2]Ryan K. L. Ko, Stephen Siang Guan Lee, Eng Wah Lee:
Business process management (BPM) standards: a survey. Bus. Process. Manag. J. 15(5): 744-791 (2009) - [j1]Ryan K. L. Ko:
A computer scientist's introductory guide to business process management (BPM). ACM Crossroads 15(4) (2009) - [c3]Ryan K. L. Ko, Stephen Siang Guan Lee, Eng Wah Lee, Andre Jusuf:
Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning. ICWS 2009: 959-967 - [c2]Duy Ngan Le, Ngoc Son Nguyen, Karel Mous, Ryan Kok Leong Ko, Angela Eck Soong Goh:
Generating Request Web Services from Annotated BPEL. RIVF 2009: 1-8 - [c1]Ryan K. L. Ko, Andre Jusuf, Stephen Siang Guan Lee:
Genesis. SERVICES I 2009: 123-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint