Author image not provided
 Kim Kwang Raymond Choo

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.31
Citation Count574
Publication count108
Publication years2004-2018
Available for download9
Average downloads per article466.78
Downloads (cumulative)4,201
Downloads (12 Months)2,324
Downloads (6 Weeks)142
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


107 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 107
Result page: 1 2 3 4 5 6

Sort by:

1
February 2018 Future Generation Computer Systems: Volume 79 Issue P1, February 2018
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Mobile devices and apps such as cloud apps are a potential attack vector in an advanced persistent threat (APT) incident, due to their capability to store sensitive data (e.g. backup of private and personal data in digital repositories) and access sensitive resources (e.g. compromising the device to access an organisational ...
Keywords: Advanced persistent threat investigations, iOS cloud apps, iOS security taxonomy, iOS cloud forensics

2
PAT
February 2018 Future Generation Computer Systems: Volume 79 Issue P1, February 2018
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

While providing anonymity at terminal devices (e.g. Android and iOS devices) is beneficial for users (e.g. consuming services and resources without the risk of being traced), relevant stakeholders (e.g. providers and governments) may require conditional anonymity for billing purpose or to locate dishonest or compromised client devices. In a cloud ...
Keywords: Cloud crowdcomputing, Traceability for crowdcomputing, Anonymous reward scheme

3
January 2018 Computers and Security: Volume 72 Issue C, January 2018
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 0

Electronic health records (EHRs), digitization of patients' health record, offer many advantages over traditional ways of keeping patients' records, such as easing data management and facilitating quick access and real-time treatment. EHRs are a rich source of information for research (e.g. in data analytics), but there is a risk that ...
Keywords: Electronic health record, k-anonymity, Privacy preserving model, Attribute disclosure, Balanced p+-sensitive k-anonymity model, p+-sensitive k-anonymity model

4
January 2018 Journal of Parallel and Distributed Computing: Volume 111 Issue C, January 2018
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 0

Internet of things (IoT) applications comprising thousands or millions of intelligent devices or things is fast becoming a norm in our inter-connected world, and the significant amount of data generated from IoT applications is often stored in the cloud. However, searching encrypted data (i.e. Searchable EncryptionSE) in the cloud remains ...
Keywords: Insider keyword guessing attack resilience, Cloud-of-Things, Searchable encryption, Forward privacy, File-injection attack resilience, Internet of Things

5
December 2017 Soft Computing - A Fusion of Foundations, Methodologies and Applications: Volume 21 Issue 23, December 2017
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

With constant advancements in remote sensing technologies resulting in higher image resolution, there is a corresponding need to be able to mine useful data and information from remote sensing images. In this paper, we study auto-encoder (SAE) and support vector machine (SVM), and to examine their sensitivity, we include additional ...
Keywords: Active learning, Remote sensing, Support vector machine, Spatial big data, Sparse auto-encoder

6
December 2017 Applied Mathematics and Computation: Volume 314 Issue C, December 2017
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 0

Privacy-preserving certificateless provable data possession scheme.Privacy-preserving provable data possession scheme for cloud storage.Certificate management and key escrow in cloud storage.Certificateless provable data possession scheme for big data storage. Cloud storage is generally regarded as one of the most promising technologies to address various big data challenges (e.g. secure storage for ...
Keywords: Provable data possession, Cloud data integrity, Public cloud storage, Privacy-preserving

7
December 2017 Journal of Computer and System Sciences: Volume 90 Issue C, December 2017
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 0

Cloud computing gathers a lot of computing resources together, and provides cheap, efficient and convenient services. With the development of cloud computing, the importance of security issues is increasing. Modular exponentiations are one of the basic and expensive operations of public key cryptography. We consider the single untrusted programed model ...
Keywords: Modular exponentiations, High checkability, Secure outsourcing, Untrusted server

8
November 2017 Computer Standards & Interfaces: Volume 54 Issue P1, November 2017
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Designing an effective and secure group-oriented access control for mobile cloud storage services is an area of active research. For example, such schemes should provide user-friendly features that allow group members to be conveniently added or removed, privileges of group members to be assigned or revoked by authorized parties (e.g., ...
Keywords: Access control, Flexibility, Lightweight, Mobile cloud computing

9 published by ACM
October 2017 MIST '17: Proceedings of the 2017 International Workshop on Managing Insider Security Threats
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 52,   Downloads (Overall): 52

Full text available: PDFPDF
The growth in the data volume and number of evidential data sources, including from heterogeneous distributed systems such as cloud and fog computing systems and Internet-of-Things devices (e.g. drones), has led to increased collection, processing and analysis times, potentially resulting in vulnerable individuals and organizations (e.g. in the event of ...
Keywords: big forensic data, forensic-by-design, big data forensics, insider breach investigation

10
August 2017 Software—Practice & Experience: Volume 47 Issue 8, August 2017
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 1

The growth in the data volume and number of evidential data from heterogeneous distributed systems in smart cities, such as cloud and fog computing systems and Internet-of-Things devices e.g. IP-based CCTVs, has led to increased collection, processing and analysis times, potentially resulting in vulnerable persons e.g. victims of terrorism incidents ...
Keywords: big forensic data management, big forensic data reduction, digital forensic resource management, heterogeneous distributed system forensics, smart city forensic readiness

11
May 2017 Journal of Network and Computer Applications: Volume 86 Issue C, May 2017
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 0

In pervasive social networking forensics, mobile devices (e.g. mobile phones) are a typical source of evidence. For example, figures from an Australian law enforcement agency show the number of mobile phones submitted for analysis increasing at an average of 60% per annum since 2006, and data from FBI regional computer ...
Keywords: Mobile device forensic extracts, Social communication forensics, Big forensic data, Pervasive social networking forensics, Digital forensic intelligence analysis cycle, Forensic intelligence analysis, Social networking app forensics

12
May 2017 Journal of Network and Computer Applications: Volume 86 Issue C, May 2017
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 0

A social network is a typical scale-free network with power-law degree distribution characteristics. It demonstrates several natural imbalanced clusters when it is abstracted as a graph, and expands quickly under its generative mechanism. Hypergraph is superior for modeling multi-user operations in social networks, and partitioning the hypergraph modeled social networks ...
Keywords: Scale-free network, Information entropy, Modularity, Social network partitioning, Hypergraph partitioning

13
April 2017 Mobile Networks and Applications: Volume 22 Issue 2, April 2017
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Mobile technologies can be, and have been, exploited in terrorist activities. In this paper, we highlight the importance of mobile forensics in the investigation of such activities. Specifically, using a series of controlled experiments on Android and Windows devices, we demonstrate how mobile forensics techniques can be used to recover ...
Keywords: Cloud app forensics, Mobile forensics, Windows phone forensics, Android device forensics, Terrorist investigations

14
March 2017 Software—Practice & Experience: Volume 47 Issue 3, March 2017
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 2

The increasing convergence of wearable technologies and cloud services in applications, such as health care, could result in new attack vectors for the 'Cloud of Things', which could in turn be exploited to exfiltrate sensitive user data. In this paper, we analyze the types of sensitive user data that may ...
Keywords: Android Wear, Cloud of Things security, wearable technologies, smartwatch

15
February 2017 Computers and Electrical Engineering: Volume 58 Issue C, February 2017
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 1

Forensic investigation of P2P cloud storage services and backbone for IoT networks.Industrial Internet of things forensics.Peer-to-peer and BitTorrent forensics.Forensically sound investigation methodology for BitTorrent Sync investigations. Cloud computing can be generally regarded as the technology enabler for Internet of Things (IoT). To ensure the most effective collection of evidence from ...
Keywords: BitTorrent Sync, Computer forensics, Internet of things forensics, Mobile forensics, P2p cloud investigation, Cloud forensics

16
February 2017 Multimedia Tools and Applications: Volume 76 Issue 3, February 2017
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1

Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end ...
Keywords: Digital forensics, Mobile app forensics, Mobile forensics, Productivity app taxonomy, Forensic science, Forensic taxonomy

17
January 2017 Journal of Network and Computer Applications: Volume 78 Issue C, January 2017
Publisher: Academic Press Ltd.
Bibliometrics:
Citation Count: 0

With the increasing digitization of the healthcare industry, a wide range of devices (including traditionally non-networked medical devices) are Internet- and inter-connected. Mobile devices (e.g. smartphones) are one common device used in the healthcare industry to improve the quality of service and experience for both patients and healthcare workers, and ...
Keywords: Bayesian inference, Emerging architecture, Emerging smartphone networks, Intrusion detection, Insider attacks

18
January 2017 Applied Mathematics and Computation: Volume 293 Issue C, January 2017
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 1

Adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.Security and privacy of mobile device and app users.Markov process for modelling (in)security state of iOS device or apps.iOS device and app vulnerabilities. With the increased convergence of technologies whereby a user can access, store and transmit data across ...
Keywords: Mobile device vulnerability, Vulnerability exploitation, Mobile security and privacy, Mobile threats, Vulnerability discovery, iOS device vulnerability

19
January 2017 Soft Computing - A Fusion of Foundations, Methodologies and Applications: Volume 21 Issue 1, January 2017
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 7

Hyperspectral remote sensing has a strong ability in information expression, so it provides better support for classification. The methods proposed to deal the hyperspectral data classification problems were build one by one. However, most of them committed to spectral feature extraction that means wasting some valuable information and poor classification ...
Keywords: Deep learning, Hyperspectral image classification, Multi-feature learning, Remote sensing

20 published by ACM
December 2016 ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on LCETES 2015, Special Issue on ACSD 2015 and Special Issue on Embedded Devise Forensics and Security: Volume 16 Issue 2, April 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 16,   Downloads (12 Months): 237,   Downloads (Overall): 299

Full text available: PDFPDF
While the increasing digitalization of our society and amalgamation of embedded devices into the ever-increasing facets of our daily life (e.g., in smart and intelligent vehicles, smart cities and smart nations, and critical infrastructure sectors) have resulted in improved productivity and quality of life, the trend has also resulted in ...
Keywords: Embedded device security, and digital forensics, embedded device forensics



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us