当前位置: X-MOL首页全球导师 海外导师 › Johnstone, Mike

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Ahmad, P., Brogan, M., Johnstone, M., (2014), The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation. Australian Academic and Research Libraries, 45(1), 35-47, DOI: 10.1080/00048623.2014.885374. Johnstone, M., (2014), Cloud security meets telemedicine. Electronic Journal of Health Informatics, 8(2), Article No. e14. Johnstone, M., (2013), Embedding Secure Programming in the Curriculum: Some Lessons Learned. International Journal of Engineering and Technology, 5(2), 287-290, Singapore, DOI: 10.7763/IJET.2013.V5.560. Johnstone, M., Jarvis, J., (2012), On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks. Journal of Network Forensics, 4(1), 27-39, Perth, Australia. Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17. Shanley, A., Johnstone, M., (2015), Selection of penetration testing methodologies: a comparison and evaluation. The Proceedings of the 13th Australian Information Security Management Conference, 65-72, Perth, W.A.. Johnstone, M., Peacock, M., Den Hartog, J., (2015), Timing attack detection on Bacnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference, 57-64, Perth, Western Australia. Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA. Crowley, M., Johnstone, M., (2014), I remember Richelieu: Is anything secure anymore?. The Proceedings of 7th Australian Security and Intelligence Conference, 27 - 32, Perth, W.A.. Valli, C., Martinus, I., Johnstone, M., (2014), Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management, 71-75. Ayed, DF., Camenisch, J., Ignatenko, T., Johnstone, M., Koster, P., Lange, B., Petkovic, M., Sommer, D., Zic, J., (2014), Authentication and authorisation in entrusted unions. Proc. 12th Australian Information Security Management Conference, 56-63, Perth, W.A.. Peacock, M., Johnstone, M., (2014), An analysis of security issues in building automation systems. The Proceedings of 12th Australian Information Security Management Conference, 100-104, Perth, W.A.. Johnstone, M., Woodward, A., (2013), Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference, 102-112, Perth, Western Australia. Thompson, R., Johnstone, M., (2013), Security aspects of military sensor-based defence systems. 2013 IEEE International Conference on Trust, Security and Privacy in Computing and Communication Systems, 302 - 309 , Melbourne, Australia, DOI: 10.1109/TrustCom.2013.277. Peacock, M., Johnstone, M., (2013), Towards detection and control of civilian unmanned aerial vehicles. The Proceedings of 14th Australian Information Warfare Conference, 9-15, Perth. Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia. Johnstone, M., Woodward, A., (2012), Towards Effective Algorithms for Intelligent Defense Systems. Cyberspace Safety and Security: The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 498-508, Heidelberg, DOI: 10.1007/978-3-642-35362-8. Johnstone, M., (2012), Cloud security: A case study in telemedicine. The Proceedings of the 1st Australian eHealth Informatics and Security Conference, 42-48, Perth, Western Australia. Johnstone, M., (2011), Modelling Misuse Cases as a Means of Capturing Security Requirements. Proceedings of the 9th Australian Information Security Management Conference, 140-147, Perth, Western Australia. Johnstone, M., (2011), Security Aspects of Sensor-based Defence Systems. Proceedings of the 9th Australian Information Security Management Conference, 148-154, Perth, Western Australia.

推荐链接
down
wechat
bug