MALCOLM SHORE

   
   

CYBERSECURITY

   
   

Publications

   
 

Academic and Industry Journals

2011, ISACA Journal, "The Changing Face of Cybersecurity", September 2011

2011, Internet & Policy Journal, "An Assured Public-Private Partnership Model for Cybersecurity", April 2011

2010, Synthesis Journal, "An End-to-End Framework for Survivable NGNs", Singapore 2010

2009, Handbook of Research on Socio-Technical Design and Social Networking Systems, ISBN 978-1-60566-264-0, Chapter XIII "Cyber Security and Anti Social Networking"

2007 Computer Security Journal, "An Advanced Model of Hacking"

 

Conference Presentations & Proceedings

2013, MOMM Conference, "Can Smartphone Users Turn Off Tracking Service Settings", Vienna, December 2013

2010, COSAC 2010, "Building a SABSA Governance Interface", Dublin 2010

2010, 6th International Conference on Wireless Communications, Networking and Mobile Computing, "Architecting Survivable Networks using SABSA" , Chengdu Sep 2010

2010, COSAC 2010,"A Cybersecurity Strategy for New Zealand" Dublin Sep 2010

2010, 2nd SABSA World Congress, "SNAP: A SABSA Process for Architecting Survivable Networks" Dublin 2010

2010, 15th Annual Information and IT Security Summit, "New Ideas in Forensically Sound Adaptive Security"

2009, The Fourth International Conference on Availability, Reliability and Security. "Advanced Flooding Attack on a SIP Server"

2008 17th Annual Wireless and Mobile Communications Conference, "Securing Your Systems in an Interoperable Environment"

2008 26th Asia-Pacific Advanced Networking Conference, "Advanced Flooding Attack on a SIP Server"

2008 International Conference on Computer Mediated Social Networking, "Second Life: The Future of Social networking"

2008 International Conference on Computer Mediated Social Networking, "Data in Social Network Analysis"

2005 Indonesian National Cryptography and Information Security Conference, "A Stranger Exchange Protocol"

2005 Indonesian National Cryptography and Information Security Conference, "Tactical E1 Encryption using a Complex LFSR"

2004 1st Syrian International Conference on Telecommunications Theory and Application, "KSM: An Experimental Cryptographic Mode of Operation with Bit Loss Synchronisation"

2003 4th Australian Information Warfare and IT Security Conference, "Cyberwar Target Acquisition and Identification"

2003 4th Australian Information Warfare and IT Security Conference, "Automated Matching of Cyberwar Exploits and Targets"

2001 IIR IT Security Conference, "Latest Developments in Ciphers & Cryptography"