|
MALCOLM SHORE |
CYBERSECURITY |
Publications |
||||
Academic and Industry Journals2011, ISACA Journal, "The Changing Face of Cybersecurity", September 2011 2011, Internet & Policy Journal, "An Assured Public-Private Partnership Model for Cybersecurity", April 2011 2010, Synthesis Journal, "An End-to-End Framework for Survivable NGNs", Singapore 2010 2009, Handbook of Research on Socio-Technical Design and Social Networking Systems, ISBN 978-1-60566-264-0, Chapter XIII "Cyber Security and Anti Social Networking" 2007 Computer Security Journal, "An Advanced Model of Hacking"
Conference Presentations & Proceedings2013, MOMM Conference, "Can Smartphone Users Turn Off Tracking Service Settings", Vienna, December 2013 2010, COSAC 2010, "Building a SABSA Governance Interface", Dublin 2010 2010, 6th International Conference on Wireless Communications, Networking and Mobile Computing, "Architecting Survivable Networks using SABSA" , Chengdu Sep 2010 2010, COSAC 2010,"A Cybersecurity Strategy for New Zealand" Dublin Sep 2010 2010, 2nd SABSA World Congress, "SNAP: A SABSA Process for Architecting Survivable Networks" Dublin 2010 2010, 15th Annual Information and IT Security Summit, "New Ideas in Forensically Sound Adaptive Security" 2009, The Fourth International Conference on Availability, Reliability and Security. "Advanced Flooding Attack on a SIP Server" 2008 17th Annual Wireless and Mobile Communications Conference, "Securing Your Systems in an Interoperable Environment" 2008 26th Asia-Pacific Advanced Networking Conference, "Advanced Flooding Attack on a SIP Server" 2008 International Conference on Computer Mediated Social Networking, "Second Life: The Future of Social networking" 2008 International Conference on Computer Mediated Social Networking, "Data in Social Network Analysis" 2005 Indonesian National Cryptography and Information Security Conference, "A Stranger Exchange Protocol" 2005 Indonesian National Cryptography and Information Security Conference, "Tactical E1 Encryption using a Complex LFSR" 2004 1st Syrian International Conference on Telecommunications Theory and Application, "KSM: An Experimental Cryptographic Mode of Operation with Bit Loss Synchronisation" 2003 4th Australian Information Warfare and IT Security Conference, "Cyberwar Target Acquisition and Identification" 2003 4th Australian Information Warfare and IT Security Conference, "Automated Matching of Cyberwar Exploits and Targets" 2001 IIR IT Security Conference, "Latest Developments in Ciphers & Cryptography" |
||||