Volgen
Abigail Koay
Abigail Koay
Geverifieerd e-mailadres voor usc.edu.au
Titel
Geciteerd door
Geciteerd door
Jaar
Embedding java classes with code2vec: Improvements from variable obfuscation
R Compton, E Frank, P Patros, A Koay
Proceedings of the 17th International Conference on Mining Software …, 2020
712020
Fog-assisted SDN controlled framework for enduring anomaly detection in an IoT network
Q Shafi, A Basit, S Qaisar, A Koay, I Welch
IEEE Access 6, 73713-73723, 2018
692018
A new multi classifier system using entropy-based features in DDoS attack detection
A Koay, A Chen, I Welch, WKG Seah
2018 International conference on information networking (ICOIN), 162-167, 2018
632018
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
AMY Koay, RKL Ko, H Hettema, K Radke
Journal of Intelligent Information Systems 60 (2), 377-405, 2023
342023
Maintaining SLOs of cloud-native applications via self-adaptive resource sharing
V Podolskiy, M Mayo, A Koay, M Gerndt, P Patros
2019 IEEE 13th International Conference on Self-Adaptive and Self-Organizing …, 2019
302019
Positive-unlabeled learning using random forests via recursive greedy risk minimization
J Wilton, A Koay, R Ko, M Xu, N Ye
Advances in Neural Information Processing Systems 35, 24060-24071, 2022
82022
Detecting high and low intensity distributed denial of service (ddos) attacks
A Koay
Open Access Te Herenga Waka-Victoria University of Wellington, 2019
72019
Comparison of pretrained feature extractors for glaucoma detection
H Gunasinghe, J McKelvie, A Koay, M Mayo
2021 IEEE 18th international symposium on biomedical imaging (ISBI), 390-394, 2021
62021
SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets
AMY Koay, M Xie, RKL Ko, C Sterner, T Choi, N Dong
Inernational Conference on Ubiquitous Security, 102-115, 2021
32021
(Short Paper) Effectiveness of entropy-based features in high-and low-intensity DDoS attacks detection
A Koay, I Welch, WKG Seah
Advances in Information and Computer Security: 14th International Workshop …, 2019
32019
Domain generalisation for glaucoma detection in retinal images from unseen fundus cameras
H Gunasinghe, J McKelvie, A Koay, M Mayo
Asian Conference on Intelligent Information and Database Systems, 421-433, 2022
22022
Benchmarking and learning garbage collection delays for resource‐restricted graphical user interfaces
H McCarthy, A Koay, M Dawson, KB Kent, P Patros
Software: Practice and Experience 52 (1), 172-193, 2022
22022
Plan2Defend: AI Planning for Cybersecurity in Smart Grids
T Choi, RKL Ko, T Saha, J Scarsbrook, AMY Koay, S Wang, W Zhang, ...
2021 IEEE PES Innovative Smart Grid Technologies-Asia (ISGT Asia), 1-5, 2021
12021
AI hype as a cyber security risk: the moral responsibility of implementing generative AI in business
D Humphreys, A Koay, D Desmond, E Mealy
AI and Ethics, 1-14, 2024
2024
Log File Analysis Using Signature Detection (LoFA-SD)
AMY Koay
UMP, 2011
2011
SANER 2022
D Hao, A Hindle, R Abdalkareem, H Bagheri, TF Bissyandé, Y Cai, ...
In Silico Comparison of Continuous Glucose Monitor Failure Mode Strategies for an Artificial Pancreas
YL Lu, A Koay, M Mayo
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17