Fog-assisted SDN controlled framework for enduring anomaly detection in an IoT network Q Shafi, A Basit, S Qaisar, A Koay, I Welch Ieee Access 6, 73713-73723, 2018 | 82 | 2018 |
Embedding java classes with code2vec: Improvements from variable obfuscation R Compton, E Frank, P Patros, A Koay Proceedings of the 17th International Conference on Mining Software …, 2020 | 79 | 2020 |
A new multi classifier system using entropy-based features in DDoS attack detection A Koay, A Chen, I Welch, WKG Seah 2018 International conference on information networking (ICOIN), 162-167, 2018 | 70 | 2018 |
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges AMY Koay, RKL Ko, H Hettema, K Radke Journal of Intelligent Information Systems 60 (2), 377-405, 2023 | 68 | 2023 |
Maintaining SLOs of cloud-native applications via self-adaptive resource sharing V Podolskiy, M Mayo, A Koay, M Gerndt, P Patros 2019 IEEE 13th International Conference on Self-Adaptive and Self-Organizing …, 2019 | 33 | 2019 |
AI hype as a cyber security risk: The moral responsibility of implementing generative AI in business D Humphreys, A Koay, D Desmond, E Mealy AI and Ethics 4 (3), 791-804, 2024 | 30 | 2024 |
Positive-unlabeled learning using random forests via recursive greedy risk minimization J Wilton, A Koay, R Ko, M Xu, N Ye Advances in Neural Information Processing Systems 35, 24060-24071, 2022 | 12 | 2022 |
Comparison of pretrained feature extractors for glaucoma detection H Gunasinghe, J McKelvie, A Koay, M Mayo 2021 IEEE 18th international symposium on biomedical imaging (ISBI), 390-394, 2021 | 8 | 2021 |
Plan2defend: Ai planning for cybersecurity in smart grids T Choi, RKL Ko, T Saha, J Scarsbrook, AMY Koay, S Wang, W Zhang, ... 2021 IEEE PES Innovative Smart Grid Technologies-Asia (ISGT Asia), 1-5, 2021 | 7 | 2021 |
Detecting high and low intensity distributed denial of service (ddos) attacks A Koay Open Access Te Herenga Waka-Victoria University of Wellington, 2019 | 6 | 2019 |
Domain generalisation for glaucoma detection in retinal images from unseen fundus cameras H Gunasinghe, J McKelvie, A Koay, M Mayo Asian Conference on Intelligent Information and Database Systems, 421-433, 2022 | 3 | 2022 |
SDGen: a scalable, reproducible and flexible approach to generate real world cyber security datasets AMY Koay, M Xie, RKL Ko, C Sterner, T Choi, N Dong Inernational Conference on Ubiquitous Security, 102-115, 2021 | 3 | 2021 |
(Short Paper) Effectiveness of entropy-based features in high-and low-intensity DDoS attacks detection A Koay, I Welch, WKG Seah Advances in Information and Computer Security: 14th International Workshop …, 2019 | 3 | 2019 |
Benchmarking and learning garbage collection delays for resource‐restricted graphical user interfaces H McCarthy, A Koay, M Dawson, KB Kent, P Patros Software: Practice and Experience 52 (1), 172-193, 2022 | 2 | 2022 |
Adapting to the stream: an instance-attention GNN method for irregular multivariate time series data K Han, AMY Koay, RKL Ko, W Chen, M Xu Frontiers of Computer Science 19 (8), 198340, 2025 | | 2025 |
Mining Irregular Time Series Data with Noisy Labels: A Risk Estimation Approach K Han, A Koay, RKL Ko, W Chen, M Xu Australasian Database Conference, 293-307, 2025 | | 2025 |
Log File Analysis Using Signature Detection (LoFA-SD) AMY Koay UMP, 2011 | | 2011 |
Technical Papers Co-Chairs A Bacchelli, E Constantinou, A Heydarnoori, AA Bangash, A Koay, ... | | |
SANER 2022 D Hao, A Hindle, R Abdalkareem, H Bagheri, TF Bissyandé, Y Cai, ... | | |
In Silico Comparison of Continuous Glucose Monitor Failure Mode Strategies for an Artificial Pancreas YL Lu, A Koay, M Mayo | | |