‚Us and them‘: thinking beyond the security ethic
- Creator: Lovat, Terence , Fleming, Dan
- Resource Type: journal article
- Date: 2013
What is core and what future holds for blockchain technologies and cryptocurrencies: A bibliometric analysis
- Creator: Nasir, Adeel , Shaukat, Kamran , Khan, Kanwal Iqbal , Hameed, Ibrahim A. , Alam, Talha Mahboob , Luo, Suhuai
- Resource Type: journal article
- Date: 2021
The vulnerability of cyber-physical system under stealthy attacks
- Creator: Sui, Tianju , Mo, Yilan , Marelli, Damian , Sun, Ximing , Fu, Minyue
- Resource Type: journal article
- Date: 2021
The search for an integrated policy: challenges to Australian national interest in the Asia-Pacific, 1921–57
- Creator: Cuffe, Honae
- Resource Type: thesis
- Date: 2020
The Politics of Water Rights: Scarcity, Sovereignty and Security
- Creator: Brisman, Avi , McClanahan, Bill , South, Nigel , Walters, Reece
- Resource Type: book chapter
- Date: 2020
The Malthus effect: population and the liberal government of life
- Creator: Dean, Mitchell
- Resource Type: journal article
- Date: 2015
The co-evolution of safety cultures and crisis management capacities in maritime trading systems
- Creator: Barnes, Paul , Oloruntoba, Richard
- Resource Type: book chapter
- Date: 2007
Terror, security, and money: assessing the cost-effectiveness of critical infrastructure protection
- Creator: Stewart, Mark G. , Mueller, John
- Resource Type: conference paper
- Date: 2012
Statistical disclosure control: to trust or not to trust
- Creator: Giggins, Helen , Brankovic, Ljiljana
- Resource Type: conference paper
- Date: 2008
Special collection: security (editorial)
- Creator: Brankovic, Ljiljana , Miller, Mirka , Steketee, Chris
- Resource Type: journal article
- Date: 2008
Smart meter data analysis
- Creator: Aljamea, Moudhi M. , Brankovic, Ljiljana , Gao, Jia , Iliopoulos, Costas S. , Samiruzzaman, M.
- Resource Type: conference paper
- Date: 2016
Security risk and cost-benefit assessment of secondary flight deck barriers
- Creator: Stewart, Mark G. , Mueller, John
- Resource Type: report
- Date: 2019
Security of genetic databases
- Creator: Giggins, Helen
- Resource Type: thesis
- Date: 2009
Security as a service model for cloud environment
- Creator: Varadharajan, Vijay , Tupakula, Udaya
- Resource Type: journal article
- Date: 2014
Securing wireless mobile nodes from distributed denial-of-service attacks
- Creator: Varadharajan, Vijay , Tupakula, Udaya
- Resource Type: journal article
- Date: 2015
Securing security in education: the role of public theology and a case study in global jihadism
- Creator: Lovat, Terence
- Resource Type: journal article
- Date: 2018
Securing and governing access in ad-hoc networks of internet of things
- Creator: Pranata, Ilung , Athauda, Rukshan I. , Skinner, Geoff
- Resource Type: conference paper
- Date: 2012
Securing an EHR in a health sector digital ecosystem
- Creator: Regan, Brian , Pusatli, O. Tolga , Lutton, Eugene , Athauda, Rukshan
- Resource Type: conference paper
- Date: 2009
Secure index coding: existence and construction
- Creator: Ong, Lawrence , Vellambi, Badri N. , Yeoh, Phee Lep , Kliewer, Jörg , Yuan, Jinhong
- Resource Type: conference paper
- Date: 2016
SDPM: a secure smart device provisioning and monitoring service architecture for smart network infrastructure
- Creator: Karmakar, Kallol Krishna , Varadharajan, Vijay , Speirs, Pete , Hitchens, Michael , Robertson, Aron
- Resource Type: journal article
- Date: 2022