default search action
Asha Rao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i15]Tracy Tam, Asha Rao, Joanne L. Hall:
Structuring the Chaos: Enabling Small Business Cyber-Security Risks & Assets Modelling with a UML Class Model. CoRR abs/2403.14872 (2024) - [i14]Joanne L. Hall, Asha Rao:
Gender of Recruiter Makes a Difference: A study into Cybersecurity Graduate Recruitment. CoRR abs/2408.05895 (2024) - 2023
- [j14]Diane M. Donovan, Asha Rao, Elif Üsküplü, Emine Sule Yazici:
QC-LDPC Codes From Difference Matrices and Difference Covering Arrays. IEEE Access 11: 52141-52157 (2023) - [j13]Sharmila Kayastha, Jayantha Katupitiya, Garth Pearce, Asha Rao:
Comparative study of post-impact motion control of a flexible arm space robot. Eur. J. Control 69: 100738 (2023) - [c19]Hope Poulter, Logan Diebold, Sean Kelly, Samuel Pakalapati, Asha Rao, Edgar Rojas-Muñoz:
Cell Tour: Learning About the Cellular Membrane Using Virtual Reality. FIE 2023: 1-5 - [c18]Muhammad Nauman Khan, Asha Rao, Seyit Camtepe, Josef Pieprzyk:
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme. SECRYPT 2023: 85-98 - [i13]Sevvandi Kandanaarachchi, Mahdi Abolghasemi, Hideya Ochiai, Asha Rao:
Detecting inner-LAN anomalies using hierarchical forecasting. CoRR abs/2304.13941 (2023) - 2022
- [j12]Sevvandi Kandanaarachchi, Hideya Ochiai, Asha Rao:
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection. Expert Syst. Appl. 201: 117073 (2022) - [i12]Diane M. Donovan, Asha Rao, Elif Üsküplü, Emine Sule Yazici:
QC-LDPC Codes from Difference Matrices and Difference Covering Arrays. CoRR abs/2205.00563 (2022) - 2021
- [j11]Tracy Tam, Asha Rao, Joanne L. Hall:
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses. Comput. Secur. 109: 102385 (2021) - [j10]Tracy Tam, Asha Rao, Joanne L. Hall:
The Invisible COVID-19 Small Business Risks: Dealing with the Cyber-Security Aftermath. Digit. Gov. Res. Pract. 2(2): 23:1-23:8 (2021) - [j9]Muhammad Nauman Khan, Asha Rao, Seyit Camtepe:
Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey. IEEE Internet Things J. 8(6): 4132-4156 (2021) - [i11]Sevvandi Kandanaarachchi, Hideya Ochiai, Asha Rao:
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection. CoRR abs/2105.02526 (2021) - [i10]Tracy Tam, Asha Rao, Joanne L. Hall:
The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses. CoRR abs/2109.00733 (2021) - 2020
- [c17]Joanne L. Hall, Asha Rao:
Non-Technical skills needed by cyber security graduates. EDUCON 2020: 354-358
2010 – 2019
- 2017
- [j8]V. Alvarez, Félix Gudiel, María-Belén Güemes, Kathy J. Horadam, Asha Rao:
Diagram versus bundle equivalence for ℤt × ℤ22-cocyclic Hadamard matrices. Bull. ICA 81: 63-77 (2017) - [i9]Diane M. Donovan, Asha Rao, Emine Sule Yazici:
High Rate LDPC Codes from Difference Covering Arrays. CoRR abs/1701.05686 (2017) - 2016
- [j7]Fatih Demirkale, Diane M. Donovan, Joanne L. Hall, Abdollah Khodkar, Asha Rao:
Difference Covering Arrays and Pseudo-Orthogonal Latin Squares. Graphs Comb. 32(4): 1353-1374 (2016) - [c16]Scott Cox, Kathy J. Horadam, Asha Rao:
The spread of ideas in a weighted threshold network. COMPLEX NETWORKS 2016: 437-447 - [c15]Jessica Liebig, Mohammad Adib Khairuddin, Asha Rao:
Online election campaigning: Identifying political parties using likes and comments. COMPLEX NETWORKS 2016: 619-630 - [i8]Li Sun, Steven Versteeg, Serdar Boztas, Asha Rao:
Detecting Anomalous User Behavior Using an Extended Isolation Forest Algorithm: An Enterprise Case Study. CoRR abs/1609.06676 (2016) - 2015
- [j6]Pritheega Magalingam, Stephen Davis, Asha Rao:
Using shortest path to discover criminal community. Digit. Investig. 15: 1-17 (2015) - [c14]Mani Williams, Jane Burry, Asha Rao:
Graph mining indoor tracking data for social interaction analysis. PerCom Workshops 2015: 2-7 - [c13]Mani Williams, Jane Burry, Asha Rao, Nathan Williams:
A system for tracking and visualizing social interactions in a collaborative work environment. SpringSim (SimAUD) 2015: 1-4 - [i7]Jessica Liebig, Asha Rao:
Predicting Item Popularity: Analysing Local Clustering Behaviour of Users. CoRR abs/1503.04404 (2015) - [i6]Pritheega Magalingam, Asha Rao, Stephen Davis:
Identifying a Criminal's Network of Trust. CoRR abs/1503.04896 (2015) - [i5]Pritheega Magalingam, Stephen Davis, Asha Rao:
Using shortest path to discover criminal community. CoRR abs/1503.06289 (2015) - [i4]Pritheega Magalingam, Stephen Davis, Asha Rao:
Ranking the Importance Level of Intermediaries to a Criminal using a Reliance Measure. CoRR abs/1506.06221 (2015) - [i3]Jessica Liebig, Asha Rao:
A fast and simple method of extracting the backbone of one-mode projections: An aid in the detection of communities. CoRR abs/1512.01883 (2015) - 2014
- [c12]Pritheega Magalingam, Asha Rao, Stephen Davis:
Identifying a Criminal's Network of Trust. SITIS 2014: 309-316 - [c11]Jessica Liebig, Asha Rao:
Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient. SITIS 2014: 323-330 - [i2]Jessica Liebig, Asha Rao:
A Clustering Coefficient to Identify Important Nodes in Bipartite Networks. CoRR abs/1406.5814 (2014) - 2013
- [j5]Asha Rao:
Kathy Horadam: sixty. Australas. J Comb. 55: 3-4 (2013) - [j4]Joanne L. Hall, Asha Rao, Stephen M. Gagola III:
A Family of Alltop Functions that are EA-Inequivalent to the Cubic Function. IEEE Trans. Commun. 61(11): 4722-4727 (2013) - [c10]Jason Jeffers, Kathy J. Horadam, C. J. Carstens, Asha Rao, Serdar Boztas:
Influence Neighbourhoods in CiteSeer: A Case Study. SITIS 2013: 612-618 - 2012
- [c9]Joanne L. Hall, Asha Rao, Diane M. Donovan:
Planar difference functions. ISIT 2012: 1082-1086 - [i1]Joanne L. Hall, Asha Rao, Diane M. Donovan:
Planar Difference Functions. CoRR abs/1205.3310 (2012) - 2010
- [j3]Asha Rao, Diane M. Donovan, Joanne L. Hall:
Mutually orthogonal Latin squares and mutually unbiased bases in dimensions of odd prime power - MOLS and MUBs in odd prime power dimensions. Cryptogr. Commun. 2(2): 221-231 (2010) - [j2]Asha Rao, Nimalsiri Pinnawala:
A family of two-weight irreducible cyclic codes. IEEE Trans. Inf. Theory 56(6): 2568-2570 (2010)
2000 – 2009
- 2007
- [c8]P. Embury, Asha Rao:
A Path to Hadamard Matrices. AAECC 2007: 281-290 - [c7]Nimalsiri Pinnawala, Asha Rao, T. Aaron Gulliver:
Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over GF ( p , 2). AAECC 2007: 311-320 - 2006
- [c6]Simon McNicol, Serdar Boztas, Asha Rao:
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs. AAECC 2006: 215-224 - [c5]Kathy J. Horadam, Asha Rao:
Fourier Transforms from a Weighted Trace Map. ISIT 2006: 1080-1084 - 2005
- [c4]Asha Rao, Nimalsiri Pinnawala:
New linear codes over Zps via the trace map. ISIT 2005: 124-126 - [c3]Simon McNicol, Serdar Boztas, Asha Rao:
Traitor tracing against powerful attacks. ISIT 2005: 1878-1882 - 2004
- [j1]Nimalsiri Pinnawala, Asha Rao:
Cocyclic Simplex Codes of Type alpha Over mmb Z4 and mmb Z2s. IEEE Trans. Inf. Theory 50(9): 2165-2169 (2004) - [c2]Joselíto J. Chua, Asha Rao:
An Image-Guided Heuristic for Planning an Exhaustive Enumeration. HIS 2004: 136-141 - 2003
- [c1]Tom Cribb, Asha Rao:
An Information Security Management Model. Security and Management 2003: 654-657
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 23:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint