Kim-Kwang Raymond Choo
Kim-Kwang Raymond Choo
Cloud Technology Endowed Professorship, University of Texas at San Antonio
Verified email at utsa.edu - Homepage
TitleCited byYear
The cyber threat landscape: Challenges and future research directions
KKR Choo
Computers & Security 30 (8), 719–731, 2011
3682011
An integrated conceptual digital forensic framework for cloud computing
B Martini, KKR Choo
Digital Investigation 9 (2), 71-80, 2012
2052012
Examining indistinguishability-based proof models for key establishment protocols
KKR Choo, C Boyd, Y Hitchcock
Advances in Cryptology-ASIACRYPT 2005, 585-604, 2005
1842005
Impacts of increasing volume of digital forensic data: A survey and future research challenges
D Quick, KKR Choo
Digital Investigation 11 (4), 273-294, 2014
1572014
Google Drive: Forensic Analysis of Cloud Storage Data Remnants
D Quick, KKR Choo
Journal of Network and Computer Applications 40, 179--193, 2014
1462014
Dropbox analysis: Data remnants on user machines
D Quick, KKR Choo
Digital Investigation 10 (1), 3--18, 2013
1392013
Cloud storage forensics: ownCloud as a case study
B Martini, KKR Choo
Digital Investigation 10 (4), 287–299, 2013
1362013
Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework
O Osanaiye, KKR Choo, M Dlodlo
Journal of Network and Computer Applications 67, 147-165, 2016
1352016
A survey of information security incident handling in the cloud
NH Ab Rahman, KKR Choo
Computers & Security 49, 45–69, 2015
1302015
Cloud Storage Forensics
D Quick, B Martini, KKR Choo
Syngress: An Imprint of Elsevier, 2014
1292014
Cloud computing: challenges and future directions
KKR Choo
Trends & issues in crime and criminal justice 400, 1--6, 2010
1282010
Organised crime groups in cyberspace: a typology
KKR Choo
Trends in organized crime 11 (3), 270-295, 2008
1252008
From cloud to fog computing: A review and a conceptual live VM migration framework
O Osanaiye, S Chen, Z Yan, R Lu, K Choo, M Dlodlo
IEEE Access 5, 8284-8300, 2017
1072017
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo
EURASIP Journal on Wireless Communications and Networking 2016 (1), 1-10, 2016
1052016
Digital droplets: Microsoft SkyDrive forensic data remnants
D Quick, KKR Choo
Future Generation Computer Systems 29 (6), 1378–1394, 2013
1042013
Anonymous Mutual Authentication and Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks
X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo
Computer Networks 129 (2), 429–443, 2017
982017
Errors in computational complexity proofs for protocols
KKR Choo, C Boyd, Y Hitchcock
Advances in Cryptology-ASIACRYPT 2005, 624-643, 2005
982005
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
D Quick, KKR Choo
Digital Investigation 10 (3), 266–277, 2013
972013
Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media
Z Xu, H Zhang, V Sugumaran, KKR Choo, L Mei, Y Zhu
EURASIP Journal on Wireless Communications and Networking 2016 (1), 1-9, 2016
96*2016
Criminal exploitation of online systems by organised crime groups
KKR Choo, RG Smith
Asian journal of criminology 3 (1), 37-59, 2008
952008
The system can't perform the operation now. Try again later.
Articles 1–20