Asha Rao
RMIT University
H-index: 14
Oceania-Australia
Top articles of Asha Rao
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Structuring the Chaos: Enabling Small Business Cyber-Security Risks & Assets Modelling with a UML Class Model | arXiv preprint arXiv:2403.14872 | Tracy Tam Asha Rao Joanne Hall | 2024/3/21 |
Comparative study of post-impact motion control of a flexible arm space robot | European Journal of Control | Sharmila Kayastha Jayantha Katupitiya Garth Pearce Asha Rao | 2023/1/1 |
QC-LDPC Codes from Difference Matrices and Difference Covering Arrays | IEEE Access | Diane M Donovan Asha Rao Elif Üsküplü E Şule Yazici | 2023/5/23 |
Detecting inner-LAN anomalies using hierarchical forecasting | arXiv preprint arXiv:2304.13941 | Sevvandi Kandanaarachchi Mahdi Abolghasemi Hideya Ochiai Asha Rao | 2023/4/27 |
Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme | M. Khan A. Rao J. Camtepe S. and Pieprzyk | 2023 | |
Enabling Teamwork in Cybersecurity Courses | Joanne L Hall Asha Rao | 2012/2/24 | |
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection | Expert Systems with Applications | Sevvandi Kandanaarachchi Hideya Ochiai Asha Rao | 2022/9/1 |
High-rate LDPC codes from partially balanced incomplete block designs | Journal of Algebraic Combinatorics | Diane Donovan Aiden Price Asha Rao Elif Üsküplü Emine ŞYazıcı | 2022/2 |
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses | Tracy Tam Asha Rao Joanne Hall | 2021/10/1 | |
Rapid Cybersecurity Assessment System for Small Business’ COVID Move to Online | Tracy Tam Asha Rao Joanne Hall | 2021 | |
The invisible COVID-19 small business risks: Dealing with the cyber-security aftermath | Digital Government: Research and Practice | Tracy Tam Asha Rao Joanne Hall | 2020/12/29 |
Lightweight cryptographic protocols for IoT-constrained devices: A survey | IEEE Internet of Things Journal | Muhammad Nauman Khan Asha Rao Seyit Camtepe | 2020/9/24 |
Non-Technical skills needed by cyber security graduates | Joanne L Hall Asha Rao | 2020/4/27 |