Joanne L. Hall
RMIT University
H-index: 7
Oceania-Australia
Top articles of Joanne L. Hall
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Structuring the Chaos: Enabling Small Business Cyber-Security Risks & Assets Modelling with a UML Class Model | arXiv preprint arXiv:2403.14872 | Tracy Tam Asha Rao Joanne Hall | 2024/3/21 |
Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing | arXiv preprint arXiv:2309.00915 | Joanne L Hall Yuval Hertzog Michael Loewy Matthew P Skerritt Dominique Valladolid | 2023/9/2 |
Bounds on data limits for all-to-all comparison from combinatorial designs | arXiv preprint arXiv:2309.00213 | Joanne Hall Daniel Horsley Douglas R Stinson | 2023/9/1 |
Optimal Data Distribution for Big-Data All-to-All Comparison using Finite Projective and Affine Planes | arXiv preprint arXiv:2308.15000 | Joanne L Hall Wayne Kelly Yu-Chu Tian | 2023/8/29 |
Refining the search space of Alltop monomials | Journal of Algebraic Combinatorics | Aiden Price Joanne Hall Harry Bartlett | 2023/5 |
Gender dimensions of the Australian cyber security sector-report | Australian Women in Security Network | Leonora Risse Maria Beamond Joanne Hall Ying Wang Matthew Warren | 2023 |
Age Bias in Finger Vein Biometric Research | Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP 2022) | Joanne Hall Jomin John Jessica Liebig Anju Skariah | 2022 |
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses | Tracy Tam Asha Rao Joanne Hall | 2021/10/1 | |
Rapid Cybersecurity Assessment System for Small Business’ COVID Move to Online | Tracy Tam Asha Rao Joanne Hall | 2021 | |
The Invisible COVID-19 Small Business Risks: Dealing with the Cyber-Security Aftermath | Digital Government: Research and Practice | Tracy Tam Asha Rao Joanne Hall | 2020/12/29 |
Non-Technical skills needed by cyber security graduates | Joanne L Hall Asha Rao | 2020/4/27 |