K
v
ire
.com
←
Back
Night
Docs
Library
Review
…
Author
Kim‐Kwang Raymond Choo
also known as Choo, Kim, Choo, Kim-Kwang Raymon, Choo, Kim-Kwang Raymond
Texas A&M University – San Antonio · Netherlands Forensic Institute · The University of Texas at San Antonio · Australian Institute of Criminology
About this author
Works
1,460
Cited by
63,758
h-index
124
i10
902
ORCID ↗
Top papers
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
Christian Esposito, Alfredo De Santis, Genny Tortora, et al.
·
2018
·
IEEE Cloud Computing
↗ 845
Blockchain in healthcare applications: Research challenges and opportunities
Thomas McGhin, Kim‐Kwang Raymond Choo, Charles Zhechao Liu, et al.
·
2019
·
Journal of Network and Computer Applications
↗ 844
A systematic literature review of blockchain cyber security
Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, et al.
·
2019
·
Digital Communications and Networks
↗ 618
OA
A blockchain future for internet of things security: a position paper
Mandrita Banerjee, Junghee Lee, Kim‐Kwang Raymond Choo
·
2017
·
Digital Communications and Networks
↗ 582
OA
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
Nour Moustafa, Benjamin Turnbull, Kim‐Kwang Raymond Choo
·
2018
·
IEEE Internet of Things Journal
↗ 553
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, et al.
·
2016
·
IEEE Transactions on Emerging Topics in Computing
↗ 490
OA
Blockchain based searchable encryption for electronic health record sharing
Lanxiang Chen, Wai‐Kong Lee, Chin‐Chen Chang, et al.
·
2019
·
Future Generation Computer Systems
↗ 484
The cyber threat landscape: Challenges and future research directions
Kim‐Kwang Raymond Choo
·
2011
·
Computers & Security
↗ 448
A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
Osama Alkadi, Nour Moustafa, Benjamin Turnbull, et al.
·
2020
·
IEEE Internet of Things Journal
↗ 444
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
Hamed HaddadPajouh, Ali Dehghantanha, Raouf Khayami, et al.
·
2018
·
Future Generation Computer Systems
↗ 436
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
Shuyun Shi, Debiao He, Li Li, et al.
·
2020
·
Computers & Security
↗ 405
OA
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
Chao Lin, Debiao He, Xinyi Huang, et al.
·
2018
·
Journal of Network and Computer Applications
↗ 405