Dr Sye Loong Keoh

  • Associate Professor (University of Glasgow Singapore)
  • Associate Professor (School of Computing Science)

telephone: +65 6908 6042
email: SyeLoong.Keoh@glasgow.ac.uk

School of Computing Science, University of Glasgow, SIT Building @RP Campus, Republic Polytechnic, 43, Woodlands Ave 9, Singapore 737729

ORCID iDhttps://orcid.org/0000-0003-3640-5010

Biography

Sye-Loong Keoh is an Associate Professor in the School of Computing Science, University of Glasgow (UofG, Singapore campus) and the Director of Research Programmes in UofG Singapore. He holds a Ph.D. in computing science from Imperial College London. Prior to joining Glasgow, he was a Senior Scientist at Philips Research Eindhoven, The Netherlands. His areas of expertise include cyber security for Internet of Things (IoT), lightweight security systems for cyber-physical systems, and policy-based security management for pervasive and distributed systems.

He leads the cyber-security research activities in UofG Singapore where he has designed several lightweight authentication protocols and key management schemes for IoT, building management and industrial control systems. More recently, he is researching on new techniques for securing end-to-end communication and ensuring data provenance in IoT environment. While working at Philips Research, he was responsible for standardizing Marlin Digital Rights Management (DRM) technology for content protection, and lightweight security protocols for Philips’s IoT-based lighting systems.

Personal site: http://www.dcs.gla.ac.uk/~sye

Research interests

  • Security Protocol Design
  • Authentication and Access Control Model
  • Wireless Sensor Networks
  • Pervasive Computing and 5G Communication Security
  • Internet of Things
  • Urban Mobility
  • Trusted AI

Publications

List by: Type | Date

Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2005 | 2004 | 2002
Number of items: 57.

2020

Zhou, X. and Keoh, S. L. (2020) Deployment of Facial Recognition Models at the Edge: a Feasibility Study. In: 2020 21st Asia Pacific Network Operations and Management Symposium (APNOMS), Daegu, South Korea, 23-25 Sep 2020, (Accepted for Publication)

Xin, X., Keoh, S. L. , Sevegnani, M. and Saerbeck, M. (2020) Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. In: IEEE International Conference on Smart Internet of Things (IEEE SmartIoT 2020), Beijing, China, 14-16 Aug 2020, (Accepted for Publication)

Ahmad, I., Yau, K.-L. A., Mee Hong, L. and Keoh, S. L. (2020) Trust and reputation management for securing collaboration in 5G access networks: the road ahead. IEEE Access, (doi: 10.1109/ACCESS.2020.2984318) (Early Online Publication)

Keoh, S. L. , Tan, H. C. and Tang, Z. (2020) Authentication and integrity protection for real-time cyber-physical systems. In: Tian, Y.-C. and Levi, D. C. (eds.) Handbook of Real-Time Computing. Springer: Singapore. ISBN 9789814585873 (doi:10.1007/978-981-4585-87-3_39-1)

Lee, Z. E., Chua, R. L. H., Keoh, S. L. and Ohba, Y. (2020) Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications. In: IEEE GLOBECOM 2019, Waikoloa, HI, USA, 09-13 Dec 2019, ISBN 9781728109626 (doi:10.1109/GLOBECOM38437.2019.9013329)

Lim, L. H. I. , Goh, C. S., Davies, J. , Yang, H. , Keoh, S. L. , Howes, D. and Dale, V. (2020) Evaluation of Student and Staff Perceptions on L&T Models Across Multiple Disciplines. Applied Learning Conference 2020, Singapore, 30-31 Jan 2020.

2019

Lam, T. C. Y., Yew, S. S. L. and Keoh, S. L. (2019) Bluetooth Mesh Networking: an Enabler of Smart Factory Connectivity and Management. In: The 20th Asia-Pacific Network Operations and Management Symposium (APNOMS 2019), Matsue, Japan, 18-21 Sep 2019, ISBN 9784885523205 (doi:10.23919/APNOMS.2019.8893091)

Gunady, S. and Keoh, S. L. (2019) A Non-GPS Based Location Tracking of Public Buses using Bluetooth Proximity Beacons. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15-18 Apr 2019, ISBN 9781538649800 (doi:10.1109/WF-IoT.2019.8767198)

2018

Lim, B. S., Keoh, S. L. and Thing, V. L.L. (2018) Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, ISBN 9781467399449 (doi:10.1109/WF-IoT.2018.8355132)

Ng, J., Keoh, S. L. , Tang, Z. and Ko, H. (2018) SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 219-224. ISBN 9781467399449 (doi:10.1109/WF-IoT.2018.8355106)

Tan, H. C., Lim, K., Keoh, S. L. , Tang, Z., Leong, D. and Sum, C. S. (2018) Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 225-230. ISBN 9781467399449 (doi:10.1109/WF-IoT.2018.8355112)

Chan, F. M., Xu, Q., Seah, H. J., Tang, Z., Keoh, S. L. and Aung, K. M. M. (2018) Privacy Preserving Computation in Home Loans using the FRESCO Framework. In: Future of Information and Communication Conference (FICC), Singapore, 05-06 Apr 2018, ISBN 9783030034047 (doi:10.1007/978-3-030-03405-4_7)

2017

Chia, M. H., Keoh, S. L. and Tang, Z. (2017) Secure Data Provenance in Home Energy Monitoring Networks. In: The 3rd Industrial Control System Security Workshop (ICSS), Orlando, FL, USA, 05 Dec 2017, pp. 7-14. ISBN 9781450363334 (doi:10.1145/3174776.3174778)

Bin Othman, M. S., Keoh, S. L. and Tan, G. (2017) Efficient Journey Planning and Congestion Prediction Through Deep Learning. In: The Third IEEE Annual International Smart Cities Conference (ISC2 2017), Wuxi, China, 14-17 Sep 2017, ISBN 9781538625248 (doi:10.1109/ISC2.2017.8090805)

Ko, H., Jin, J. and Keoh, S. L. (2017) ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. In: 3rd ACM Cyber-Physical System Security Workshop (CPSS), Abu Dhabi, UAE, 02 Apr 2017, pp. 69-80. ISBN 9781450349567 (doi:10.1145/3055186.3055194)

Sim, L. J. H., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2017) A Cloud Authentication Protocol using One-Time Pad. In: IEEE Technologies for Smart Nation (TENCON), Marina Bay Sands, Singapore, 22-25 Nov 2016, pp. 2513-2516. ISBN 9781509025978 (doi:10.1109/TENCON.2016.7848486)

Yin, X. and Keoh, S. L. (2017) Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control. In: IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12-14 Dec 2016, pp. 666-671. ISBN 9781509041305 (doi:10.1109/WF-IoT.2016.7845398)

Ko, H., Keoh, S. L. and Jin, J. (2017) Privacy protection for cloud-based robotic networks. In: Houbing, S., Fink, G. A. and Jeschke, S. (eds.) Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. Wiley: Chichester. ISBN 9781119226048 (doi:10.1002/9781119226079.ch10)

2016

Ko, H., Jin, J. and Keoh, S. L. (2016) Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet of Things Journal, 3(6), pp. 1006-1014. (doi: 10.1109/JIOT.2016.2545926)

Syed, A. R., Yau, K.-L. A., Qadir, J., Mohamad, H., Ramli, N. and Keoh, S. L. (2016) Route selection for multi-hop cognitive radio networks using reinforcement learning: an experimental study. IEEE Access, 4, pp. 6304-6324. (doi: 10.1109/ACCESS.2016.2613122)

Ang, Y. H., Keoh, S. L. and Tang, Z. (2016) Privacy-preserving spatial and temporal aggregation of smart energy data. Journal of Information Assurance and Security, 11(4), pp. 214-222.

Lim, W. L. H., Lum, J. T. W., Yeo, I. J. W. and Keoh, S. L. (2016) A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait. In: First International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, Sydney, Australia, 14-18 Mar 2016, pp. 1-6. ISBN 9781509019410 (doi:10.1109/PERCOMW.2016.7457088)

2015

Keoh, S. L. , Ang, Y. H. and Tang, Z. (2015) A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data. In: IEEE 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 Dec 2015,

Keoh, S. L. , Au, K. W. K. and Tang, Z. (2015) Securing Industrial Control System: An End-to-End Integrity Verification Approach. In: Industrial Control System Security (ICSS) Workshop in conjunction with 31st Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, 8 Dec 2015,

Chuan, W. B., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2015) Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage. In: International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, Asia, 26-27 Oct 2015,

2014

Keoh, S. L. and Tang, Z. (2014) Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In: IEEE 10th International Conference on Information Assurrance and Security (IAS), Okinawa, Japan, 27 - 29 Nov 2014,

Keoh, S. L. , Kumar, S. S. and Tschofenig, H. (2014) Securing the Internet of Things: a standardization perspective. IEEE Internet of Things Journal, 1(3), pp. 265-275. (doi: 10.1109/JIOT.2014.2323395)

2013

Soni, A., Keoh, S.L. , Kumar, S.S. and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, Leicester, UK, 16-17 Sep 2013,

Garcia-Morchon, O., Keoh, S.L. , Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F. and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 17 Apr 2013, pp. 119-124. (doi:10.1145/2462096.2462117)

Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets. .

Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S. and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25-28 Mar 2013, pp. 1331-1336. (doi:10.1109/WAINA.2013.158)

Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems. .

2012

Brachmann, M., Keoh, S.L. , Morchon, O.G. and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 Jul - 2 Aug 2012, pp. 1-5. (doi:10.1109/ICCCN.2012.6289292)

Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations. .

Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption. .

2011

Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L. , Kumar, S.S. and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61(3), pp. 527-542. (doi: 10.1007/s11277-011-0385-5)

Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49(11), pp. 174-180. (doi: 10.1109/MCOM.2011.6069726)

Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), Kyoto, Japan, 5 - 9 Jun 2011, pp. 1-6. (doi:10.1109/icc.2011.5962805)

Keoh, S.L. , Asim, M., Kumar, S.S. and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), San Francisco, CA, USA, 12 Jun 2011,

2010

Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666

2009

Zhu, Y., Keoh, S.L. , Sloman, M. and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6(3), pp. 137-148. (doi: 10.1109/TNSM.2009.03.090301)

Keoh, S.L. , Lupu, E. and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9-13 Mar 2009, pp. 1-6. (doi:10.1109/PERCOM.2009.4912756)

Keoh, S.L. and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management, Chicago, IL, USA, 9 Nov 2009, pp. 29-38. (doi:10.1145/1655048.1655054)

Zhu, Y., Sloman, M., Lupu, E. and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., London, UK, 1-3 Apr 2009, (doi:10.4108/ICST.PERVASIVEHEALTH2009.5939)

2008

Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L. and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20(3), pp. 277-295. (doi: 10.1002/cpe.1194)

Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L. , Lobo, J. and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), Bremen, Germany, 1-3 Jul 2008, pp. 1-14. (doi:10.1007/978-3-540-70587-1_1)

Yanmin, Z., Keoh, S.L. , Sloman, M., Lupu, E., Yu, Z., Dulay, N. and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 Sep - 2 Oct 2008, pp. 428-433. (doi:10.1109/MAHSS.2008.4660033)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08., Melbourne, Australia, 8-10 Dec 2008, pp. 383-390. (doi:10.1109/ICPADS.2008.52)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), Hong Kong, China, 1-3 Jun 2008, pp. 37-40. (doi:10.1109/ISSMDBS.2008.4575010)

2007

Keoh, S.L. , Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, USA, 6-10 Aug 2007, pp. 1-5. (doi:10.1109/MOBIQ.2007.4451009)

Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), Aachen, Germany, 26-28 March 2007, pp. 92-98.

Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L. , Twidle, K., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, Cambridge, MA, USA, 9-11 Jul 2007, pp. 224-236. (doi:10.1109/SASO.2007.64)

Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L. , Lupu, E., Schaeffer-Filho, A.E., Sloman, M. and Sventek, J.S. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.

2005

Keoh, S.L. and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, Boppard, Germany, 5-8 April 2005, pp. 210-224. (doi:10.1007/978-3-540-32004-3_21)

2004

Keoh, S.L. , Lupu, E. and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 6-10 Dec, 2004, pp. 386-395. (doi:10.1109/CSAC.2004.26)

Keoh, S.L. and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, Paris, France, 20-23 Jun 2004,

2002

Keoh, S.L. and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), Toulouse, France, 30-31 Oct, 2002, pp. 58-65. (doi:10.1145/584490.584503)

This list was generated on Thu Aug 13 08:08:01 2020 BST.
Number of items: 57.

Articles

Ahmad, I., Yau, K.-L. A., Mee Hong, L. and Keoh, S. L. (2020) Trust and reputation management for securing collaboration in 5G access networks: the road ahead. IEEE Access, (doi: 10.1109/ACCESS.2020.2984318) (Early Online Publication)

Ko, H., Jin, J. and Keoh, S. L. (2016) Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet of Things Journal, 3(6), pp. 1006-1014. (doi: 10.1109/JIOT.2016.2545926)

Syed, A. R., Yau, K.-L. A., Qadir, J., Mohamad, H., Ramli, N. and Keoh, S. L. (2016) Route selection for multi-hop cognitive radio networks using reinforcement learning: an experimental study. IEEE Access, 4, pp. 6304-6324. (doi: 10.1109/ACCESS.2016.2613122)

Ang, Y. H., Keoh, S. L. and Tang, Z. (2016) Privacy-preserving spatial and temporal aggregation of smart energy data. Journal of Information Assurance and Security, 11(4), pp. 214-222.

Keoh, S. L. , Kumar, S. S. and Tschofenig, H. (2014) Securing the Internet of Things: a standardization perspective. IEEE Internet of Things Journal, 1(3), pp. 265-275. (doi: 10.1109/JIOT.2014.2323395)

Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L. , Kumar, S.S. and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61(3), pp. 527-542. (doi: 10.1007/s11277-011-0385-5)

Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49(11), pp. 174-180. (doi: 10.1109/MCOM.2011.6069726)

Zhu, Y., Keoh, S.L. , Sloman, M. and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6(3), pp. 137-148. (doi: 10.1109/TNSM.2009.03.090301)

Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L. and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20(3), pp. 277-295. (doi: 10.1002/cpe.1194)

Books

Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666

Book Sections

Keoh, S. L. , Tan, H. C. and Tang, Z. (2020) Authentication and integrity protection for real-time cyber-physical systems. In: Tian, Y.-C. and Levi, D. C. (eds.) Handbook of Real-Time Computing. Springer: Singapore. ISBN 9789814585873 (doi:10.1007/978-981-4585-87-3_39-1)

Ko, H., Keoh, S. L. and Jin, J. (2017) Privacy protection for cloud-based robotic networks. In: Houbing, S., Fink, G. A. and Jeschke, S. (eds.) Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications. Wiley: Chichester. ISBN 9781119226048 (doi:10.1002/9781119226079.ch10)

Research Reports or Papers

Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L. , Lupu, E., Schaeffer-Filho, A.E., Sloman, M. and Sventek, J.S. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.

Conference or Workshop Item

Lim, L. H. I. , Goh, C. S., Davies, J. , Yang, H. , Keoh, S. L. , Howes, D. and Dale, V. (2020) Evaluation of Student and Staff Perceptions on L&T Models Across Multiple Disciplines. Applied Learning Conference 2020, Singapore, 30-31 Jan 2020.

Conference Proceedings

Zhou, X. and Keoh, S. L. (2020) Deployment of Facial Recognition Models at the Edge: a Feasibility Study. In: 2020 21st Asia Pacific Network Operations and Management Symposium (APNOMS), Daegu, South Korea, 23-25 Sep 2020, (Accepted for Publication)

Xin, X., Keoh, S. L. , Sevegnani, M. and Saerbeck, M. (2020) Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 Applications. In: IEEE International Conference on Smart Internet of Things (IEEE SmartIoT 2020), Beijing, China, 14-16 Aug 2020, (Accepted for Publication)

Lee, Z. E., Chua, R. L. H., Keoh, S. L. and Ohba, Y. (2020) Performance Evaluation of Big Data Processing at the Edge for IoT-Blockchain Applications. In: IEEE GLOBECOM 2019, Waikoloa, HI, USA, 09-13 Dec 2019, ISBN 9781728109626 (doi:10.1109/GLOBECOM38437.2019.9013329)

Lam, T. C. Y., Yew, S. S. L. and Keoh, S. L. (2019) Bluetooth Mesh Networking: an Enabler of Smart Factory Connectivity and Management. In: The 20th Asia-Pacific Network Operations and Management Symposium (APNOMS 2019), Matsue, Japan, 18-21 Sep 2019, ISBN 9784885523205 (doi:10.23919/APNOMS.2019.8893091)

Gunady, S. and Keoh, S. L. (2019) A Non-GPS Based Location Tracking of Public Buses using Bluetooth Proximity Beacons. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15-18 Apr 2019, ISBN 9781538649800 (doi:10.1109/WF-IoT.2019.8767198)

Lim, B. S., Keoh, S. L. and Thing, V. L.L. (2018) Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, ISBN 9781467399449 (doi:10.1109/WF-IoT.2018.8355132)

Ng, J., Keoh, S. L. , Tang, Z. and Ko, H. (2018) SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 219-224. ISBN 9781467399449 (doi:10.1109/WF-IoT.2018.8355106)

Tan, H. C., Lim, K., Keoh, S. L. , Tang, Z., Leong, D. and Sum, C. S. (2018) Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation. In: IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 05-08 Feb 2018, pp. 225-230. ISBN 9781467399449 (doi:10.1109/WF-IoT.2018.8355112)

Chan, F. M., Xu, Q., Seah, H. J., Tang, Z., Keoh, S. L. and Aung, K. M. M. (2018) Privacy Preserving Computation in Home Loans using the FRESCO Framework. In: Future of Information and Communication Conference (FICC), Singapore, 05-06 Apr 2018, ISBN 9783030034047 (doi:10.1007/978-3-030-03405-4_7)

Chia, M. H., Keoh, S. L. and Tang, Z. (2017) Secure Data Provenance in Home Energy Monitoring Networks. In: The 3rd Industrial Control System Security Workshop (ICSS), Orlando, FL, USA, 05 Dec 2017, pp. 7-14. ISBN 9781450363334 (doi:10.1145/3174776.3174778)

Bin Othman, M. S., Keoh, S. L. and Tan, G. (2017) Efficient Journey Planning and Congestion Prediction Through Deep Learning. In: The Third IEEE Annual International Smart Cities Conference (ISC2 2017), Wuxi, China, 14-17 Sep 2017, ISBN 9781538625248 (doi:10.1109/ISC2.2017.8090805)

Ko, H., Jin, J. and Keoh, S. L. (2017) ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. In: 3rd ACM Cyber-Physical System Security Workshop (CPSS), Abu Dhabi, UAE, 02 Apr 2017, pp. 69-80. ISBN 9781450349567 (doi:10.1145/3055186.3055194)

Sim, L. J. H., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2017) A Cloud Authentication Protocol using One-Time Pad. In: IEEE Technologies for Smart Nation (TENCON), Marina Bay Sands, Singapore, 22-25 Nov 2016, pp. 2513-2516. ISBN 9781509025978 (doi:10.1109/TENCON.2016.7848486)

Yin, X. and Keoh, S. L. (2017) Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control. In: IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12-14 Dec 2016, pp. 666-671. ISBN 9781509041305 (doi:10.1109/WF-IoT.2016.7845398)

Lim, W. L. H., Lum, J. T. W., Yeo, I. J. W. and Keoh, S. L. (2016) A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait. In: First International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, Sydney, Australia, 14-18 Mar 2016, pp. 1-6. ISBN 9781509019410 (doi:10.1109/PERCOMW.2016.7457088)

Keoh, S. L. , Ang, Y. H. and Tang, Z. (2015) A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data. In: IEEE 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 Dec 2015,

Keoh, S. L. , Au, K. W. K. and Tang, Z. (2015) Securing Industrial Control System: An End-to-End Integrity Verification Approach. In: Industrial Control System Security (ICSS) Workshop in conjunction with 31st Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, 8 Dec 2015,

Chuan, W. B., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2015) Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage. In: International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, Asia, 26-27 Oct 2015,

Keoh, S. L. and Tang, Z. (2014) Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In: IEEE 10th International Conference on Information Assurrance and Security (IAS), Okinawa, Japan, 27 - 29 Nov 2014,

Soni, A., Keoh, S.L. , Kumar, S.S. and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, Leicester, UK, 16-17 Sep 2013,

Garcia-Morchon, O., Keoh, S.L. , Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F. and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 17 Apr 2013, pp. 119-124. (doi:10.1145/2462096.2462117)

Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S. and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25-28 Mar 2013, pp. 1331-1336. (doi:10.1109/WAINA.2013.158)

Brachmann, M., Keoh, S.L. , Morchon, O.G. and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 Jul - 2 Aug 2012, pp. 1-5. (doi:10.1109/ICCCN.2012.6289292)

Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), Kyoto, Japan, 5 - 9 Jun 2011, pp. 1-6. (doi:10.1109/icc.2011.5962805)

Keoh, S.L. , Asim, M., Kumar, S.S. and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), San Francisco, CA, USA, 12 Jun 2011,

Keoh, S.L. , Lupu, E. and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9-13 Mar 2009, pp. 1-6. (doi:10.1109/PERCOM.2009.4912756)

Keoh, S.L. and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management, Chicago, IL, USA, 9 Nov 2009, pp. 29-38. (doi:10.1145/1655048.1655054)

Zhu, Y., Sloman, M., Lupu, E. and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., London, UK, 1-3 Apr 2009, (doi:10.4108/ICST.PERVASIVEHEALTH2009.5939)

Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L. , Lobo, J. and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), Bremen, Germany, 1-3 Jul 2008, pp. 1-14. (doi:10.1007/978-3-540-70587-1_1)

Yanmin, Z., Keoh, S.L. , Sloman, M., Lupu, E., Yu, Z., Dulay, N. and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 Sep - 2 Oct 2008, pp. 428-433. (doi:10.1109/MAHSS.2008.4660033)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08., Melbourne, Australia, 8-10 Dec 2008, pp. 383-390. (doi:10.1109/ICPADS.2008.52)

Zhu, Y., Keoh, S.L. , Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), Hong Kong, China, 1-3 Jun 2008, pp. 37-40. (doi:10.1109/ISSMDBS.2008.4575010)

Keoh, S.L. , Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, USA, 6-10 Aug 2007, pp. 1-5. (doi:10.1109/MOBIQ.2007.4451009)

Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), Aachen, Germany, 26-28 March 2007, pp. 92-98.

Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L. , Twidle, K., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, Cambridge, MA, USA, 9-11 Jul 2007, pp. 224-236. (doi:10.1109/SASO.2007.64)

Keoh, S.L. and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, Boppard, Germany, 5-8 April 2005, pp. 210-224. (doi:10.1007/978-3-540-32004-3_21)

Keoh, S.L. , Lupu, E. and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 6-10 Dec, 2004, pp. 386-395. (doi:10.1109/CSAC.2004.26)

Keoh, S.L. and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, Paris, France, 20-23 Jun 2004,

Keoh, S.L. and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), Toulouse, France, 30-31 Oct, 2002, pp. 58-65. (doi:10.1145/584490.584503)

Patents

Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets. .

Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems. .

Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations. .

Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption. .

This list was generated on Thu Aug 13 08:08:01 2020 BST.

Grants

  1. Research on Science & Technology Policy and its Operating Mechanism of Intelligent Manufacturing in South East Asia (东南亚“智能制造领域”科技与政策系统及其运行机制研究)
    International Science & Technology Organisation Cooperation Platform Construction Project of Belt and Road, China Association for Science & Technology(中国科协“一带一路”国际科技组织合作平台建设项目
    Project Duration: 2020 - 2021
    Consortium: Xiamen Huaqiao University 華僑大學 (China), Universiti TAR (Malaysia), National Institute of Development Administration (Thailand), ASEAN Academy of Engineering and Technology (Cambodia), Institution of Architects, Engineers and Surveyors (Brunei Darussalam), University of Glasgow (Singapore)

  2. Functional Risk for AV using AI Hybrid Deterministic Method
    Singapore Institute of Technology Ignition Grant
    Project Duration: 2019 - 2021
    Award: S$249,000
    Consortium: Singapore Institute of Technology, University of Glasgow (UofG, UGS), Moovita

  3. SIT@NYP Smart Living Lab
    Singapore Institute of Technology Grant
    Project Duration: 2019 - 2020
    Award: S$67,800
    Consortium: Singapore Institute of Technology, University of Glasgow (UGS)

  4. EPSILON (ε): End-to-end Protection for Smart-metering Communication Infrastructure within a Local Field Area Network (FAN)
    Ministry of Education Translational R&D and Innovation Fund (MOE-TIF)
    Project Duration: 2016 - 2018
    Award: S$311,167
    Consortium: Republic Polytechnic Singapore, University of Glasgow (UofG, UGS), RFNet Technology and Wi-SUN Alliance

Supervision

  • Xin, Xin
    Formal Verification of Safety Critical Systems with Uncertainty

Teaching

1. Distributed Algorithms and Systems (DAS4) [Year 4, UofG BSc (Hons) Computing Science]
    Moodle page

2. Database Systems (DB3) [Year 3, UofG BSc (Hons) Computing Science]
    Moodle page

3. Data Structures and Algorithms [Year 1, SIT-UofG Joint Degree]
    xSite page

4. Team Project [Year 2, SIT-UofG Joint Degree]

5. Cloud and Distributed Computing [Year 2, SIT-UofG Joint Degree)