BibTeX records: Asha Rao

download as .bib file

@article{DBLP:journals/corr/abs-2403-14872,
  author       = {Tracy Tam and
                  Asha Rao and
                  Joanne L. Hall},
  title        = {Structuring the Chaos: Enabling Small Business Cyber-Security Risks
                  {\&} Assets Modelling with a {UML} Class Model},
  journal      = {CoRR},
  volume       = {abs/2403.14872},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.14872},
  doi          = {10.48550/ARXIV.2403.14872},
  eprinttype    = {arXiv},
  eprint       = {2403.14872},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-14872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2408-05895,
  author       = {Joanne L. Hall and
                  Asha Rao},
  title        = {Gender of Recruiter Makes a Difference: {A} study into Cybersecurity
                  Graduate Recruitment},
  journal      = {CoRR},
  volume       = {abs/2408.05895},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2408.05895},
  doi          = {10.48550/ARXIV.2408.05895},
  eprinttype    = {arXiv},
  eprint       = {2408.05895},
  timestamp    = {Tue, 17 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2408-05895.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DonovanRUY23,
  author       = {Diane M. Donovan and
                  Asha Rao and
                  Elif {\"{U}}sk{\"{u}}pl{\"{u}} and
                  Emine Sule Yazici},
  title        = {{QC-LDPC} Codes From Difference Matrices and Difference Covering Arrays},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {52141--52157},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3279327},
  doi          = {10.1109/ACCESS.2023.3279327},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DonovanRUY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejcon/KayasthaKPR23,
  author       = {Sharmila Kayastha and
                  Jayantha Katupitiya and
                  Garth Pearce and
                  Asha Rao},
  title        = {Comparative study of post-impact motion control of a flexible arm
                  space robot},
  journal      = {Eur. J. Control},
  volume       = {69},
  pages        = {100738},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ejcon.2022.100738},
  doi          = {10.1016/J.EJCON.2022.100738},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejcon/KayasthaKPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/PoulterDKPRR23,
  author       = {Hope Poulter and
                  Logan Diebold and
                  Sean Kelly and
                  Samuel Pakalapati and
                  Asha Rao and
                  Edgar Rojas{-}Mu{\~{n}}oz},
  title        = {Cell Tour: Learning About the Cellular Membrane Using Virtual Reality},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2023, College Station,
                  TX, USA, October 18-21, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FIE58773.2023.10343291},
  doi          = {10.1109/FIE58773.2023.10343291},
  timestamp    = {Tue, 23 Jan 2024 20:30:54 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/PoulterDKPRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhanRCP23,
  author       = {Muhammad Nauman Khan and
                  Asha Rao and
                  Seyit Camtepe and
                  Josef Pieprzyk},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Classical to Post-Quantum Secure {ABE-IBE} Proxy Re-Encryption Scheme},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {85--98},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012078200003555},
  doi          = {10.5220/0012078200003555},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhanRCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-13941,
  author       = {Sevvandi Kandanaarachchi and
                  Mahdi Abolghasemi and
                  Hideya Ochiai and
                  Asha Rao},
  title        = {Detecting inner-LAN anomalies using hierarchical forecasting},
  journal      = {CoRR},
  volume       = {abs/2304.13941},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.13941},
  doi          = {10.48550/ARXIV.2304.13941},
  eprinttype    = {arXiv},
  eprint       = {2304.13941},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-13941.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/Kandanaarachchi22,
  author       = {Sevvandi Kandanaarachchi and
                  Hideya Ochiai and
                  Asha Rao},
  title        = {Honeyboost: Boosting honeypot performance with data fusion and anomaly
                  detection},
  journal      = {Expert Syst. Appl.},
  volume       = {201},
  pages        = {117073},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.117073},
  doi          = {10.1016/J.ESWA.2022.117073},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/Kandanaarachchi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-00563,
  author       = {Diane M. Donovan and
                  Asha Rao and
                  Elif {\"{U}}sk{\"{u}}pl{\"{u}} and
                  Emine Sule Yazici},
  title        = {{QC-LDPC} Codes from Difference Matrices and Difference Covering Arrays},
  journal      = {CoRR},
  volume       = {abs/2205.00563},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.00563},
  doi          = {10.48550/ARXIV.2205.00563},
  eprinttype    = {arXiv},
  eprint       = {2205.00563},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-00563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TamRH21,
  author       = {Tracy Tam and
                  Asha Rao and
                  Joanne L. Hall},
  title        = {The good, the bad and the missing: {A} Narrative review of cyber-security
                  implications for australian small businesses},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102385},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102385},
  doi          = {10.1016/J.COSE.2021.102385},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TamRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dgov/TamRH21,
  author       = {Tracy Tam and
                  Asha Rao and
                  Joanne L. Hall},
  title        = {The Invisible {COVID-19} Small Business Risks: Dealing with the Cyber-Security
                  Aftermath},
  journal      = {Digit. Gov. Res. Pract.},
  volume       = {2},
  number       = {2},
  pages        = {23:1--23:8},
  year         = {2021},
  url          = {https://doi.org/10.1145/3436807},
  doi          = {10.1145/3436807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dgov/TamRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KhanRC21,
  author       = {Muhammad Nauman Khan and
                  Asha Rao and
                  Seyit Camtepe},
  title        = {Lightweight Cryptographic Protocols for IoT-Constrained Devices: {A}
                  Survey},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {6},
  pages        = {4132--4156},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3026493},
  doi          = {10.1109/JIOT.2020.3026493},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KhanRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-02526,
  author       = {Sevvandi Kandanaarachchi and
                  Hideya Ochiai and
                  Asha Rao},
  title        = {Honeyboost: Boosting honeypot performance with data fusion and anomaly
                  detection},
  journal      = {CoRR},
  volume       = {abs/2105.02526},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.02526},
  eprinttype    = {arXiv},
  eprint       = {2105.02526},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-02526.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-00733,
  author       = {Tracy Tam and
                  Asha Rao and
                  Joanne L. Hall},
  title        = {The Good, The Bad and The Missing: {A} Narrative Review of Cyber-security
                  Implications for Australian Small Businesses},
  journal      = {CoRR},
  volume       = {abs/2109.00733},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.00733},
  eprinttype    = {arXiv},
  eprint       = {2109.00733},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-00733.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/educon/HallR20,
  author       = {Joanne L. Hall and
                  Asha Rao},
  title        = {Non-Technical skills needed by cyber security graduates},
  booktitle    = {2020 {IEEE} Global Engineering Education Conference, {EDUCON} 2020,
                  Porto, Portugal, April 27-30, 2020},
  pages        = {354--358},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EDUCON45650.2020.9125105},
  doi          = {10.1109/EDUCON45650.2020.9125105},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/educon/HallR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bullica/AlvarezGGHR17,
  author       = {V. Alvarez and
                  F{\'{e}}lix Gudiel and
                  Mar{\'{\i}}a{-}Bel{\'{e}}n G{\"{u}}emes and
                  Kathy J. Horadam and
                  Asha Rao},
  title        = {Diagram versus bundle equivalence for {\(\mathbb{Z}\)}\({}_{\mbox{t}}\)
                  {\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{2}}\)\({}^{\mbox{2}}\)-cocyclic
                  Hadamard matrices},
  journal      = {Bull. {ICA}},
  volume       = {81},
  pages        = {63--77},
  year         = {2017},
  url          = {https://luca-giuzzi.unibs.it/ICA/Volumes/81/Reprints/BICA16R1-Reprint.pdf},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bullica/AlvarezGGHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DonovanRY17,
  author       = {Diane M. Donovan and
                  Asha Rao and
                  Emine Sule Yazici},
  title        = {High Rate {LDPC} Codes from Difference Covering Arrays},
  journal      = {CoRR},
  volume       = {abs/1701.05686},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.05686},
  eprinttype    = {arXiv},
  eprint       = {1701.05686},
  timestamp    = {Mon, 07 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/DonovanRY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gc/DemirkaleDHKR16,
  author       = {Fatih Demirkale and
                  Diane M. Donovan and
                  Joanne L. Hall and
                  Abdollah Khodkar and
                  Asha Rao},
  title        = {Difference Covering Arrays and Pseudo-Orthogonal Latin Squares},
  journal      = {Graphs Comb.},
  volume       = {32},
  number       = {4},
  pages        = {1353--1374},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00373-015-1649-8},
  doi          = {10.1007/S00373-015-1649-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/gc/DemirkaleDHKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complexnetworks/CoxHR16,
  author       = {Scott Cox and
                  Kathy J. Horadam and
                  Asha Rao},
  editor       = {Hocine Cherifi and
                  Sabrina Gaito and
                  Walter Quattrociocchi and
                  Alessandra Sala},
  title        = {The spread of ideas in a weighted threshold network},
  booktitle    = {Complex Networks {\&} Their Applications {V} - Proceedings of
                  the 5th International Workshop on Complex Networks and their Applications
                  {(COMPLEX} {NETWORKS} 2016), Milan, Italy, November 30 - December
                  2, 2016},
  series       = {Studies in Computational Intelligence},
  volume       = {693},
  pages        = {437--447},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50901-3\_35},
  doi          = {10.1007/978-3-319-50901-3\_35},
  timestamp    = {Fri, 09 Apr 2021 18:42:17 +0200},
  biburl       = {https://dblp.org/rec/conf/complexnetworks/CoxHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complexnetworks/LiebigKR16,
  author       = {Jessica Liebig and
                  Mohammad Adib Khairuddin and
                  Asha Rao},
  editor       = {Hocine Cherifi and
                  Sabrina Gaito and
                  Walter Quattrociocchi and
                  Alessandra Sala},
  title        = {Online election campaigning: Identifying political parties using likes
                  and comments},
  booktitle    = {Complex Networks {\&} Their Applications {V} - Proceedings of
                  the 5th International Workshop on Complex Networks and their Applications
                  {(COMPLEX} {NETWORKS} 2016), Milan, Italy, November 30 - December
                  2, 2016},
  series       = {Studies in Computational Intelligence},
  volume       = {693},
  pages        = {619--630},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50901-3\_49},
  doi          = {10.1007/978-3-319-50901-3\_49},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/complexnetworks/LiebigKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SunVBR16,
  author       = {Li Sun and
                  Steven Versteeg and
                  Serdar Boztas and
                  Asha Rao},
  title        = {Detecting Anomalous User Behavior Using an Extended Isolation Forest
                  Algorithm: An Enterprise Case Study},
  journal      = {CoRR},
  volume       = {abs/1609.06676},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.06676},
  eprinttype    = {arXiv},
  eprint       = {1609.06676},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SunVBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MagalingamDR15,
  author       = {Pritheega Magalingam and
                  Stephen Davis and
                  Asha Rao},
  title        = {Using shortest path to discover criminal community},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {1--17},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.08.002},
  doi          = {10.1016/J.DIIN.2015.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MagalingamDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/WilliamsBR15,
  author       = {Mani Williams and
                  Jane Burry and
                  Asha Rao},
  title        = {Graph mining indoor tracking data for social interaction analysis},
  booktitle    = {2015 {IEEE} International Conference on Pervasive Computing and Communication
                  Workshops, PerCom Workshops 2015, St. Louis, MO, USA, March 23-27,
                  2015},
  pages        = {2--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PERCOMW.2015.7133984},
  doi          = {10.1109/PERCOMW.2015.7133984},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/WilliamsBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/WilliamsBRW15,
  author       = {Mani Williams and
                  Jane Burry and
                  Asha Rao and
                  Nathan Williams},
  editor       = {Holly Samuelson and
                  Shajay Bhooshan and
                  Rhys Goldstein},
  title        = {A system for tracking and visualizing social interactions in a collaborative
                  work environment},
  booktitle    = {Proceedings of the Symposium on Simulation for Architecture {\&}
                  Urban Design, SimAUD 2015, part of the 2015 Spring Simulation Multiconference,
                  SpringSim '15, Alexandria, VA, USA, April 12-15, 2015},
  pages        = {1--4},
  publisher    = {{SCS/ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2873022},
  timestamp    = {Thu, 07 Apr 2016 15:18:23 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/WilliamsBRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiebigR15,
  author       = {Jessica Liebig and
                  Asha Rao},
  title        = {Predicting Item Popularity: Analysing Local Clustering Behaviour of
                  Users},
  journal      = {CoRR},
  volume       = {abs/1503.04404},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.04404},
  eprinttype    = {arXiv},
  eprint       = {1503.04404},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiebigR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MagalingamRD15,
  author       = {Pritheega Magalingam and
                  Asha Rao and
                  Stephen Davis},
  title        = {Identifying a Criminal's Network of Trust},
  journal      = {CoRR},
  volume       = {abs/1503.04896},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.04896},
  eprinttype    = {arXiv},
  eprint       = {1503.04896},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MagalingamRD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MagalingamDR15,
  author       = {Pritheega Magalingam and
                  Stephen Davis and
                  Asha Rao},
  title        = {Using shortest path to discover criminal community},
  journal      = {CoRR},
  volume       = {abs/1503.06289},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.06289},
  eprinttype    = {arXiv},
  eprint       = {1503.06289},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MagalingamDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MagalingamDR15a,
  author       = {Pritheega Magalingam and
                  Stephen Davis and
                  Asha Rao},
  title        = {Ranking the Importance Level of Intermediaries to a Criminal using
                  a Reliance Measure},
  journal      = {CoRR},
  volume       = {abs/1506.06221},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.06221},
  eprinttype    = {arXiv},
  eprint       = {1506.06221},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MagalingamDR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiebigR15a,
  author       = {Jessica Liebig and
                  Asha Rao},
  title        = {A fast and simple method of extracting the backbone of one-mode projections:
                  An aid in the detection of communities},
  journal      = {CoRR},
  volume       = {abs/1512.01883},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.01883},
  eprinttype    = {arXiv},
  eprint       = {1512.01883},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiebigR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/MagalingamRD14,
  author       = {Pritheega Magalingam and
                  Asha Rao and
                  Stephen Davis},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Albert Dipanda and
                  Richard Chbeir},
  title        = {Identifying a Criminal's Network of Trust},
  booktitle    = {Tenth International Conference on Signal-Image Technology and Internet-Based
                  Systems, {SITIS} 2014, Marrakech, Morocco, November 23-27, 2014},
  pages        = {309--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SITIS.2014.64},
  doi          = {10.1109/SITIS.2014.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/MagalingamRD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/LiebigR14,
  author       = {Jessica Liebig and
                  Asha Rao},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Albert Dipanda and
                  Richard Chbeir},
  title        = {Identifying Influential Nodes in Bipartite Networks Using the Clustering
                  Coefficient},
  booktitle    = {Tenth International Conference on Signal-Image Technology and Internet-Based
                  Systems, {SITIS} 2014, Marrakech, Morocco, November 23-27, 2014},
  pages        = {323--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SITIS.2014.15},
  doi          = {10.1109/SITIS.2014.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/LiebigR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiebigR14,
  author       = {Jessica Liebig and
                  Asha Rao},
  title        = {A Clustering Coefficient to Identify Important Nodes in Bipartite
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1406.5814},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.5814},
  eprinttype    = {arXiv},
  eprint       = {1406.5814},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiebigR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ajc/Rao13,
  author       = {Asha Rao},
  title        = {Kathy Horadam: sixty},
  journal      = {Australas. {J} Comb.},
  volume       = {55},
  pages        = {3--4},
  year         = {2013},
  url          = {http://ajc.maths.uq.edu.au/pdf/55/ajc\_v55\_p003.pdf},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ajc/Rao13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/HallRG13,
  author       = {Joanne L. Hall and
                  Asha Rao and
                  Stephen M. Gagola III},
  title        = {A Family of Alltop Functions that are EA-Inequivalent to the Cubic
                  Function},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {61},
  number       = {11},
  pages        = {4722--4727},
  year         = {2013},
  url          = {https://doi.org/10.1109/TCOMM.2013.091813.130127},
  doi          = {10.1109/TCOMM.2013.091813.130127},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/HallRG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/JeffersHCRB13,
  author       = {Jason Jeffers and
                  Kathy J. Horadam and
                  C. J. Carstens and
                  Asha Rao and
                  Serdar Boztas},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Albert Dipanda and
                  Richard Chbeir},
  title        = {Influence Neighbourhoods in CiteSeer: {A} Case Study},
  booktitle    = {Ninth International Conference on Signal-Image Technology {\&}
                  Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5,
                  2013},
  pages        = {612--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SITIS.2013.100},
  doi          = {10.1109/SITIS.2013.100},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/JeffersHCRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HallRD12,
  author       = {Joanne L. Hall and
                  Asha Rao and
                  Diane M. Donovan},
  title        = {Planar difference functions},
  booktitle    = {Proceedings of the 2012 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages        = {1082--1086},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIT.2012.6283019},
  doi          = {10.1109/ISIT.2012.6283019},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/HallRD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-3310,
  author       = {Joanne L. Hall and
                  Asha Rao and
                  Diane M. Donovan},
  title        = {Planar Difference Functions},
  journal      = {CoRR},
  volume       = {abs/1205.3310},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.3310},
  eprinttype    = {arXiv},
  eprint       = {1205.3310},
  timestamp    = {Mon, 07 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-3310.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/RaoDH10,
  author       = {Asha Rao and
                  Diane M. Donovan and
                  Joanne L. Hall},
  title        = {Mutually orthogonal Latin squares and mutually unbiased bases in dimensions
                  of odd prime power - {MOLS} and MUBs in odd prime power dimensions},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {221--231},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0027-x},
  doi          = {10.1007/S12095-010-0027-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/RaoDH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/RaoP10,
  author       = {Asha Rao and
                  Nimalsiri Pinnawala},
  title        = {A family of two-weight irreducible cyclic codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {56},
  number       = {6},
  pages        = {2568--2570},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIT.2010.2046201},
  doi          = {10.1109/TIT.2010.2046201},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/RaoP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/EmburyR07,
  author       = {P. Embury and
                  Asha Rao},
  editor       = {Serdar Boztas and
                  Hsiao{-}feng Lu},
  title        = {A Path to Hadamard Matrices},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  17th International Symposium, AAECC-17, Bangalore, India, December
                  16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4851},
  pages        = {281--290},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77224-8\_33},
  doi          = {10.1007/978-3-540-77224-8\_33},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/EmburyR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/PinnawalaRG07,
  author       = {Nimalsiri Pinnawala and
                  Asha Rao and
                  T. Aaron Gulliver},
  editor       = {Serdar Boztas and
                  Hsiao{-}feng Lu},
  title        = {Distribution of Trace Values and Two-Weight, Self-orthogonal Codes
                  over \emph{GF} {(} \emph{p} , 2)},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  17th International Symposium, AAECC-17, Bangalore, India, December
                  16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4851},
  pages        = {311--320},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77224-8\_36},
  doi          = {10.1007/978-3-540-77224-8\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/PinnawalaRG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/McNicolBR06,
  author       = {Simon McNicol and
                  Serdar Boztas and
                  Asha Rao},
  editor       = {Marc P. C. Fossorier and
                  Hideki Imai and
                  Shu Lin and
                  Alain Poli},
  title        = {Traitor Tracing Against Powerful Attacks Using Combinatorial Designs},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  16th International Symposium, AAECC-16, Las Vegas, NV, USA, February
                  20-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3857},
  pages        = {215--224},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11617983\_21},
  doi          = {10.1007/11617983\_21},
  timestamp    = {Thu, 10 Sep 2020 17:39:08 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/McNicolBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HoradamR06,
  author       = {Kathy J. Horadam and
                  Asha Rao},
  title        = {Fourier Transforms from a Weighted Trace Map},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {1080--1084},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261950},
  doi          = {10.1109/ISIT.2006.261950},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/HoradamR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RaoP05,
  author       = {Asha Rao and
                  Nimalsiri Pinnawala},
  title        = {New linear codes over Z\({}_{\mbox{ps}}\) via the trace map},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {124--126},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523306},
  doi          = {10.1109/ISIT.2005.1523306},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/RaoP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/McNicolBR05,
  author       = {Simon McNicol and
                  Serdar Boztas and
                  Asha Rao},
  title        = {Traitor tracing against powerful attacks},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1878--1882},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523671},
  doi          = {10.1109/ISIT.2005.1523671},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/McNicolBR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PinnawalaR04,
  author       = {Nimalsiri Pinnawala and
                  Asha Rao},
  title        = {Cocyclic Simplex Codes of Type alpha Over mmb Z\({}_{\mbox{4}}\) and
                  mmb Z\({}_{\mbox{2}}\)\({}^{\mbox{s}}\)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {50},
  number       = {9},
  pages        = {2165--2169},
  year         = {2004},
  url          = {https://doi.org/10.1109/TIT.2004.833354},
  doi          = {10.1109/TIT.2004.833354},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PinnawalaR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/ChuaR04,
  author       = {Josel{\'{\i}}to J. Chua and
                  Asha Rao},
  editor       = {Masumi Ishikawa and
                  Shuji Hashimoto and
                  Marcin Paprzycki and
                  Emilia I. Barakova and
                  Kaori Yoshida and
                  Mario K{\"{o}}ppen and
                  David W. Corne and
                  Ajith Abraham},
  title        = {An Image-Guided Heuristic for Planning an Exhaustive Enumeration},
  booktitle    = {4th International Conference on Hybrid Intelligent Systems {(HIS}
                  2004), 5-8 December 2004, Kitakyushu, Japan},
  pages        = {136--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICHIS.2004.23},
  doi          = {10.1109/ICHIS.2004.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/ChuaR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/CribbR03,
  author       = {Tom Cribb and
                  Asha Rao},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {An Information Security Management Model},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2},
  pages        = {654--657},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/CribbR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}