Follow

Submissions from 2020

PDF

Packet analysis for network forensics: A comprehensive survey, Leslie F. Sikos

Link

The evolution of context-aware RDF knowledge graphs, Leslie F. Sikos

PDF

Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp

PDF

Denial of service attack detection through machine learning for the IoT, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, and Craig Valli

Link

Counterproductive counterterrorism?: A preliminary examination of the terrorist identity as a social construct of conditions of confinement, Nathan Thompson

Link

Dealing with radicalisation in corrective services: A global issue, Nathan Thompson

Link

‘Click for urgent coronavirus update’: how working from home may be exposing us to cybercrime, Craig Valli

Link

Information warfare by proxy: Malware in PLC firmware, Lachlan Walling, Michael N. Johnstone, and Peter Hannay

Link

BotNets in the Internet of Things: The next wave, Ashley Woodiss-Field and Michael N. Johnstone

Link

Security and forensics in the Internet of Things: Research advances and challenges, Wencheng Yang, Michael N. Johnstone, Leslie F. Sikos, and Song Wang

Link

Secure fingerprint authentication with homomorphic encryption, Wencheng Yang, Song Wang, Kan Yu, James Jin Kang, and Michael N. Johnstone

PDF

How location-aware access control affects user privacy and security in cloud computing systems, Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, and Isabel Wagner

Link

Securing the elderly in cyberspace with fingerprints, Guanglou Zheng, Wencheng Yang, Mike Johnstone, Rajan Shankaran, and Craig Valli

Link

Towards IoT security automation and orchestration, Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva R. Pokhrel, Surya Nepal, and Helge Janicke

Submissions from 2019

Link

Securing cloud storage by transparent biometric cryptography, Leith Abed, Nathan Clarke, Bogdan Ghita, and Abdulrahman Alruban

Link

Intelligent big data summarization for rare anomaly detection, Mohiuddin Ahmed

Link

Detecting centralized architecture-based botnets using travelling salesperson non-deterministic polynomial-hard problem-TSP-NP technique, Abdullah Al-Ghushami, Nickson Karie, and Victor Kebande

Link

Information security risk communication: A user-centric approach, Manal Alohali, Nathan Clarke, and Steven Furnell

Link

A novel behaviour profiling approach to continuous authentication for mobile applications, Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, and Nathan Clarke

Link

Physical activity recognition by utilising smartphone sensor signals, Abdulrahman Alruban, Hind Alobaidi, Nathan Clarke, and Fudong Li

Link

An outlook at agile methodologies for the independent games developer, Renae Aurisch, Mohiuddin Ahmed, and Abu Barkat

Link

Information security, Zubair Baig, Sherali Zeadally, and Andrew Woodward

Link

Review and analysis of Cowrie artefacts and their potential to be used deceptively, Warren Cabral, Craig Valli, Leslie Sikos, and Samuel Wakeling

Link

The Semantic Web3D: Towards comprehensive representation of 3D content on the Semantic Web, Jakub Flotyński, Don Brutzman, Felix G. Hamza-Lup, Athanasios Malamos, Nicholas Polys, Leslie F. Sikos, and Krzysztof Walczak

Link

Deep learning-based intrusion detection for IoT networks, Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, and Antonio Robles-Kelly

Link

Demystifying the technical and managerial challenges of authentication, Ben Goodwin and Patryk Szewczyk

Link

Secure smart contract supply chains, Richard Greene and Michael N. Johnstone

Link

Security and privacy based access control model for internet of connected vehicles, Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P.C. Rodrigues, and Muhammad Sayim Khalil

An evaluation of phishing email awareness in an information warfare age, Leon Hansan, Aaron Troiani, and Patryk Szewczyk

Link

Correction to: A security review of local government using NIST CSF: A case study, Ahmed Ibrahim, Craig Valli, Ian McAteer, and Junaid Chaudhry

Link

Identification and extraction of digital forensic evidence from multimedia data sources using multi-algorithmic fusion, Shahlaa Mashhadani, Nathan Clarke, and F. Li

PDF

Integration of biometrics and steganography: A comprehensive review, Ian McAteer, Ahmed Ibrahim, Guanglou Zhang, Wencheng Yang, and Craig Valli

PDF

Forensic Analysis of the Nintendo 3DS NAND, Gus Pessolano, Huw O. L. Read, Iain Sutherland, and Konstantinos Xynos

Link

Division polynomial-based elliptic curve scalar multiplication revisited, SrinivasaRao SubramanyaRao, Zhi Hu, and Chang-An Zhao

Link

Bio-inspired cyber-security for the smart grid, Naeem Firdous Syed, Ahmed Ibrahim, Zubair Baig, and Craig Valli

Link

A comprehensive framework for understanding security culture in organizations, Alaa Tolah, Steven M. Furnell, and Maria Papadaki

PDF

Proof-of-familiarity: A privacy-preserved blockchain scheme for collaborative medical decision-making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, and Chul-Soo Kim

Link

Fingerprint and face scanners aren’t as secure as we think they are, Wencheng Yang and Song Wang

PDF

A cancelable iris- and steganography-based user authentication system for the Internet of Things, Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zhang, Marcelo Jose Macedo, Michael N. Johnstone, and Craig Valli

PDF

Security and accuracy of fingerprint-based biometrics: A review, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, and Craig Valli

Link

Securing deep learning based edge finger-vein biometrics with binary decision diagram, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, Jucheng Yang, and Craig Valli

Link

A privacy-preserving lightweight biometric system for internet of things security, Wencheng Yang, Song Wang, Guanglou Zheng, Jucheng Yang, and Craig Valli

Link

Fingerprint access control for wireless insulin pump systems using cancelable Delaunay triangulations, Guanglou Zhang, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, and Li Qiao

Submissions from 2018

Link

Risk analysis of cloud sourcing in healthcare and public health industry, Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, and Craig Valli

Link

Misuse detection in a simulated IaaS environment, Burhan Al-Bayati, Nathan Clarke, Paul Dowland, and Fudong Li

Link

A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems, Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, and Maruf Pasha

PDF

The design and evaluation of a user-centric information security risk assessment and response framework, Manal Alohali, Nathan Clarke, and Steven Furnell

Link

Identifying and predicting the factors affecting end-users’ risk-taking behavior, Manal Alohali, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

An analysis of home user security awareness & education, Fayez Alotaibi, Nathan Clarke, and Steven Furnell

Link

Enhancing cyber security awareness with mobile games, F. Alotaibi, Steven Furnell, I Stengel, and M. Papadaki

Link

A holistic framework for enhancing privacy awareness, A. Alshehri, Nathan Clarke, and F. Li

Link

A console GRID leveraged authentication and key agreement mechanism for LTE/SAE, Rajakumar Arul, Gunasekaran Raja, Ali K. Bashir, Junaid Chaudry, and Amjad M. Ali

PDF

Muscle activity-driven green-oriented random number generation mechanism to secure WBSN wearable device communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, and Shixiong Chen

Link

Enabling technologies for post market surveillance of medical devices, Junaid Chaudhry, Ali Kashif Bashir, Syed Hassan Ahmed, Jon Haas, and Guanglou Zheng

Link

POStCODE middleware for post-market surveillance of medical devices for cyber security in medical and healthcare sector in Australia, Junaid Chaudhry, Craig Valli, Michael Crowley, Jon Haass, and Peter Roberts

Link

Internet of Things (IoT): Research, simulators, and testbeds, Maxim Chernyshev, Zubair Baig, Oladayo Bello, and Sherali Zeadally

Link

A novel approach for face recognition using fused GMDH-based networks, El-Sayed El-Alfy, Zubair Baig, and Radwan Abdel-Aal

Link

Transparent authentication: Utilising heart rate for user authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland Dr, and Fudong Li

Link

Assessing website password practices – over a decade of progress?, Steven Furnell

Link

Design principles and guidelines for targeted security awareness, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland

Link

A novel multimedia-forensic analysis tool (M-FAT), Shahlaa Mashhadani, Hiba Al-kawaz, Nathan Clarke, Steven Furnell, and Fudong Li

Link

A bio-inspired secure IPv6 communication protocol for Internet of Things, Kashif Saleem, Junaid Chaudhry, Mehmet A. Orgun, and Jalal Al-Muhtadi

Link

Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In, Zubair Ahmed Baig, and Surasak Sanguanpong

Towards a method for detecting botnet code on IoT devices, Ashley Woodiss-Field and Michael N. Johnstone

Link

Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Chaudhry, Erwin Adi, and Craig Valli

PDF

Impact of feature proportion on matching performance of multi-biometric systems, Wencheng Yang, Song Wang, Guanglou Zheng, and Craig Valli

Link

A critical analysis of ECG-based key distribution for securing wearable and implantable medical devices, Guanglou Zheng, Rajan Shankaran, Wencheng Yang, Craig Valli, Li Qiao, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Link

Finger-to-Heart(F2H): Authentication for wireless implantable medical devices, Guanglou Zheng, Wencheng Yang, Craig Valli, Li Qiao, Rajan Shankaran, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Submissions from 2017

Link

A method to enhance the accuracy of digital forensic in the absence of sufficient evidence in Saudi Arabia, Fahad Alanazi and Andy Jones

Link

Unobtrusive gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Fudong Li, and Paul Haskell-Dowland Dr

Link

Information security behavior: Recognizing the influencers, Manal Alohali, Nathan Clarke, Steven Furnell, and Saad Albakri

Link

A survey of cyber-security awareness in Saudi Arabia, Faisal Mohamed Alotaibi, Steven Furnell, Ingo Stengel, and Maria Papadaki

Link

Information security policies: A review of challenges and influencing factors, Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke

Link

User profiling from network traffic via novel application-level interactions, Gaseb Alotibi, Nathan Clarke, Fudong Li, and Steven Furnell

Link

Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi context, Norah Alqahtani, Steven Furnell, Shirley Atkinson, and Ingo Stengel

Link

A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

Insider misuse attribution using biometrics, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

Future challenges for smart cities: Cyber-security and digital forensics, Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya N. Rabadia, Peter Hannay, Maxim Chernyshev, Michael N. Johnstone, Paresh Kerai, Ahmad Ibrahim, Krishnun Sansurooah, Naeem Syed, and Matthew Peacock

Link

The effectiveness of classification algorithms on IPv6 IID construction, Clinton Carpene, Michael N. Johnstone, and Andrew Woodward

Enhancements in data-recovery and re-transmit mechanisms of transmission control protocol enabled medical devices, Junaid Chaudhry, Mudassar Ahmad, Muhammad Asif Habib, Rehan Ashraf, and Craig Valli

Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting, Junaid Chaudhry, Uvais Qidwai, Mahdi H. Miraz, Ahmed Ibrahim, and Craig Valli

Link

AZSPM: Autonomic zero-knowledge security provisioning model for medical control systems in fog computing environments, Junaid Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, and Craig Valli

Link

Revisiting urban war nibbling: Mobile passive discovery of classic bluetooth devices using ubertooth one, Maxim Chernyshev, Craig Valli, and Michael Johnstone

PDF

Insider misuse identification using transparent biometrics, Nathan Clarke, Fudong Li, Abdulrahman Alruban, and Steven Furnell

Link

The intelligence analyst: Attributes, knowledge, skills and characteristics, Teresa Deering and Jeff Corkill

Link

Smart watch based body-temperature authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li

Link

Climate control systems for public safety in smart cars, Sajida Imran, Ali Kashif Bashir, and Junaid Chaudhry

Link

Jurisdictional issues in cloud forensics, M. James and Patryk Szewczyk

Link

Novel intrusion detection mechanism with low overhead for SCADA systems, Leandros Maglaras, Helge Janicke, Jianmin Jiang, and Andrew Crampton

Link

Towards targeted security awareness raising, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland

Link

Modelling and evaluation of malicious attacks against the IoT MQTT protocol, Naeem Firdous Syed, Zubair Baig, Craig Valli, and Ahmed Ibrahim

PDF

Broadband router security: History, challenges and future implications, Patryk Szewczyk and Rose Macdonald

Link

An analysis of unauthorized wireless network usage in Western Australia, P. Szewczyk, D. Blackman, and K. Sansurooah

Link

Face ID and iOS 11: a few lingering security questions about the new iPhone X, Wencheng Yang and Guanglou Zheng

Link

Cybersecurity for wireless implants, Guanglou Zheng, Rajan Shankaran, and Craig Valli

Submissions from 2016

Link

Distributed denial-of-service attacks against HTTP/2 services, Erwin Adi, Zubair A. Baig, Philip Hingston, and Chiou-Peng Lam

Link

Adaptive behavioral profiling for identity verification in cloud computing: A model and preliminary analysis, Burhan Al-Bayati, Nathan Clarke, and Paul Dowland

Link

A suspect-oriented intelligent and automated computer forensic analysis, M. Al Fahdi, Nathan L. Clarke, Fudong Li, and Steven M. Furnell

Link

A framework for understanding and assessing the core capability of a digital forensics organisation, Ahmed Almarzooqi and Andrew Jones

PDF

Applying grounded theory methods to digital forensics research, Ahmed Almarzooqi and Andrew Jones