Follow

Submissions from 2019

Link

Demystifying the technical and managerial challenges of authentication, Ben Goodwin and Patryk Szewczyk

Link

Secure smart contract supply chains, Richard Greene and Michael N. Johnstone

Link

Security and privacy based access control model for internet of connected vehicles, Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P.C. Rodrigues, and Muhammad Sayim Khalil

An evaluation of phishing email awareness in an information warfare age, Leon Hansan, Aaron Troiani, and Patryk Szewczyk

Link

Correction to: A security review of local government using NIST CSF: A case study, Ahmed Ibrahim, Craig Valli, Ian McAteer, and Junaid Chaudhry

PDF

Corporate security career progression: A comparative study of four Australian organisations, Codee Roy Ludbey, David J. Brooks, and Michael Coole

Link

Identification and extraction of digital forensic evidence from multimedia data sources using multi-algorithmic fusion, Shahlaa Mashhadani, Nathan Clarke, and F. Li

PDF

Integration of biometrics and steganography: A comprehensive review, Ian McAteer, Ahmed Ibrahim, Guanglou Zhang, Wencheng Yang, and Craig Valli

PDF

Forensic Analysis of the Nintendo 3DS NAND, Gus Pessolano, Huw O. L. Read, Iain Sutherland, and Konstantinos Xynos

Link

Division polynomial-based elliptic curve scalar multiplication revisited, SrinivasaRao SubramanyaRao, Zhi Hu, and Chang-An Zhao

Link

Bio-inspired cyber-security for the smart grid, Naeem Firdous Syed, Ahmed Ibrahim, Zubair Baig, and Craig Valli

Link

A comprehensive framework for understanding security culture in organizations, Alaa Tolah, Steven M. Furnell, and Maria Papadaki

Link

Towards a method for detecting botnet code on IoT devices, Ashley Woodiss-Field and Michael N. Johnstone

PDF

Proof-of-familiarity: A privacy-preserved blockchain scheme for collaborative medical decision-making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, and Chul-Soo Kim

Link

Fingerprint and face scanners aren’t as secure as we think they are, Wencheng Yang and Song Wang

PDF

A cancelable iris- and steganography-based user authentication system for the Internet of Things, Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zhang, Marcelo Jose Macedo, Michael N. Johnstone, and Craig Valli

PDF

Security and accuracy of fingerprint-based biometrics: A review, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, and Craig Valli

Link

Securing deep learning based edge finger-vein biometrics with binary decision diagram, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, Jucheng Yang, and Craig Valli

Link

A privacy-preserving lightweight biometric system for internet of things security, Wencheng Yang, Song Wang, Guanglou Zheng, Jucheng Yang, and Craig Valli

Link

Fingerprint access control for wireless insulin pump systems using cancelable Delaunay triangulations, Guanglou Zhang, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, and Li Qiao

Submissions from 2018

Link

Risk analysis of cloud sourcing in healthcare and public health industry, Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, and Craig Valli

Link

Misuse detection in a simulated IaaS environment, Burhan Al-Bayati, Nathan Clarke, Paul Dowland, and Fudong Li

Link

A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems, Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, and Maruf Pasha

PDF

The design and evaluation of a user-centric information security risk assessment and response framework, Manal Alohali, Nathan Clarke, and Steven Furnell

Link

Information security behavior: Recognizing the influencers, Manal Alohali, Nathan Clarke, Steven Furnell, and Saad Albakri

Link

Identifying and predicting the factors affecting end-users’ risk-taking behavior, Manal Alohali, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

An analysis of home user security awareness & education, Fayez Alotaibi, Nathan Clarke, and Steven Furnell

Link

Enhancing cyber security awareness with mobile games, F. Alotaibi, Steven Furnell, I Stengel, and M. Papadaki

Link

A holistic framework for enhancing privacy awareness, A. Alshehri, Nathan Clarke, and F. Li

Link

A console GRID leveraged authentication and key agreement mechanism for LTE/SAE, Rajakumar Arul, Gunasekaran Raja, Ali K. Bashir, Junaid Chaudry, and Amjad M. Ali

PDF

Muscle activity-driven green-oriented random number generation mechanism to secure WBSN wearable device communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, and Shixiong Chen

Link

Enabling technologies for post market surveillance of medical devices, Junaid Chaudhry, Ali Kashif Bashir, Syed Hassan Ahmed, Jon Haas, and Guanglou Zheng

Link

POStCODE middleware for post-market surveillance of medical devices for cyber security in medical and healthcare sector in Australia, Junaid Chaudhry, Craig Valli, Michael Crowley, Jon Haass, and Peter Roberts

Link

Internet of Things (IoT): Research, simulators, and testbeds, Maxim Chernyshev, Zubair Baig, Oladayo Bello, and Sherali Zeadally

Link

A novel approach for face recognition using fused GMDH-based networks, El-Sayed El-Alfy, Zubair Baig, and Radwan Abdel-Aal

Link

Transparent authentication: Utilising heart rate for user authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland Dr, and Fudong Li

Link

Assessing website password practices – over a decade of progress?, Steven Furnell

Link

Design principles and guidelines for targeted security awareness, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland

Link

A novel multimedia-forensic analysis tool (M-FAT), Shahlaa Mashhadani, Hiba Al-kawaz, Nathan Clarke, Steven Furnell, and Fudong Li

Link

A bio-inspired secure IPv6 communication protocol for Internet of Things, Kashif Saleem, Junaid Chaudhry, Mehmet A. Orgun, and Jalal Al-Muhtadi

Link

Modelling and evaluation of malicious attacks against the IoT MQTT protocol, Naeem Firdous Syed, Zubair Baig, Craig Valli, and Ahmed Ibrahim

Link

Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In, Zubair Ahmed Baig, and Surasak Sanguanpong

Link

Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Chaudhry, Erwin Adi, and Craig Valli

PDF

Impact of feature proportion on matching performance of multi-biometric systems, Wencheng Yang, Song Wang, Guanglou Zheng, and Craig Valli

Link

A critical analysis of ECG-based key distribution for securing wearable and implantable medical devices, Guanglou Zheng, Rajan Shankaran, Wencheng Yang, Craig Valli, Li Qiao, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Link

Finger-to-Heart(F2H): Authentication for wireless implantable medical devices, Guanglou Zheng, Wencheng Yang, Craig Valli, Li Qiao, Rajan Shankaran, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay

Submissions from 2017

Link

A method to enhance the accuracy of digital forensic in the absence of sufficient evidence in Saudi Arabia, Fahad Alanazi and Andy Jones

Link

Unobtrusive gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Fudong Li, and Paul Haskell-Dowland Dr

Link

A survey of cyber-security awareness in Saudi Arabia, Faisal Mohamed Alotaibi, Steven Furnell, Ingo Stengel, and Maria Papadaki

Link

Information security policies: A review of challenges and influencing factors, Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke

Link

User profiling from network traffic via novel application-level interactions, Gaseb Alotibi, Nathan Clarke, Fudong Li, and Steven Furnell

Link

Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi context, Norah Alqahtani, Steven Furnell, Shirley Atkinson, and Ingo Stengel

Link

A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

Insider misuse attribution using biometrics, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven M. Furnell

Link

Future challenges for smart cities: Cyber-security and digital forensics, Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya N. Rabadia, Peter Hannay, Maxim Chernyshev, Michael N. Johnstone, Paresh Kerai, Ahmad Ibrahim, Krishnun Sansurooah, Naeem Syed, and Matthew Peacock

Link

The effectiveness of classification algorithms on IPv6 IID construction, Clinton Carpene, Michael N. Johnstone, and Andrew Woodward

Enhancements in data-recovery and re-transmit mechanisms of transmission control protocol enabled medical devices, Junaid Chaudhry, Mudassar Ahmad, Muhammad Asif Habib, Rehan Ashraf, and Craig Valli

Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting, Junaid Chaudhry, Uvais Qidwai, Mahdi H. Miraz, Ahmed Ibrahim, and Craig Valli

Link

AZSPM: Autonomic zero-knowledge security provisioning model for medical control systems in fog computing environments, Junaid Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, and Craig Valli

Link

Revisiting urban war nibbling: Mobile passive discovery of classic bluetooth devices using ubertooth one, Maxim Chernyshev, Craig Valli, and Michael Johnstone

PDF

Insider misuse identification using transparent biometrics, Nathan Clarke, Fudong Li, Abdulrahman Alruban, and Steven Furnell

Link

The intelligence analyst: Attributes, knowledge, skills and characteristics, Teresa Deering and Jeff Corkill

Link

Smart watch based body-temperature authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li

Link

Climate control systems for public safety in smart cars, Sajida Imran, Ali Kashif Bashir, and Junaid Chaudhry

Link

Jurisdictional issues in cloud forensics, M. James and Patryk Szewczyk

Link

Novel intrusion detection mechanism with low overhead for SCADA systems, Leandros Maglaras, Helge Janicke, Jianmin Jiang, and Andrew Crampton

Link

Towards targeted security awareness raising, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland

PDF

Broadband router security: History, challenges and future implications, Patryk Szewczyk and Rose Macdonald

Link

An analysis of unauthorized wireless network usage in Western Australia, P. Szewczyk, D. Blackman, and K. Sansurooah

Link

Face ID and iOS 11: a few lingering security questions about the new iPhone X, Wencheng Yang and Guanglou Zheng

Link

Cybersecurity for wireless implants, Guanglou Zheng, Rajan Shankaran, and Craig Valli

Submissions from 2016

Link

Distributed denial-of-service attacks against HTTP/2 services, Erwin Adi, Zubair A. Baig, Philip Hingston, and Chiou-Peng Lam

Link

Adaptive behavioral profiling for identity verification in cloud computing: A model and preliminary analysis, Burhan Al-Bayati, Nathan Clarke, and Paul Dowland

Link

A suspect-oriented intelligent and automated computer forensic analysis, M. Al Fahdi, Nathan L. Clarke, Fudong Li, and Steven M. Furnell

Link

A framework for understanding and assessing the core capability of a digital forensics organisation, Ahmed Almarzooqi and Andrew Jones

PDF

Applying grounded theory methods to digital forensics research, Ahmed Almarzooqi and Andrew Jones

Link

Activity recognition using wearable computing, Neamah Al-Naffakh, Nathan Clarke, Paul Dowland, and Fudong Li

Link

A comprehensive evaluation of feature selection for gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li

Link

A Novel Taxonomy for Mobile Applications Data, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

Transparent authentication systems for mobile device security: A review, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

A forensic acquisition and analysis system for IaaS: Architectural model and experiment, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

Leveraging biometrics for insider misuse identification, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven Furnell

Link

A review of graphical authentication utilising a keypad input method, H. Alsaiari, M. Papadaki, P.S. Dowland, and Steven Furnell

PDF

Controlled access to cloud resources for mitigating economic denial of sustainability (EDoS) attacks, Zubair A. Baig, Sadiq M. Sait, and Farid Binbeshr

Link

On 802.11 access point locatability and named entity recognition in service set identifiers, Maxim Chernyshev, Craig Valli, and Peter Hannay

Link

Information security and practice: The user's perspective, Nathan Clarke, Fudong Li, Steven Furnell, Ingo Stengel, and Giorgio Ganis

Link

Protecting corporate intellectual property: Legal and technical approaches, Michael G. Crowley and Michael N. Johnstone

Link

Vulnerability management: Not a patch on where we should be?, Steve Furnell

Link

Identifying users by network traffic metadata, Alotibi Gaseb, Nathan Clarke, Fudong Li, and Steven Furnell

Link

Timestamp analysis for quality validation of network forensic data, Nikolai Hampton and Zubair A. Baig

Link

Information security and digital forensics in the world of cyber physical systems, Andrew Jones, Stilianos Vidalis, and Nasser Abouzakhar

Link

The 2016 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE, Thomas Anthony Martin, Andy Jones, and Mohammed Alzaabi

PDF

An automated approach for digital forensic analysis of heterogeneous big data, Hussam Mohammed, Nathan Clarke, and Fudong Li

Link

A comparison study of wireless network security in several Australasian cities and suburbs, Alastair Nisbet and Andrew Woodward

PDF

Going online on behalf of others: An investigation of ‘proxy’ internet consumers, Neil Selwyn, Nicola Johnson, Selena Nemorin, and Elizabeth Knight

Link

Awareness, behaviour and culture: The ABC in cultivating security compliance, Emad Sherif, Steven Furnell, and Nathan Clarke

Link

Extracting intelligence from digital forensic artefacts, Stilianos Vidalis, Olga Angelopoulou, and Andy Jones

Submissions from 2015

Link

Security, privacy and usability – a survey of users’ perceptions and attitudes, Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christopher Reich

Link

A survey of continuous and transparent multibiometric authentication systems, A. Al Abdulwahid, Nathan Clarke, I. Stengel, and Steven Furnell

Link

The value of metadata in digital forensics, Fahad Alanazi and Andrew Jones