Submissions from 2020
Packet analysis for network forensics: A comprehensive survey, Leslie F. Sikos
The evolution of context-aware RDF knowledge graphs, Leslie F. Sikos
Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp
Denial of service attack detection through machine learning for the IoT, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, and Craig Valli
Counterproductive counterterrorism?: A preliminary examination of the terrorist identity as a social construct of conditions of confinement, Nathan Thompson
Dealing with radicalisation in corrective services: A global issue, Nathan Thompson
‘Click for urgent coronavirus update’: how working from home may be exposing us to cybercrime, Craig Valli
Information warfare by proxy: Malware in PLC firmware, Lachlan Walling, Michael N. Johnstone, and Peter Hannay
BotNets in the Internet of Things: The next wave, Ashley Woodiss-Field and Michael N. Johnstone
Security and forensics in the Internet of Things: Research advances and challenges, Wencheng Yang, Michael N. Johnstone, Leslie F. Sikos, and Song Wang
Secure fingerprint authentication with homomorphic encryption, Wencheng Yang, Song Wang, Kan Yu, James Jin Kang, and Michael N. Johnstone
How location-aware access control affects user privacy and security in cloud computing systems, Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, and Isabel Wagner
Securing the elderly in cyberspace with fingerprints, Guanglou Zheng, Wencheng Yang, Mike Johnstone, Rajan Shankaran, and Craig Valli
Towards IoT security automation and orchestration, Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva R. Pokhrel, Surya Nepal, and Helge Janicke
Submissions from 2019
Securing cloud storage by transparent biometric cryptography, Leith Abed, Nathan Clarke, Bogdan Ghita, and Abdulrahman Alruban
Intelligent big data summarization for rare anomaly detection, Mohiuddin Ahmed
Detecting centralized architecture-based botnets using travelling salesperson non-deterministic polynomial-hard problem-TSP-NP technique, Abdullah Al-Ghushami, Nickson Karie, and Victor Kebande
Information security risk communication: A user-centric approach, Manal Alohali, Nathan Clarke, and Steven Furnell
A novel behaviour profiling approach to continuous authentication for mobile applications, Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, and Nathan Clarke
Physical activity recognition by utilising smartphone sensor signals, Abdulrahman Alruban, Hind Alobaidi, Nathan Clarke, and Fudong Li
An outlook at agile methodologies for the independent games developer, Renae Aurisch, Mohiuddin Ahmed, and Abu Barkat
Information security, Zubair Baig, Sherali Zeadally, and Andrew Woodward
Review and analysis of Cowrie artefacts and their potential to be used deceptively, Warren Cabral, Craig Valli, Leslie Sikos, and Samuel Wakeling
The Semantic Web3D: Towards comprehensive representation of 3D content on the Semantic Web, Jakub Flotyński, Don Brutzman, Felix G. Hamza-Lup, Athanasios Malamos, Nicholas Polys, Leslie F. Sikos, and Krzysztof Walczak
Deep learning-based intrusion detection for IoT networks, Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, and Antonio Robles-Kelly
Demystifying the technical and managerial challenges of authentication, Ben Goodwin and Patryk Szewczyk
Secure smart contract supply chains, Richard Greene and Michael N. Johnstone
Security and privacy based access control model for internet of connected vehicles, Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P.C. Rodrigues, and Muhammad Sayim Khalil
An evaluation of phishing email awareness in an information warfare age, Leon Hansan, Aaron Troiani, and Patryk Szewczyk
Correction to: A security review of local government using NIST CSF: A case study, Ahmed Ibrahim, Craig Valli, Ian McAteer, and Junaid Chaudhry
Identification and extraction of digital forensic evidence from multimedia data sources using multi-algorithmic fusion, Shahlaa Mashhadani, Nathan Clarke, and F. Li
Integration of biometrics and steganography: A comprehensive review, Ian McAteer, Ahmed Ibrahim, Guanglou Zhang, Wencheng Yang, and Craig Valli
Forensic Analysis of the Nintendo 3DS NAND, Gus Pessolano, Huw O. L. Read, Iain Sutherland, and Konstantinos Xynos
Division polynomial-based elliptic curve scalar multiplication revisited, SrinivasaRao SubramanyaRao, Zhi Hu, and Chang-An Zhao
Bio-inspired cyber-security for the smart grid, Naeem Firdous Syed, Ahmed Ibrahim, Zubair Baig, and Craig Valli
A comprehensive framework for understanding security culture in organizations, Alaa Tolah, Steven M. Furnell, and Maria Papadaki
Proof-of-familiarity: A privacy-preserved blockchain scheme for collaborative medical decision-making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, and Chul-Soo Kim
Fingerprint and face scanners aren’t as secure as we think they are, Wencheng Yang and Song Wang
A cancelable iris- and steganography-based user authentication system for the Internet of Things, Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zhang, Marcelo Jose Macedo, Michael N. Johnstone, and Craig Valli
Security and accuracy of fingerprint-based biometrics: A review, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, and Craig Valli
Securing deep learning based edge finger-vein biometrics with binary decision diagram, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zhang, Jucheng Yang, and Craig Valli
A privacy-preserving lightweight biometric system for internet of things security, Wencheng Yang, Song Wang, Guanglou Zheng, Jucheng Yang, and Craig Valli
Fingerprint access control for wireless insulin pump systems using cancelable Delaunay triangulations, Guanglou Zhang, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, and Li Qiao
Submissions from 2018
Risk analysis of cloud sourcing in healthcare and public health industry, Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, and Craig Valli
Misuse detection in a simulated IaaS environment, Burhan Al-Bayati, Nathan Clarke, Paul Dowland, and Fudong Li
A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems, Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, and Maruf Pasha
The design and evaluation of a user-centric information security risk assessment and response framework, Manal Alohali, Nathan Clarke, and Steven Furnell
Identifying and predicting the factors affecting end-users’ risk-taking behavior, Manal Alohali, Nathan Clarke, Fudong Li, and Steven M. Furnell
An analysis of home user security awareness & education, Fayez Alotaibi, Nathan Clarke, and Steven Furnell
Enhancing cyber security awareness with mobile games, F. Alotaibi, Steven Furnell, I Stengel, and M. Papadaki
A holistic framework for enhancing privacy awareness, A. Alshehri, Nathan Clarke, and F. Li
A console GRID leveraged authentication and key agreement mechanism for LTE/SAE, Rajakumar Arul, Gunasekaran Raja, Ali K. Bashir, Junaid Chaudry, and Amjad M. Ali
Muscle activity-driven green-oriented random number generation mechanism to secure WBSN wearable device communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, and Shixiong Chen
Enabling technologies for post market surveillance of medical devices, Junaid Chaudhry, Ali Kashif Bashir, Syed Hassan Ahmed, Jon Haas, and Guanglou Zheng
POStCODE middleware for post-market surveillance of medical devices for cyber security in medical and healthcare sector in Australia, Junaid Chaudhry, Craig Valli, Michael Crowley, Jon Haass, and Peter Roberts
Internet of Things (IoT): Research, simulators, and testbeds, Maxim Chernyshev, Zubair Baig, Oladayo Bello, and Sherali Zeadally
A novel approach for face recognition using fused GMDH-based networks, El-Sayed El-Alfy, Zubair Baig, and Radwan Abdel-Aal
Transparent authentication: Utilising heart rate for user authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland Dr, and Fudong Li
Assessing website password practices – over a decade of progress?, Steven Furnell
Design principles and guidelines for targeted security awareness, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland
A novel multimedia-forensic analysis tool (M-FAT), Shahlaa Mashhadani, Hiba Al-kawaz, Nathan Clarke, Steven Furnell, and Fudong Li
A bio-inspired secure IPv6 communication protocol for Internet of Things, Kashif Saleem, Junaid Chaudhry, Mehmet A. Orgun, and Jalal Al-Muhtadi
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, Van Nhan Vo, Tri Gia Nguyen, Chakchai So-In, Zubair Ahmed Baig, and Surasak Sanguanpong
Towards a method for detecting botnet code on IoT devices, Ashley Woodiss-Field and Michael N. Johnstone
Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem, Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Chaudhry, Erwin Adi, and Craig Valli
Impact of feature proportion on matching performance of multi-biometric systems, Wencheng Yang, Song Wang, Guanglou Zheng, and Craig Valli
A critical analysis of ECG-based key distribution for securing wearable and implantable medical devices, Guanglou Zheng, Rajan Shankaran, Wencheng Yang, Craig Valli, Li Qiao, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay
Finger-to-Heart(F2H): Authentication for wireless implantable medical devices, Guanglou Zheng, Wencheng Yang, Craig Valli, Li Qiao, Rajan Shankaran, Mehmet A. Orgun, and Subhas Chandra Mukhopadhyay
Submissions from 2017
A method to enhance the accuracy of digital forensic in the absence of sufficient evidence in Saudi Arabia, Fahad Alanazi and Andy Jones
Unobtrusive gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Fudong Li, and Paul Haskell-Dowland Dr
Information security behavior: Recognizing the influencers, Manal Alohali, Nathan Clarke, Steven Furnell, and Saad Albakri
A survey of cyber-security awareness in Saudi Arabia, Faisal Mohamed Alotaibi, Steven Furnell, Ingo Stengel, and Maria Papadaki
Information security policies: A review of challenges and influencing factors, Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke
User profiling from network traffic via novel application-level interactions, Gaseb Alotibi, Nathan Clarke, Fudong Li, and Steven Furnell
Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi context, Norah Alqahtani, Steven Furnell, Shirley Atkinson, and Ingo Stengel
A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich
Insider misuse attribution using biometrics, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven M. Furnell
Future challenges for smart cities: Cyber-security and digital forensics, Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya N. Rabadia, Peter Hannay, Maxim Chernyshev, Michael N. Johnstone, Paresh Kerai, Ahmad Ibrahim, Krishnun Sansurooah, Naeem Syed, and Matthew Peacock
The effectiveness of classification algorithms on IPv6 IID construction, Clinton Carpene, Michael N. Johnstone, and Andrew Woodward
Enhancements in data-recovery and re-transmit mechanisms of transmission control protocol enabled medical devices, Junaid Chaudhry, Mudassar Ahmad, Muhammad Asif Habib, Rehan Ashraf, and Craig Valli
Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting, Junaid Chaudhry, Uvais Qidwai, Mahdi H. Miraz, Ahmed Ibrahim, and Craig Valli
AZSPM: Autonomic zero-knowledge security provisioning model for medical control systems in fog computing environments, Junaid Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, and Craig Valli
Revisiting urban war nibbling: Mobile passive discovery of classic bluetooth devices using ubertooth one, Maxim Chernyshev, Craig Valli, and Michael Johnstone
Insider misuse identification using transparent biometrics, Nathan Clarke, Fudong Li, Abdulrahman Alruban, and Steven Furnell
The intelligence analyst: Attributes, knowledge, skills and characteristics, Teresa Deering and Jeff Corkill
Smart watch based body-temperature authentication, Timibloudi S. Enamamu, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li
Climate control systems for public safety in smart cars, Sajida Imran, Ali Kashif Bashir, and Junaid Chaudhry
Jurisdictional issues in cloud forensics, M. James and Patryk Szewczyk
Novel intrusion detection mechanism with low overhead for SCADA systems, Leandros Maglaras, Helge Janicke, Jianmin Jiang, and Andrew Crampton
Towards targeted security awareness raising, Najem Mahmoud, Steven Furnell, and Paul Haskell-Dowland
Modelling and evaluation of malicious attacks against the IoT MQTT protocol, Naeem Firdous Syed, Zubair Baig, Craig Valli, and Ahmed Ibrahim
Broadband router security: History, challenges and future implications, Patryk Szewczyk and Rose Macdonald
An analysis of unauthorized wireless network usage in Western Australia, P. Szewczyk, D. Blackman, and K. Sansurooah
Face ID and iOS 11: a few lingering security questions about the new iPhone X, Wencheng Yang and Guanglou Zheng
Cybersecurity for wireless implants, Guanglou Zheng, Rajan Shankaran, and Craig Valli
Submissions from 2016
Distributed denial-of-service attacks against HTTP/2 services, Erwin Adi, Zubair A. Baig, Philip Hingston, and Chiou-Peng Lam
Adaptive behavioral profiling for identity verification in cloud computing: A model and preliminary analysis, Burhan Al-Bayati, Nathan Clarke, and Paul Dowland
A suspect-oriented intelligent and automated computer forensic analysis, M. Al Fahdi, Nathan L. Clarke, Fudong Li, and Steven M. Furnell
A framework for understanding and assessing the core capability of a digital forensics organisation, Ahmed Almarzooqi and Andrew Jones
Applying grounded theory methods to digital forensics research, Ahmed Almarzooqi and Andrew Jones