Angela Irwin
Angela Irwin
Unknown affiliation
Verified email at mq.edu.au
Title
Cited by
Cited by
Year
Vehicular ad hoc networks (VANETS): status, results, and challenges
S Zeadally, R Hunt, YS Chen, A Irwin, A Hassan
Telecommunication Systems 50 (4), 217-241, 2012
12942012
An analysis of money laundering and terrorism financing typologies
ASM Irwin, KKR Choo, L Liu
Journal of Money Laundering Control, 2012
662012
The use of crypto-currencies in funding violent jihad
ASM Irwin, G Milad
Journal of Money Laundering Control, 2016
542016
Money laundering and terrorism financing in virtual environments: a feasibility study
ASM Irwin, J Slay, KKR Choo, L Lui
Journal of Money Laundering Control, 2014
472014
Tracking digital footprints: anonymity within the bitcoin system
P Reynolds, ASM Irwin
Journal of Money Laundering Control, 2017
452017
Modelling of money laundering and terrorism financing typologies
ASM Irwin, KKR Choo, L Liu
Journal of Money laundering control, 2012
302012
Detecting money laundering and terrorism financing activity in Second Life and World of Warcraft
ASM Irwin, J Slay
School of Computer and Information Science, Security Research Centre, Edith …, 2010
282010
Bitcoin transactions: a digital discovery of illicit activity on the blockchain
A Turner, ASM Irwin
Journal of Financial Crime, 2018
242018
Are the financial transactions conducted inside virtual environments truly anonymous? An experimental research from an Australian perspective
ASM Irwin, J Slay, KKR Choo, L Liu
Journal of Money Laundering Control, 2013
182013
Illicit Bitcoin transactions: challenges in getting to the who, what, when and where
ASM Irwin, AB Turner
Journal of money laundering control, 2018
172018
Why I chose to leave mainstream psychiatric services: a peer supporter’s personal perspective
S Irwin
Mental Health and Social Inclusion, 2017
9*2017
Following the cyber money trail: global challenges when investigating ransomware attacks and how regulation can help
ASM Irwin, C Dawson
Journal of money laundering control 22 (1), 110-131, 2019
72019
Double-edged sword: dual-purpose cyber security methods
ASM Irwin
Cyber Weaponry, 101-112, 2018
32018
Forensic methods for detection of deniable encryption in mobile networks
A Irwin, R Hunt
2009 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2009
22009
The Future of Technology in Customer Identification & Relationship Risk
A Irwin, KKR Choo
Thomson Reuters Accelus, 1-13, 2013
12013
Following the cyber money trail
ASM Irwin, C Dawson
Journal of Money Laundering Control, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–16