Craig Valli
Craig Valli
Verified email at
Cited by
Cited by
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
Security and accuracy of fingerprint-based biometrics: A review
W Yang, S Wang, J Hu, G Zheng, C Valli
Symmetry 11 (2), 141, 2019
A fingerprint and finger-vein based cancelable multi-biometric system
W Yang, S Wang, J Hu, G Zheng, C Valli
Pattern Recognition 78, 242-251, 2018
Denial of service attack detection through machine learning for the IoT
NF Syed, Z Baig, A Ibrahim, C Valli
Journal of Information and Telecommunication 4 (4), 482-503, 2020
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
A review of security standards and frameworks for IoT-based smart environments
NM Karie, NM Sahri, W Yang, C Valli, VR Kebande
IEEE Access 9, 121975-121995, 2021
The convergence of IT and OT in critical infrastructure
G Murray, MN Johnstone, C Valli
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6, 36939-36947, 2018
Securing deep learning based edge finger vein biometrics with binary decision diagram
W Yang, S Wang, J Hu, G Zheng, J Yang, C Valli
IEEE Transactions on Industrial Informatics 15 (7), 4244-4253, 2019
Biometrics for internet-of-things security: A review
W Yang, S Wang, NM Sahri, NM Karie, M Ahmed, C Valli
Sensors 21 (18), 6163, 2021
Malware Forensics: Discovery of the intent of Deception
M Brand, C Valli, A Woodward
Journal of Digital Forensics, Security and Law 5 (4), 31-42, 2010
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing 74, 5171-5186, 2018
Building a digital forensic laboratory: Establishing and managing a successful facility
A Jones, C Valli
Butterworth-Heinemann, 2011
Finger-to-heart (F2H): Authentication for wireless implantable medical devices
G Zheng, W Yang, C Valli, L Qiao, R Shankaran, MA Orgun, ...
IEEE journal of biomedical and health informatics 23 (4), 1546-1557, 2018
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market
A Jones, C Valli, G Dardick, I Sutherland
Journal of Digital Forensics, Security and Law 3 (1), 5-24, 2008
Review and Analysis of Cowrie Artefacts and Their Potential to be used Deceptively
SGW Warren Z Cabral, Craig Valli, Leslie F Sikos
2019 International Conference on Computational Science and Computational …, 2019
A privacy-preserving lightweight biometric system for internet of things security
W Yang, S Wang, G Zheng, J Yang, C Valli
IEEE Communications Magazine 57 (3), 84-89, 2019
Risk analysis of cloud sourcing in healthcare and public health industry
H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ...
IEEE Access 6, 19140-19150, 2018
A wrapper-based feature selection for analysis of large data sets
J Leng, C Valli, L Armstrong
IEEE, 2010
A cancelable iris-and steganography-based user authentication system for the internet of things
W Yang, S Wang, J Hu, A Ibrahim, G Zheng, MJ Macedo, MN Johnstone, ...
Sensors 19 (13), 2985, 2019
The system can't perform the operation now. Try again later.
Articles 1–20