Follow
Craig Valli
Craig Valli
SafeNSecureCyber
Verified email at safensecurecyber.com
Title
Cited by
Cited by
Year
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
2132017
A fingerprint and finger-vein based cancelable multi-biometric system
W Yang, S Wang, J Hu, G Zheng, C Valli
Pattern Recognition 78, 242-251, 2018
1432018
Security and accuracy of fingerprint-based biometrics: A review
W Yang, S Wang, J Hu, G Zheng, C Valli
Symmetry 11 (2), 141, 2019
1322019
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
752017
Malware Forensics: Discovery of the intent of Deception
M Brand, C Valli, A Woodward
Journal of Digital Forensics, Security and Law 5 (4), 31-42, 2010
552010
Building a digital forensic laboratory: Establishing and managing a successful facility
A Jones, C Valli
Butterworth-Heinemann, 2011
492011
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6, 36939-36947, 2018
482018
Securing deep learning based edge finger vein biometrics with binary decision diagram
W Yang, S Wang, J Hu, G Zheng, J Yang, C Valli
IEEE Transactions on Industrial Informatics 15 (7), 4244-4253, 2019
452019
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market
A Jones, C Valli, G Dardick, I Sutherland
Journal of Digital Forensics, Security and Law 3 (1), 5-24, 2008
392008
A wrapper-based feature selection for analysis of large data sets
J Leng, C Valli, L Armstrong
IEEE, 2010
342010
Denial of service attack detection through machine learning for the IoT
NF Syed, Z Baig, A Ibrahim, C Valli
Journal of Information and Telecommunication 4 (4), 482-503, 2020
322020
The convergence of IT and OT in critical infrastructure
G Murray, MN Johnstone, C Valli
322017
Finger-to-heart (F2H): Authentication for wireless implantable medical devices
G Zheng, W Yang, C Valli, L Qiao, R Shankaran, MA Orgun, ...
IEEE journal of biomedical and health informatics 23 (4), 1546-1557, 2018
312018
The 2009 Analysis of Information Remaining on USB Storage Devices Offered forSale on the Second Hand Market
A Jones, C Valli, G Dabibi
School of Computer and Information Science, Edith Cowan University, Perth …, 2009
272009
Geotagging Where Cyberspace Comes to Your Place.
C Valli, P Hannay
International Conference on Security & Management, SAM 2010, 627-632, 2010
262010
SCADA forensics with Snort IDS
C Valli
CSREA Press, 2009
262009
Honeypot technologies and their applicability as an internal countermeasure
C Valli
School of Computer and Information Science, Edith Cowan University, 2005
262005
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing 74 (10), 5171-5186, 2018
252018
Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business
C Valli, I Martinus, JM Johnstone
International Conference on Security and Management, 71-75, 2014
252014
A privacy-preserving lightweight biometric system for internet of things security
W Yang, S Wang, G Zheng, J Yang, C Valli
IEEE Communications Magazine 57 (3), 84-89, 2019
232019
The system can't perform the operation now. Try again later.
Articles 1–20