Craig Valli
Craig Valli
Professor of Digital Forensics, Director - Security Research Institute, Edith Cowan University
Verified email at ecu.edu.au - Homepage
Title
Cited by
Cited by
Year
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
1472017
A fingerprint and finger-vein based cancelable multi-biometric system
W Yang, S Wang, J Hu, G Zheng, C Valli
Pattern Recognition 78, 242-251, 2018
1132018
Security and accuracy of fingerprint-based biometrics: A review
W Yang, S Wang, J Hu, G Zheng, C Valli
Symmetry 11 (2), 141, 2019
892019
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
592017
Malware Forensics: Discovery of the intent of Deception
M Brand, C Valli, A Woodward
Journal of Digital Forensics, Security and Law 5 (4), 31-42, 2010
512010
Building a digital forensic laboratory: Establishing and managing a successful facility
A Jones, C Valli
Butterworth-Heinemann, 2011
472011
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market
A Jones, C Valli, G Dardick, I Sutherland
Journal of Digital Forensics, Security and Law 3 (1), 5-24, 2008
372008
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6, 36939-36947, 2018
362018
Securing deep learning based edge finger vein biometrics with binary decision diagram
W Yang, S Wang, J Hu, G Zheng, J Yang, C Valli
IEEE Transactions on Industrial Informatics 15 (7), 4244-4253, 2019
332019
A wrapper-based feature selection for analysis of large data sets
J Leng, C Valli, L Armstrong
IEEE, 2010
302010
Honeypot technologies and their applicability as a strategic internal countermeasure
C Valli
International Journal of Information and Computer Security 1 (4), 430-436, 2007
262007
Geotagging Where Cyberspace Comes to Your Place.
C Valli, P Hannay
International Conference on Security & Management, SAM 2010, 627-632, 2010
252010
SCADA forensics with Snort IDS
C Valli
CSREA Press, 2009
252009
The 2009 Analysis of Information Remaining on USB Storage Devices Offered forSale on the Second Hand Market
A Jones, C Valli, G Dabibi
School of Computer and Information Science, Edith Cowan University, Perth …, 2009
252009
Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business
C Valli, I Martinus, JM Johnstone
International Conference on Security and Management, 71-75, 2014
222014
An analysis of malfeasant activity directed at a voip honeypot
C Valli
School of Computer and Information Science, Edith Cowan University, Perth …, 2010
222010
Risk analysis of cloud sourcing in healthcare and public health industry
H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ...
IEEE Access 6, 19140-19150, 2018
212018
Finger-to-heart (F2H): Authentication for wireless implantable medical devices
G Zheng, W Yang, C Valli, L Qiao, R Shankaran, MA Orgun, ...
IEEE journal of biomedical and health informatics 23 (4), 1546-1557, 2018
202018
Honeypots: How do you know when you are inside one?
S Innes, C Valli
4th Australian Digital Forensics Conference, 28, 2006
202006
The convergence of IT and OT in critical infrastructure
G Murray, MN Johnstone, C Valli
192017
The system can't perform the operation now. Try again later.
Articles 1–20