Future challenges for smart cities: Cyber-security and digital forensics ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ... Digital Investigation 22, 3-13, 2017 | 344 | 2017 |
Using traffic analysis to identify the second generation onion router J Barker, P Hannay, P Szewczyk 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing …, 2011 | 63 | 2011 |
On 802.11 access point locatability and named entity recognition in service set identifiers M Chernyshev, C Valli, P Hannay IEEE Transactions on Information Forensics and Security 11 (3), 584-593, 2015 | 30 | 2015 |
Developing resilient cyber-physical systems: a review of state-of-the-art malware detection approaches, gaps, and future directions MI Malik, A Ibrahim, P Hannay, LF Sikos Computers 12 (4), 79, 2023 | 28 | 2023 |
Geotagging Where Cyberspace Comes to Your Place. C Valli, P Hannay Security and Management, 627-632, 2010 | 26 | 2010 |
Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things IN McAteer, MI Malik, Z Baig, P Hannay | 25 | 2017 |
GeoIntelligence: Data mining locational social media content for profiling and information gathering P Hannay, G Baatard School of Computer and Information Science, Security Research Centre, Edith …, 2011 | 18 | 2011 |
Eavesdropping on the smart grid C Valli, A Woodward, C Carpene, P Hannay, M Brand, R Karvinen, ... SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012 | 15 | 2012 |
XMPP architecture and security challenges in an IoT ecosystem MI Malik, IN McAteer, P Hannay, SN Firdous, Z Baig Proceedings of the 16th Australian Information Security Management …, 2018 | 14 | 2018 |
A methodology for the forensic acquisition of the TomTom One satellite navigation System-A research in progress P Hannay | 13 | 2007 |
Assessment of internationalised domain name homograph attack mitigation P Hannay, C Bolan Security Research Centre, School of Computer and Security Science, Edith …, 2009 | 12 | 2009 |
Satellite navigation forensics techniques P Hannay School of Computer and Information Science, Edith Cowan University, Perth …, 2009 | 11 | 2009 |
Preparing for secure wireless medical environment in 2050: A vision MI Malik, I Mcateer, P Hannay, Z Baig IEEE access 6, 25666-25674, 2018 | 10 | 2018 |
Security vulnerabilities in android applications C Montealegre, CR Njuguna, MI Malik, P Hannay, IN McAteer Proceedings of the 16th Australian Information Security Management …, 2018 | 10 | 2018 |
Why penetration testing is a limited use choice for sound cyber security practice C Valli, A Woodward, P Hannay, M Johnstone | 10 | 2014 |
The 2011 IDN homograph attack mitigation survey P Hannay, G Baatard | 9 | 2012 |
Comparison of Live Response, Linux Memory Extractor (LiME) and Mem tool for acquiring android’s volatile memory in the malware incident A Heriyanto, C Valli, P Hannay SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015 | 7 | 2015 |
Security assessment of IoT devices: The case of two smart TVs M Chernyshev, P Hannay SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015 | 7 | 2015 |
Forensic acquisition and analysis of the tomtom one satellite navigation unit P Hannay School of Computer and Information Science, Edith Cowan University, Perth …, 2008 | 7 | 2008 |
Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment P Hannay, P James School of Computer and Information Science, Edith Cowan University, Perth …, 2007 | 7 | 2007 |