Follow
Peter Hannay
Title
Cited by
Cited by
Year
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
3082017
Using traffic analysis to identify the second generation onion router
J Barker, P Hannay, P Szewczyk
2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing …, 2011
602011
Geotagging Where Cyberspace Comes to Your Place.
C Valli, P Hannay
Security and Management, 627-632, 2010
262010
On 802.11 access point locatability and named entity recognition in service set identifiers
M Chernyshev, C Valli, P Hannay
IEEE Transactions on Information Forensics and Security 11 (3), 584-593, 2015
242015
Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things
IN McAteer, MI Malik, Z Baig, P Hannay
202017
GeoIntelligence: Data mining locational social media content for profiling and information gathering
P Hannay, G Baatard
School of Computer and Information Science, Security Research Centre, Edith …, 2011
172011
Eavesdropping on the smart grid
C Valli, A Woodward, C Carpene, P Hannay, M Brand, R Karvinen, ...
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012
132012
A methodology for the forensic acquisition of the TomTom One satellite navigation System-A research in progress
P Hannay
132007
XMPP architecture and security challenges in an IoT ecosystem
MI Malik, IN McAteer, P Hannay, SN Firdous, Z Baig
Proceedings of the 16th Australian Information Security Management …, 2018
112018
Assessment of internationalised domain name homograph attack mitigation
P Hannay, C Bolan
Security Research Centre, School of Computer and Security Science, Edith …, 2009
112009
Why penetration testing is a limited use choice for sound cyber security practice
C Valli, A Woodward, P Hannay, M Johnstone
102014
Satellite navigation forensics techniques
P Hannay
School of Computer and Information Science, Edith Cowan University, Perth …, 2009
102009
Preparing for secure wireless medical environment in 2050: A vision
MI Malik, I Mcateer, P Hannay, Z Baig
IEEE access 6, 25666-25674, 2018
92018
The 2011 IDN homograph attack mitigation survey
P Hannay, G Baatard
92012
Developing resilient cyber-physical systems: A review of state-of-the-art malware detection approaches, gaps, and future directions
MI Malik, A Ibrahim, P Hannay, LF Sikos
Computers 12 (4), 79, 2023
82023
Security vulnerabilities in android applications
C Montealegre, CR Njuguna, MI Malik, P Hannay, IN McAteer
Proceedings of the 16th Australian Information Security Management …, 2018
72018
Security assessment of IoT devices: The case of two smart TVs
M Chernyshev, P Hannay
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015
72015
Forensic acquisition and analysis of the tomtom one satellite navigation unit
P Hannay
School of Computer and Information Science, Edith Cowan University, Perth …, 2008
72008
Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment
P Hannay, P James
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
72007
Comparison of Live Response, Linux Memory Extractor (LiME) and Mem tool for acquiring android’s volatile memory in the malware incident
A Heriyanto, C Valli, P Hannay
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20