Follow
Peter Hannay
Title
Cited by
Cited by
Year
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
3442017
Using traffic analysis to identify the second generation onion router
J Barker, P Hannay, P Szewczyk
2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing …, 2011
632011
On 802.11 access point locatability and named entity recognition in service set identifiers
M Chernyshev, C Valli, P Hannay
IEEE Transactions on Information Forensics and Security 11 (3), 584-593, 2015
302015
Developing resilient cyber-physical systems: a review of state-of-the-art malware detection approaches, gaps, and future directions
MI Malik, A Ibrahim, P Hannay, LF Sikos
Computers 12 (4), 79, 2023
282023
Geotagging Where Cyberspace Comes to Your Place.
C Valli, P Hannay
Security and Management, 627-632, 2010
262010
Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things
IN McAteer, MI Malik, Z Baig, P Hannay
252017
GeoIntelligence: Data mining locational social media content for profiling and information gathering
P Hannay, G Baatard
School of Computer and Information Science, Security Research Centre, Edith …, 2011
182011
Eavesdropping on the smart grid
C Valli, A Woodward, C Carpene, P Hannay, M Brand, R Karvinen, ...
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012
152012
XMPP architecture and security challenges in an IoT ecosystem
MI Malik, IN McAteer, P Hannay, SN Firdous, Z Baig
Proceedings of the 16th Australian Information Security Management …, 2018
142018
A methodology for the forensic acquisition of the TomTom One satellite navigation System-A research in progress
P Hannay
132007
Assessment of internationalised domain name homograph attack mitigation
P Hannay, C Bolan
Security Research Centre, School of Computer and Security Science, Edith …, 2009
122009
Satellite navigation forensics techniques
P Hannay
School of Computer and Information Science, Edith Cowan University, Perth …, 2009
112009
Preparing for secure wireless medical environment in 2050: A vision
MI Malik, I Mcateer, P Hannay, Z Baig
IEEE access 6, 25666-25674, 2018
102018
Security vulnerabilities in android applications
C Montealegre, CR Njuguna, MI Malik, P Hannay, IN McAteer
Proceedings of the 16th Australian Information Security Management …, 2018
102018
Why penetration testing is a limited use choice for sound cyber security practice
C Valli, A Woodward, P Hannay, M Johnstone
102014
The 2011 IDN homograph attack mitigation survey
P Hannay, G Baatard
92012
Comparison of Live Response, Linux Memory Extractor (LiME) and Mem tool for acquiring android’s volatile memory in the malware incident
A Heriyanto, C Valli, P Hannay
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015
72015
Security assessment of IoT devices: The case of two smart TVs
M Chernyshev, P Hannay
SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015
72015
Forensic acquisition and analysis of the tomtom one satellite navigation unit
P Hannay
School of Computer and Information Science, Edith Cowan University, Perth …, 2008
72008
Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment
P Hannay, P James
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
72007
The system can't perform the operation now. Try again later.
Articles 1–20