BibTeX records: Jill Slay

download as .bib file

@article{DBLP:journals/iotj/SalimMHOS24,
  author       = {Sara Salim and
                  Nour Moustafa and
                  Mohamed Hassanian and
                  David Ormod and
                  Jill Slay},
  title        = {Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite
                  Communications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {3},
  pages        = {3853--3867},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3301626},
  doi          = {10.1109/JIOT.2023.3301626},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/SalimMHOS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/AlHawawrehMS24,
  author       = {Muna Al{-}Hawawreh and
                  Nour Moustafa and
                  Jill Slay},
  title        = {A threat intelligence framework for protecting smart satellite-based
                  healthcare networks},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {15--35},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-021-06441-5},
  doi          = {10.1007/S00521-021-06441-5},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/AlHawawrehMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KoroniotisMS22,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Jill Slay},
  title        = {A new Intelligent Satellite Deep Learning Network Forensic framework
                  for smart satellite networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {99},
  pages        = {107745},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2022.107745},
  doi          = {10.1016/J.COMPELECENG.2022.107745},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/KoroniotisMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/NgoPXMS22,
  author       = {Quynh Tu Ngo and
                  Khoa Tran Phan and
                  Wei Xiang and
                  Abdun Mahmood and
                  Jill Slay},
  title        = {Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication
                  Networks},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {58},
  number       = {3},
  pages        = {1753--1765},
  year         = {2022},
  url          = {https://doi.org/10.1109/TAES.2021.3121657},
  doi          = {10.1109/TAES.2021.3121657},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/NgoPXMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PlotnekS21,
  author       = {Jordan J. Plotnek and
                  Jill Slay},
  title        = {Cyber terrorism: {A} homogenized taxonomy and definition},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102145},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102145},
  doi          = {10.1016/J.COSE.2020.102145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PlotnekS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PlotnekS21,
  author       = {Jordan J. Plotnek and
                  Jill Slay},
  title        = {Power systems resilience: Definition and taxonomy with a view towards
                  metrics},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100411},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100411},
  doi          = {10.1016/J.IJCIP.2021.100411},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/PlotnekS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/NgoPXMS21,
  author       = {Quynh Tu Ngo and
                  Khoa Tran Phan and
                  Wei Xiang and
                  Abdun Mahmood and
                  Jill Slay},
  title        = {On Edge Caching in Satellite - IoT Networks},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {4},
  number       = {4},
  pages        = {107--112},
  year         = {2021},
  url          = {https://doi.org/10.1109/IOTM.001.2100062},
  doi          = {10.1109/IOTM.001.2100062},
  timestamp    = {Tue, 05 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotm/NgoPXMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/MoustafaMS21,
  author       = {Nour Moustafa and
                  Gaurav Misra and
                  Jill Slay},
  title        = {Generalized Outlier Gaussian Mixture Technique Based on Automated
                  Association Features for Simulating and Detecting Web Application
                  Attacks},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {245--256},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSUSC.2018.2808430},
  doi          = {10.1109/TSUSC.2018.2808430},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/MoustafaMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/NgoPXMS21,
  author       = {Quynh Tu Ngo and
                  Khoa Tran Phan and
                  Wei Xiang and
                  Abdun Naser Mahmood and
                  Jill Slay},
  editor       = {David Mohaisen and
                  Ruoming Jin},
  title        = {Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial
                  Networks},
  booktitle    = {Computational Data and Social Networks - 10th International Conference,
                  CSoNet 2021, Virtual Event, November 15-17, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13116},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91434-9\_26},
  doi          = {10.1007/978-3-030-91434-9\_26},
  timestamp    = {Tue, 05 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csonet/NgoPXMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MoustafaHS19,
  author       = {Nour Moustafa and
                  Jiankun Hu and
                  Jill Slay},
  title        = {A holistic review of Network Anomaly Detection Systems: {A} comprehensive
                  survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {128},
  pages        = {33--55},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2018.12.006},
  doi          = {10.1016/J.JNCA.2018.12.006},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/MoustafaHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/MoustafaSC19,
  author       = {Nour Moustafa and
                  Jill Slay and
                  Gideon Creech},
  title        = {Novel Geometric Area Analysis Technique for Anomaly Detection Using
                  Trapezoidal Area Estimation on Large-Scale Networks},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {5},
  number       = {4},
  pages        = {481--494},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBDATA.2017.2715166},
  doi          = {10.1109/TBDATA.2017.2715166},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbd/MoustafaSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/MoustafaS18,
  author       = {Nour Moustafa and
                  Jill Slay},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {A Network Forensic Scheme Using Correntropy-Variation for Attack Detection},
  booktitle    = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International
                  Conference, New Delhi, India, January 3-5, 2018, Revised Selected
                  Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {532},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99277-8\_13},
  doi          = {10.1007/978-3-319-99277-8\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/MoustafaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HaiderHSTX17,
  author       = {Waqas Haider and
                  Jiankun Hu and
                  Jill Slay and
                  Benjamin P. Turnbull and
                  Yi Xie},
  title        = {Generating realistic intrusion detection system dataset based on fuzzy
                  qualitative modeling},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {87},
  pages        = {185--192},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.03.018},
  doi          = {10.1016/J.JNCA.2017.03.018},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/HaiderHSTX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/WijayarathnaAS17,
  author       = {Chamila Wijayarathna and
                  Nalin Asanka Gamagedara Arachchilage and
                  Jill Slay},
  editor       = {Theo Tryfonas},
  title        = {A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability
                  of Security APIs},
  booktitle    = {Human Aspects of Information Security, Privacy and Trust - 5th International
                  Conference, {HAS} 2017, Held as Part of {HCI} International 2017,
                  Vancouver, BC, Canada, July 9-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10292},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58460-7\_11},
  doi          = {10.1007/978-3-319-58460-7\_11},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/WijayarathnaAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/SenarathAS17,
  author       = {Awanthika Senarath and
                  Nalin Asanka Gamagedara Arachchilage and
                  Jill Slay},
  editor       = {Theo Tryfonas},
  title        = {Designing Privacy for You: {A} Practical Approach for User-Centric
                  Privacy - Practical Approach for User-Centric Privacy},
  booktitle    = {Human Aspects of Information Security, Privacy and Trust - 5th International
                  Conference, {HAS} 2017, Held as Part of {HCI} International 2017,
                  Vancouver, BC, Canada, July 9-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10292},
  pages        = {739--752},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58460-7\_50},
  doi          = {10.1007/978-3-319-58460-7\_50},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/SenarathAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/monami/KoroniotisMSS17,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Elena Sitnikova and
                  Jill Slay},
  editor       = {Jiankun Hu and
                  Ibrahim Khalil and
                  Zahir Tari and
                  Sheng Wen},
  title        = {Towards Developing Network Forensic Mechanism for Botnet Activities
                  in the IoT Based on Machine Learning Techniques},
  booktitle    = {Mobile Networks and Management - 9th International Conference, {MONAMI}
                  2017, Melbourne, Australia, December 13-15, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {235},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-90775-8\_3},
  doi          = {10.1007/978-3-319-90775-8\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/monami/KoroniotisMSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppig/WijayarathnaAS17,
  author       = {Chamila Wijayarathna and
                  Nalin A. G. Arachchilage and
                  Jill Slay},
  editor       = {Luke Church and
                  Felienne Hermans},
  title        = {Using Cognitive Dimensions Questionnaire to Evaluate the Usability
                  of Security APIs},
  booktitle    = {Proceedings of the 28th Annual Workshop of the Psychology of Programming
                  Interest Group, {PPIG} 2017, Delft, The Netherlands, July 1-3, 2017},
  pages        = {5},
  publisher    = {Psychology of Programming Interest Group},
  year         = {2017},
  url          = {http://ppig.org/library/paper/using-cognitive-dimensions-questionnaire-evaluate-usability-security-apis},
  timestamp    = {Mon, 16 May 2022 15:41:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ppig/WijayarathnaAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WijayarathnaAS17,
  author       = {Chamila Wijayarathna and
                  Nalin Asanka Gamagedara Arachchilage and
                  Jill Slay},
  title        = {A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability
                  of Security APIs},
  journal      = {CoRR},
  volume       = {abs/1703.09846},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.09846},
  eprinttype    = {arXiv},
  eprint       = {1703.09846},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WijayarathnaAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SenarathAS17,
  author       = {Awanthika Senarath and
                  Nalin Asanka Gamagedara Arachchilage and
                  Jill Slay},
  title        = {Designing Privacy for You : {A} User Centric Approach For Privacy},
  journal      = {CoRR},
  volume       = {abs/1703.09847},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.09847},
  eprinttype    = {arXiv},
  eprint       = {1703.09847},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SenarathAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WijayarathnaAS17a,
  author       = {Chamila Wijayarathna and
                  Nalin Asanka Gamagedara Arachchilage and
                  Jill Slay},
  title        = {Using Cognitive Dimensions Questionnaire to Evaluate the Usability
                  of Security APIs},
  journal      = {CoRR},
  volume       = {abs/1706.00138},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.00138},
  eprinttype    = {arXiv},
  eprint       = {1706.00138},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/WijayarathnaAS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MoustafaS17,
  author       = {Nour Moustafa and
                  Jill Slay},
  title        = {A hybrid feature selection for network intrusion detection systems:
                  Central points},
  journal      = {CoRR},
  volume       = {abs/1707.05505},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.05505},
  eprinttype    = {arXiv},
  eprint       = {1707.05505},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MoustafaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-02824,
  author       = {Nour Moustafa and
                  Jill Slay},
  title        = {{RCNF:} Real-time Collaborative Network Forensic Scheme for Evidence
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/1711.02824},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.02824},
  eprinttype    = {arXiv},
  eprint       = {1711.02824},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-02824.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-02825,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Elena Sitnikova and
                  Jill Slay},
  title        = {Towards Developing Network forensic mechanism for Botnet Activities
                  in the IoT based on Machine Learning Techniques},
  journal      = {CoRR},
  volume       = {abs/1711.02825},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.02825},
  eprinttype    = {arXiv},
  eprint       = {1711.02825},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-02825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/IsmailSS16,
  author       = {Suhaila Ismail and
                  Elena Sitnikova and
                  Jill Slay},
  title        = {{SCADA} Systems Cyber Security for Critical Infrastructures: Case
                  Studies in Multiple Sectors},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {6},
  number       = {3},
  pages        = {79--95},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJCWT.2016070107},
  doi          = {10.4018/IJCWT.2016070107},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/IsmailSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MoustafaS16,
  author       = {Nour Moustafa and
                  Jill Slay},
  title        = {The evaluation of Network Anomaly Detection Systems: Statistical analysis
                  of the {UNSW-NB15} data set and the comparison with the {KDD99} data
                  set},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {25},
  number       = {1-3},
  pages        = {18--31},
  year         = {2016},
  url          = {https://doi.org/10.1080/19393555.2015.1125974},
  doi          = {10.1080/19393555.2015.1125974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MoustafaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ThompsonRSM16,
  author       = {Marcus A. Thompson and
                  Michael J. Ryan and
                  Jill Slay and
                  Alan C. McLucas},
  title        = {Harmonized taxonomies for security and resilience},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {25},
  number       = {1-3},
  pages        = {54--67},
  year         = {2016},
  url          = {https://doi.org/10.1080/19393555.2016.1145772},
  doi          = {10.1080/19393555.2016.1145772},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ThompsonRSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WattS15,
  author       = {Allan Charles Watt and
                  Jill Slay},
  title        = {First responders actions to cope with volatile digital evidence},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {7},
  number       = {4},
  pages        = {381--399},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJESDF.2015.072182},
  doi          = {10.1504/IJESDF.2015.072182},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/WattS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/badgers/MoustafaS15,
  author       = {Nour Moustafa and
                  Jill Slay},
  title        = {The Significant Features of the {UNSW-NB15} and the {KDD99} Data Sets
                  for Network Intrusion Detection Systems},
  booktitle    = {4th International Workshop on Building Analysis Datasets and Gathering
                  Experience Returns for Security, BADGERS@RAID 2015, Kyoto, Japan,
                  November 5, 2015},
  pages        = {25--31},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.ieeecomputersociety.org/10.1109/BADGERS.2015.014},
  doi          = {10.1109/BADGERS.2015.014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/badgers/MoustafaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ElsayedSS15,
  author       = {Saber M. Elsayed and
                  Ruhul A. Sarker and
                  Jill Slay},
  title        = {Evaluating the performance of a differential evolution algorithm in
                  anomaly detection},
  booktitle    = {{IEEE} Congress on Evolutionary Computation, {CEC} 2015, Sendai, Japan,
                  May 25-28, 2015},
  pages        = {2490--2497},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CEC.2015.7257194},
  doi          = {10.1109/CEC.2015.7257194},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/ElsayedSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcis/MoustafaS15,
  author       = {Nour Moustafa and
                  Jill Slay},
  title        = {{UNSW-NB15:} a comprehensive data set for network intrusion detection
                  systems {(UNSW-NB15} network data set)},
  booktitle    = {2015 Military Communications and Information Systems Conference, MilCIS
                  2015, Canberra, Australia, November 10-12, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MilCIS.2015.7348942},
  doi          = {10.1109/MILCIS.2015.7348942},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcis/MoustafaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/IsmailSS15,
  author       = {Suhaila Ismail and
                  Elena Sitnikova and
                  Jill Slay},
  editor       = {Atreyi Kankanhalli and
                  Andrew Burton{-}Jones and
                  Thompson S. H. Teo},
  title        = {Studying {SCADA} Organisations Information Security Goals: An Integrated
                  System Theory Approach},
  booktitle    = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015,
                  Singapore, July 5-9, 2015},
  pages        = {77},
  year         = {2015},
  url          = {http://aisel.aisnet.org/pacis2015/77},
  timestamp    = {Sat, 12 Dec 2015 19:19:58 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/IsmailSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/XieHS14,
  author       = {Miao Xie and
                  Jiankun Hu and
                  Jill Slay},
  title        = {Evaluating host-based anomaly detection systems: Application of the
                  one-class {SVM} algorithm to {ADFA-LD}},
  booktitle    = {11th International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2014, Xiamen, China, August 19-21, 2014},
  pages        = {978--982},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/FSKD.2014.6980972},
  doi          = {10.1109/FSKD.2014.6980972},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/XieHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/IsmailSS14,
  author       = {Suhaila Ismail and
                  Elena Sitnikova and
                  Jill Slay},
  title        = {Using integrated system theory approach to assess security for {SCADA}
                  systems cyber security for critical infrastructures: {A} pilot study},
  booktitle    = {11th International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2014, Xiamen, China, August 19-21, 2014},
  pages        = {1000--1006},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/FSKD.2014.6980976},
  doi          = {10.1109/FSKD.2014.6980976},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/IsmailSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/IsmailSS14,
  author       = {Suhaila Ismail and
                  Elena Sitnikova and
                  Jill Slay},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Towards Developing {SCADA} Systems Security Measures for Critical
                  Infrastructures against Cyber-Terrorist Attacks},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {242--249},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_20},
  doi          = {10.1007/978-3-642-55415-5\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/IsmailSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ShahMS14,
  author       = {Zubair Shah and
                  Abdun Naser Mahmood and
                  Jill Slay},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Forensic Potentials of Solid State Drives},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {153},
  pages        = {113--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23802-9\_11},
  doi          = {10.1007/978-3-319-23802-9\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ShahMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SlayS14,
  author       = {Jill Slay and
                  Fiona Schulz},
  title        = {Development of an Ontology Based Forensic Search Mechanism: Proof
                  of Concept},
  journal      = {CoRR},
  volume       = {abs/1407.8258},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.8258},
  eprinttype    = {arXiv},
  eprint       = {1407.8258},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SlayS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AriffinDCS13,
  author       = {Aswami Ariffin and
                  Christian D'Orazio and
                  Kim{-}Kwang Raymond Choo and
                  Jill Slay},
  title        = {iOS Forensics: How Can We Recover Deleted Image Files with Timestamp
                  in a Forensically Sound Manner?},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {375--382},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.50},
  doi          = {10.1109/ARES.2013.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AriffinDCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AriffinCS13,
  author       = {Aswami Ariffin and
                  Kim{-}Kwang Raymond Choo and
                  Jill Slay},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Digital Camcorder Forensics},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {39--48},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Ariffin.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AriffinCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/AriffinSC13,
  author       = {Aswami Ariffin and
                  Jill Slay and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Data Recovery from Proprietary Formatted Cctv Hard Disks},
  booktitle    = {Advances in Digital Forensics {IX} - 9th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, FL, USA, January 28-30,
                  2013, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {410},
  pages        = {213--223},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41148-9\_15},
  doi          = {10.1007/978-3-642-41148-9\_15},
  timestamp    = {Sun, 25 Oct 2020 23:10:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/AriffinSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/IrwinDS12,
  author       = {David Irwin and
                  Arek Dadej and
                  Jill Slay},
  title        = {Extraction Of Electronic Evidence From VoIP: Identification {\&}
                  Analysis Of Digital Speech},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {55--82},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1128},
  doi          = {10.15394/JDFSL.2012.1128},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/IrwinDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/OsborneTS12,
  author       = {Grant Osborne and
                  Benjamin P. Turnbull and
                  Jill Slay},
  editor       = {Xiaoying Bai and
                  Fevzi Belli and
                  Elisa Bertino and
                  Carl K. Chang and
                  Atilla El{\c{c}}i and
                  Cristina Cerschi Seceleanu and
                  Haihua Xie and
                  Mohammad Zulkernine},
  title        = {Development of InfoVis Software for Digital Forensics},
  booktitle    = {36th Annual {IEEE} Computer Software and Applications Conference Workshops,
                  {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012},
  pages        = {213--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/COMPSACW.2012.47},
  doi          = {10.1109/COMPSACW.2012.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/OsborneTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/OsborneTS12,
  author       = {Grant Osborne and
                  Hannah Thinyane and
                  Jill Slay},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Visualizing Information in Digital Forensics},
  booktitle    = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Pretoria, South Africa, January 3-5,
                  2012, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {383},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33962-2\_3},
  doi          = {10.1007/978-3-642-33962-2\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/OsborneTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeckettS11,
  author       = {Jason Beckett and
                  Jill Slay},
  title        = {Scientific underpinnings and background to standards and accreditation
                  in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {114--121},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.08.001},
  doi          = {10.1016/J.DIIN.2011.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BeckettS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/IrwinSDS11,
  author       = {David Irwin and
                  Jill Slay and
                  Arek Dadej and
                  Malcolm Shore},
  title        = {Extraction of Electronic Evidence from VoIP: Forensic Analysis of
                  {A} Virtual Hard Disk Vs {RAM}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {1},
  pages        = {15--36},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1086},
  doi          = {10.15394/JDFSL.2011.1086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/IrwinSDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SimonS11,
  author       = {Matthew Simon and
                  Jill Slay},
  title        = {Recovery of Pidgin Chat Communication Artefacts from Physical Memory:
                  {A} Pilot Test to Determine Feasibility},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {183--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.33},
  doi          = {10.1109/ARES.2011.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SimonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OsborneS11,
  author       = {Grant Osborne and
                  Jill Slay},
  title        = {Digital Forensics Infovis: An Implementation of a Process for Visualisation
                  of Digital Evidence},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {196--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.36},
  doi          = {10.1109/ARES.2011.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OsborneS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/HuntS11,
  author       = {Ray Hunt and
                  Jill Slay},
  editor       = {Bharadwaj Veeravalli and
                  Ian T. Foster},
  title        = {A new approach to developing attack taxonomies for network security
                  - including case studies},
  booktitle    = {Proceedings of the 17th {IEEE} International Conference on Networks,
                  {ICON} 2011, Singapore, December 14-16, 2011},
  pages        = {281--286},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICON.2011.6168489},
  doi          = {10.1109/ICON.2011.6168489},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icon/HuntS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/IrwinS11,
  author       = {David Irwin and
                  Jill Slay},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Extracting Evidence Related to VoIP Calls},
  booktitle    = {Advances in Digital Forensics {VII} - 7th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, FL, USA, January 31 - February
                  2, 2011, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {361},
  pages        = {221--228},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24212-0\_17},
  doi          = {10.1007/978-3-642-24212-0\_17},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/IrwinS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GuoS10,
  author       = {Yinghua Guo and
                  Jill Slay},
  title        = {Testing Forensic Copy Function of Computer Forensics Investigation
                  Tools},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {46--61},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903521392},
  doi          = {10.1080/15567280903521392},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GuoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GuoS10,
  author       = {Yinghua Guo and
                  Jill Slay},
  title        = {Computer Forensic Function Testing: Media Preparation, Write Protection
                  And Verification},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {5--20},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1072},
  doi          = {10.15394/JDFSL.2010.1072},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GuoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SimonS10,
  author       = {Matthew Simon and
                  Jill Slay},
  title        = {Recovery of Skype Application Activity Data from Physical Memory},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {283--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.73},
  doi          = {10.1109/ARES.2010.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SimonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OsborneTS10,
  author       = {Grant Osborne and
                  Benjamin P. Turnbull and
                  Jill Slay},
  title        = {The 'Explore, Investigate and Correlate' {(EIC)} Conceptual Framework
                  for Digital Forensics Information Visualisation},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {629--634},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.74},
  doi          = {10.1109/ARES.2010.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OsborneTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GuoS10,
  author       = {Yinghua Guo and
                  Jill Slay},
  title        = {A Function Oriented Methodology to Validate and Verify Forensic Copy
                  Function of Digital Forensic Tools},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {665--670},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.16},
  doi          = {10.1109/ARES.2010.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GuoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/GuoS10,
  author       = {Yinghua Guo and
                  Jill Slay},
  editor       = {Kam{-}Pui Chow and
                  Sujeet Shenoi},
  title        = {Data Recovery Function Testing for Digital Forensic Tools},
  booktitle    = {Advances in Digital Forensics {VI} - Sixth {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010,
                  Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {337},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15506-2\_21},
  doi          = {10.1007/978-3-642-15506-2\_21},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/GuoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HuntS10,
  author       = {Ray Hunt and
                  Jill Slay},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {The Design of Real-Time Adaptive Forensically Sound Secure Critical
                  Infrastructure},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {328--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.38},
  doi          = {10.1109/NSS.2010.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/HuntS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HuntS10,
  author       = {Ray Hunt and
                  Jill Slay},
  title        = {Achieving critical infrastructure protection through the interaction
                  of computer security and network forensics},
  booktitle    = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010,
                  August 17-19, 2010, Ottawa, Ontario, Canada},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/PST.2010.5593243},
  doi          = {10.1109/PST.2010.5593243},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/HuntS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuoSB09,
  author       = {Yinghua Guo and
                  Jill Slay and
                  Jason Beckett},
  title        = {Validation and verification of computer forensic software tools -
                  Searching Function},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S12--S22},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.015},
  doi          = {10.1016/J.DIIN.2009.06.015},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuoSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SlayS09,
  author       = {Jill Slay and
                  Matthew Simon},
  title        = {Voice Over {IP:} Privacy and Forensic Implications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {1},
  number       = {1},
  pages        = {89--101},
  year         = {2009},
  url          = {https://doi.org/10.4018/jdcf.2009010106},
  doi          = {10.4018/JDCF.2009010106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SlayS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MubarakS09,
  author       = {Sameera Mubarak and
                  Jill Slay},
  title        = {Protecting clients from insider attacks on trust accounts},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {14},
  number       = {4},
  pages        = {202--212},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.istr.2010.04.006},
  doi          = {10.1016/J.ISTR.2010.04.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MubarakS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SimonS09,
  author       = {Matthew Simon and
                  Jill Slay},
  title        = {Enhancement of Forensic Computing Investigations through Memory Forensic
                  Techniques},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {995--1000},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.119},
  doi          = {10.1109/ARES.2009.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SimonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/SlayS09,
  author       = {Jill Slay and
                  Elena Sitnikova},
  editor       = {Matthew Sorell},
  title        = {The Development of a Generic Framework for the Forensic Analysis of
                  {SCADA} and Process Control Systems},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {77--82},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_9},
  doi          = {10.1007/978-3-642-02312-5\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/SlayS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/SlayLTBL09,
  author       = {Jill Slay and
                  Yi{-}Chi Lin and
                  Benjamin P. Turnbull and
                  Jason Beckett and
                  Paul Lin},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Towards a Formalization of Digital Forensics},
  booktitle    = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, Florida, USA, January 26-28,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {306},
  pages        = {37--47},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04155-6\_3},
  doi          = {10.1007/978-3-642-04155-6\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/SlayLTBL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PavlicST08,
  author       = {Timothy Pavlic and
                  Jill Slay and
                  Benjamin P. Turnbull},
  title        = {Developing a Process Model for the Forensic Extraction of Information
                  from Desktop Search Applications},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {1},
  pages        = {35--56},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1036},
  doi          = {10.15394/JDFSL.2008.1036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PavlicST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TurnbullS08,
  author       = {Benjamin P. Turnbull and
                  Jill Slay},
  title        = {Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network
                  Forensics},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1355--1360},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.135},
  doi          = {10.1109/ARES.2008.135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TurnbullS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BroadwayTS08,
  author       = {Joshua Broadway and
                  Benjamin P. Turnbull and
                  Jill Slay},
  title        = {Improving the Analysis of Lawfully Intercepted Network Packet Data
                  Captured for Forensic Analysis},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1361--1368},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.122},
  doi          = {10.1109/ARES.2008.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BroadwayTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/SlayS08,
  author       = {Jill Slay and
                  Matthew Simon},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Voice over {IP} forensics},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {10},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2852},
  doi          = {10.4108/E-FORENSICS.2008.2852},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/SlayS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/PavlicST08,
  author       = {Timothy Pavlic and
                  Jill Slay and
                  Benjamin P. Turnbull},
  editor       = {Indrajit Ray and
                  Sujeet Shenoi},
  title        = {Extracting Evidence Using Google Desktop Search},
  booktitle    = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference
                  on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30,
                  2008},
  series       = {{IFIP}},
  volume       = {285},
  pages        = {43--50},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-84927-0\_4},
  doi          = {10.1007/978-0-387-84927-0\_4},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/PavlicST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LinSL08,
  author       = {Yi{-}Chi Lin and
                  Jill Slay and
                  I{-}Long Lin},
  editor       = {Christopher C. Yang and
                  Hsinchun Chen and
                  Michael Chau and
                  Kuiyu Chang and
                  Sheau{-}Dong Lang and
                  Patrick S. Chen and
                  Raymond Hsieh and
                  Daniel Zeng and
                  Fei{-}Yue Wang and
                  Kathleen M. Carley and
                  Wenji Mao and
                  Justin Zhan},
  title        = {Computer Forensics and Culture},
  booktitle    = {Intelligence and Security Informatics, {IEEE} {ISI} 2008 International
                  Workshops: PAISI, PACCF, and {SOCO} 2008, Taipei, Taiwan, June 17,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5075},
  pages        = {288--297},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69304-8\_29},
  doi          = {10.1007/978-3-540-69304-8\_29},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LinSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BudimirS07,
  author       = {Nikica Budimir and
                  Jill Slay},
  title        = {Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification
                  Information as Digital Evidence},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {1},
  pages        = {75--92},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1018},
  doi          = {10.15394/JDFSL.2007.1018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BudimirS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/BeckettS07,
  author       = {Jason Beckett and
                  Jill Slay},
  title        = {Digital Forensics: Validation and Verification in a Dynamic Work Environment},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {266},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.175},
  doi          = {10.1109/HICSS.2007.175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/BeckettS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SlayP07,
  author       = {Jill Slay and
                  Andrew Przibilla},
  title        = {iPod Forensics: Forensically Sound Examination of an Apple iPod},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {267},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.300},
  doi          = {10.1109/HICSS.2007.300},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SlayP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/TurnbullS07,
  author       = {Benjamin P. Turnbull and
                  Jill Slay},
  title        = {Wireless Forensic Analysis Tools for Use in the Electronic Evidence
                  Collection Process},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {267},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.617},
  doi          = {10.1109/HICSS.2007.617},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/TurnbullS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/SlayM07,
  author       = {Jill Slay and
                  Michael Miller},
  editor       = {Eric Goetz and
                  Sujeet Shenoi},
  title        = {Lessons Learned from the Maroochy Water Breach},
  booktitle    = {Critical Infrastructure Protection, Post-Proceedings of the First
                  Annual {IFIP} Working Group 11.10 International Conference on Critical
                  Infrastructure Protection, Dartmouth College, Hanover, New Hampshire,
                  USA, March 19-21, 2007},
  series       = {{IFIP}},
  volume       = {253},
  pages        = {73--82},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-75462-8\_6},
  doi          = {10.1007/978-0-387-75462-8\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/SlayM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/SimonS07,
  author       = {Matthew Simon and
                  Jill Slay},
  editor       = {Lynn Futcher and
                  Ronald Dodge},
  title        = {Forensic Computing Training, Certification and Accreditation: An Australian
                  Overview},
  booktitle    = {Fifth World Conference on Information Security Education, Proceedings
                  of the {IFIP} {TC11} {WG} 11.8, {WISE} 5, 19 to 21 June 2007, United
                  States Military Academy, West Point, New York, {USA}},
  series       = {{IFIP}},
  volume       = {237},
  pages        = {105--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73269-5\_14},
  doi          = {10.1007/978-0-387-73269-5\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/SimonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SlayT06,
  author       = {Jill Slay and
                  Benjamin P. Turnbull},
  title        = {Computer Security Education and Research in Australia},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {5},
  pages        = {60--63},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.115},
  doi          = {10.1109/MSP.2006.115},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SlayT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/TurnbullBS06,
  author       = {Benjamin P. Turnbull and
                  Barry Blundell and
                  Jill Slay},
  title        = {Google Desktop as a Source of Digital Evidence},
  journal      = {Int. J. Digit. EVid.},
  volume       = {5},
  number       = {1},
  year         = {2006},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/EFE47BD9-A897-6585-5EAB032ADF89EDCF.pdf},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/TurnbullBS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SlayS06,
  author       = {Jill Slay and
                  Fiona Schulz},
  title        = {Development of an Ontology Based Forensic Search Mechanism: Proof
                  of Concept},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {1},
  pages        = {25--44},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1002},
  doi          = {10.15394/JDFSL.2006.1002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SlayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdim/MubarakS06,
  author       = {Sameera Mubarak and
                  Jill Slay},
  title        = {An explorative study on information security of trust accounts within
                  law firms in South Australia: Implications for {IT} security management},
  booktitle    = {First {IEEE} International Conference on Digital Information Management
                  (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings},
  pages        = {55--62},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDIM.2007.369330},
  doi          = {10.1109/ICDIM.2007.369330},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdim/MubarakS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PudneyS05,
  author       = {Phillip Pudney and
                  Jill Slay},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An Investigation of Unauthorised Use of Wireless Networks in Adelaide,
                  South Australia},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_3},
  doi          = {10.1007/11506157\_3},
  timestamp    = {Thu, 26 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PudneyS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/LinS05,
  author       = {Yi{-}Chi Lin and
                  Jill Slay},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Non-Repudiation in Pure Mobile Ad Hoc Network},
  booktitle    = {Proceedings of the 3rd Australian Information Security Management
                  Conference, Perth, Western Australia, 30th September 2005},
  pages        = {59--66},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Mon, 06 Mar 2006 09:42:31 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/LinS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/TurnbullBS05,
  author       = {Benjamin P. Turnbull and
                  Barry Blundell and
                  Jill Slay},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Googling Forensics},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {62--67},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/TurnbullBS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/BlundellDSTW05,
  author       = {Barry Blundell and
                  Huang Xiao Dong and
                  Jill Slay and
                  Benjamin P. Turnbull and
                  Tom Wilsdon},
  title        = {Development of a "Zero-Skills" Forensic Laptop Registration
                  and Identification Tool},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {39--46},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/BlundellDSTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/WilsdonS05,
  author       = {Tom Wilsdon and
                  Jill Slay},
  title        = {Towards {A} Validation Framework for Forensic Computing Tools in Australia},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {409--414},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Fri, 16 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/WilsdonS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/SlayJ05,
  author       = {Jill Slay and
                  Kris Jorgensen},
  editor       = {Mark Pollitt and
                  Sujeet Shenoi},
  title        = {Applying Filter Clusters to Reduce Search State Space},
  booktitle    = {Advances in Digital Forensics, {IFIP} International Conference on
                  Digital Forensics, National Center for Forensic Science, Orlando,
                  Florida, USA, February 13-16, 2005},
  series       = {{IFIP}},
  volume       = {194},
  pages        = {295--301},
  publisher    = {Springer},
  year         = {2005},
  url          = {http://dl.ifip.org/db/conf/ifip11-9/df2005/SlayJ05.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/SlayJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/WilsdonS05,
  author       = {Tom Wilsdon and
                  Jill Slay},
  title        = {Digital Forensics: Exploring Validation, Verification and Certification},
  booktitle    = {First International Workshop on Systematic Approaches to Digital Forensic
                  Engineering {(SADFE} 2005), 7-10 November 2005, Taipei, Taiwan},
  pages        = {48--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SADFE.2005.11},
  doi          = {10.1109/SADFE.2005.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/WilsdonS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/SlayQ04,
  author       = {Jill Slay and
                  Gerald Quirchmayr},
  title        = {A Formal Model for the Relationship between Culture and Trust within
                  is Security Management},
  booktitle    = {Proceedings of the 2nd Australian Information Security Management
                  Conference, Securing the Future, Perth, Western Australia, November
                  26th, 2004},
  pages        = {159--166},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Mon, 06 Mar 2006 09:42:27 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/SlayQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11/Slay04,
  author       = {Jill Slay},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Doctor of Philosophy: {IT} Security},
  booktitle    = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  pages        = {147--152},
  publisher    = {Kluwer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8145-6\_11},
  doi          = {10.1007/1-4020-8145-6\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11/Slay04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/QuirchmayrSKD03,
  author       = {Gerald Quirchmayr and
                  Jill Slay and
                  Andy Koronios and
                  Kathy Darzano},
  title        = {A Business Process Engineering Based Approach Towards Incorporating
                  Security in the Design of Global Information Systems},
  booktitle    = {The Seventh Pacific Asia Conference on Information Systems, {PACIS}
                  2003, Adelaide, Australia, July 10-13, 2003},
  pages        = {77},
  publisher    = {AISeL},
  year         = {2003},
  url          = {http://aisel.aisnet.org/pacis2003/77},
  timestamp    = {Sat, 03 Mar 2012 13:29:57 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/QuirchmayrSKD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ets/Slay02,
  author       = {Jill Slay},
  title        = {Human Activity Systems: {A} Theoretical Framework for Designing Learning
                  for Multicultural Settings},
  journal      = {J. Educ. Technol. Soc.},
  volume       = {5},
  number       = {1},
  year         = {2002},
  url          = {http://ifets.ieee.org/periodical/vol\_1\_2002/slay.html},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ets/Slay02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip3/QuirchmayrS02,
  author       = {Gerald Quirchmayr and
                  Jill Slay},
  editor       = {Don Passey and
                  Mike Kendall},
  title        = {Adaptive context-aware learning environments: Live spaces as a basis
                  for life-long learning in computer science},
  booktitle    = {TelE-Learning: the Challenge for the Third Millennium, {IFIP} 17\({}^{\mbox{th}}\)
                  World Computer Congress - {TC3} Stream on TelE-Learning, August 25-30,
                  2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {230},
  pages        = {177--184},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 20 Sep 2002 14:22:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip3/QuirchmayrS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8/SlayQ02,
  author       = {Jill Slay and
                  Gerald Quirchmayr},
  editor       = {Roland Traunm{\"{u}}ller},
  title        = {The Role Of Culture In the Development of Global E-Commerce Systems},
  booktitle    = {Information Systems: The e-Business Challenge, {IFIP} 17\({}^{\mbox{th}}\)
                  World Computer Congress - {TC8} Stream on Information Systems: The
                  e-Business Challenge, August 25-30, 2002, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {222},
  pages        = {103--115},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 06 Sep 2002 09:48:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip8/SlayQ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/QuirchmayrS01,
  author       = {Gerald Quirchmayr and
                  Jill Slay},
  editor       = {A Min Tjoa and
                  Roland R. Wagner},
  title        = {Identifying Emerging Web-Communication Patterns Between Government
                  and Citizens},
  booktitle    = {12th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2001), 3-7 September 2001, Munich, Germany},
  pages        = {419--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/DEXA.2001.953097},
  doi          = {10.1109/DEXA.2001.953097},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/QuirchmayrS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip3/Slay98,
  author       = {Jill Slay},
  editor       = {Gordon B. Davis},
  title        = {Using the World Wide Web to Create an Effective Cross-Cultural Learning
                  Environment},
  booktitle    = {Teleteaching '98 - Distance Learning, Training and Education, {IFIP}
                  World Computer Congress 1998},
  series       = {books@ocg.at},
  volume       = {120},
  pages        = {921--930},
  publisher    = {Austrian Computer Society},
  year         = {1998},
  timestamp    = {Sat, 07 Sep 2019 11:59:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip3/Slay98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics