Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jill Slay
@article{DBLP:journals/iotj/SalimMHOS24, author = {Sara Salim and Nour Moustafa and Mohamed Hassanian and David Ormod and Jill Slay}, title = {Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {3}, pages = {3853--3867}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3301626}, doi = {10.1109/JIOT.2023.3301626}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/SalimMHOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/AlHawawrehMS24, author = {Muna Al{-}Hawawreh and Nour Moustafa and Jill Slay}, title = {A threat intelligence framework for protecting smart satellite-based healthcare networks}, journal = {Neural Comput. Appl.}, volume = {36}, number = {1}, pages = {15--35}, year = {2024}, url = {https://doi.org/10.1007/s00521-021-06441-5}, doi = {10.1007/S00521-021-06441-5}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/AlHawawrehMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KoroniotisMS22, author = {Nickolaos Koroniotis and Nour Moustafa and Jill Slay}, title = {A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks}, journal = {Comput. Electr. Eng.}, volume = {99}, pages = {107745}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.107745}, doi = {10.1016/J.COMPELECENG.2022.107745}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/KoroniotisMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taes/NgoPXMS22, author = {Quynh Tu Ngo and Khoa Tran Phan and Wei Xiang and Abdun Mahmood and Jill Slay}, title = {Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Networks}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {58}, number = {3}, pages = {1753--1765}, year = {2022}, url = {https://doi.org/10.1109/TAES.2021.3121657}, doi = {10.1109/TAES.2021.3121657}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taes/NgoPXMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PlotnekS21, author = {Jordan J. Plotnek and Jill Slay}, title = {Cyber terrorism: {A} homogenized taxonomy and definition}, journal = {Comput. Secur.}, volume = {102}, pages = {102145}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102145}, doi = {10.1016/J.COSE.2020.102145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PlotnekS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PlotnekS21, author = {Jordan J. Plotnek and Jill Slay}, title = {Power systems resilience: Definition and taxonomy with a view towards metrics}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100411}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100411}, doi = {10.1016/J.IJCIP.2021.100411}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/PlotnekS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/NgoPXMS21, author = {Quynh Tu Ngo and Khoa Tran Phan and Wei Xiang and Abdun Mahmood and Jill Slay}, title = {On Edge Caching in Satellite - IoT Networks}, journal = {{IEEE} Internet Things Mag.}, volume = {4}, number = {4}, pages = {107--112}, year = {2021}, url = {https://doi.org/10.1109/IOTM.001.2100062}, doi = {10.1109/IOTM.001.2100062}, timestamp = {Tue, 05 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotm/NgoPXMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/MoustafaMS21, author = {Nour Moustafa and Gaurav Misra and Jill Slay}, title = {Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {6}, number = {2}, pages = {245--256}, year = {2021}, url = {https://doi.org/10.1109/TSUSC.2018.2808430}, doi = {10.1109/TSUSC.2018.2808430}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/MoustafaMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/NgoPXMS21, author = {Quynh Tu Ngo and Khoa Tran Phan and Wei Xiang and Abdun Naser Mahmood and Jill Slay}, editor = {David Mohaisen and Ruoming Jin}, title = {Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial Networks}, booktitle = {Computational Data and Social Networks - 10th International Conference, CSoNet 2021, Virtual Event, November 15-17, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13116}, pages = {291--302}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91434-9\_26}, doi = {10.1007/978-3-030-91434-9\_26}, timestamp = {Tue, 05 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csonet/NgoPXMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MoustafaHS19, author = {Nour Moustafa and Jiankun Hu and Jill Slay}, title = {A holistic review of Network Anomaly Detection Systems: {A} comprehensive survey}, journal = {J. Netw. Comput. Appl.}, volume = {128}, pages = {33--55}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.12.006}, doi = {10.1016/J.JNCA.2018.12.006}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MoustafaHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/MoustafaSC19, author = {Nour Moustafa and Jill Slay and Gideon Creech}, title = {Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks}, journal = {{IEEE} Trans. Big Data}, volume = {5}, number = {4}, pages = {481--494}, year = {2019}, url = {https://doi.org/10.1109/TBDATA.2017.2715166}, doi = {10.1109/TBDATA.2017.2715166}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbd/MoustafaSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/MoustafaS18, author = {Nour Moustafa and Jill Slay}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {A Network Forensic Scheme Using Correntropy-Variation for Attack Detection}, booktitle = {Advances in Digital Forensics {XIV} - 14th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {532}, pages = {225--239}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99277-8\_13}, doi = {10.1007/978-3-319-99277-8\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/MoustafaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HaiderHSTX17, author = {Waqas Haider and Jiankun Hu and Jill Slay and Benjamin P. Turnbull and Yi Xie}, title = {Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling}, journal = {J. Netw. Comput. Appl.}, volume = {87}, pages = {185--192}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.03.018}, doi = {10.1016/J.JNCA.2017.03.018}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HaiderHSTX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/WijayarathnaAS17, author = {Chamila Wijayarathna and Nalin Asanka Gamagedara Arachchilage and Jill Slay}, editor = {Theo Tryfonas}, title = {A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs}, booktitle = {Human Aspects of Information Security, Privacy and Trust - 5th International Conference, {HAS} 2017, Held as Part of {HCI} International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10292}, pages = {160--173}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58460-7\_11}, doi = {10.1007/978-3-319-58460-7\_11}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hci/WijayarathnaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/SenarathAS17, author = {Awanthika Senarath and Nalin Asanka Gamagedara Arachchilage and Jill Slay}, editor = {Theo Tryfonas}, title = {Designing Privacy for You: {A} Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy}, booktitle = {Human Aspects of Information Security, Privacy and Trust - 5th International Conference, {HAS} 2017, Held as Part of {HCI} International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10292}, pages = {739--752}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58460-7\_50}, doi = {10.1007/978-3-319-58460-7\_50}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/SenarathAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/monami/KoroniotisMSS17, author = {Nickolaos Koroniotis and Nour Moustafa and Elena Sitnikova and Jill Slay}, editor = {Jiankun Hu and Ibrahim Khalil and Zahir Tari and Sheng Wen}, title = {Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques}, booktitle = {Mobile Networks and Management - 9th International Conference, {MONAMI} 2017, Melbourne, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {235}, pages = {30--44}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-90775-8\_3}, doi = {10.1007/978-3-319-90775-8\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/monami/KoroniotisMSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppig/WijayarathnaAS17, author = {Chamila Wijayarathna and Nalin A. G. Arachchilage and Jill Slay}, editor = {Luke Church and Felienne Hermans}, title = {Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs}, booktitle = {Proceedings of the 28th Annual Workshop of the Psychology of Programming Interest Group, {PPIG} 2017, Delft, The Netherlands, July 1-3, 2017}, pages = {5}, publisher = {Psychology of Programming Interest Group}, year = {2017}, url = {http://ppig.org/library/paper/using-cognitive-dimensions-questionnaire-evaluate-usability-security-apis}, timestamp = {Mon, 16 May 2022 15:41:49 +0200}, biburl = {https://dblp.org/rec/conf/ppig/WijayarathnaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WijayarathnaAS17, author = {Chamila Wijayarathna and Nalin Asanka Gamagedara Arachchilage and Jill Slay}, title = {A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs}, journal = {CoRR}, volume = {abs/1703.09846}, year = {2017}, url = {http://arxiv.org/abs/1703.09846}, eprinttype = {arXiv}, eprint = {1703.09846}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WijayarathnaAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SenarathAS17, author = {Awanthika Senarath and Nalin Asanka Gamagedara Arachchilage and Jill Slay}, title = {Designing Privacy for You : {A} User Centric Approach For Privacy}, journal = {CoRR}, volume = {abs/1703.09847}, year = {2017}, url = {http://arxiv.org/abs/1703.09847}, eprinttype = {arXiv}, eprint = {1703.09847}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SenarathAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WijayarathnaAS17a, author = {Chamila Wijayarathna and Nalin Asanka Gamagedara Arachchilage and Jill Slay}, title = {Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs}, journal = {CoRR}, volume = {abs/1706.00138}, year = {2017}, url = {http://arxiv.org/abs/1706.00138}, eprinttype = {arXiv}, eprint = {1706.00138}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/WijayarathnaAS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MoustafaS17, author = {Nour Moustafa and Jill Slay}, title = {A hybrid feature selection for network intrusion detection systems: Central points}, journal = {CoRR}, volume = {abs/1707.05505}, year = {2017}, url = {http://arxiv.org/abs/1707.05505}, eprinttype = {arXiv}, eprint = {1707.05505}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MoustafaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-02824, author = {Nour Moustafa and Jill Slay}, title = {{RCNF:} Real-time Collaborative Network Forensic Scheme for Evidence Analysis}, journal = {CoRR}, volume = {abs/1711.02824}, year = {2017}, url = {http://arxiv.org/abs/1711.02824}, eprinttype = {arXiv}, eprint = {1711.02824}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-02824.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-02825, author = {Nickolaos Koroniotis and Nour Moustafa and Elena Sitnikova and Jill Slay}, title = {Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques}, journal = {CoRR}, volume = {abs/1711.02825}, year = {2017}, url = {http://arxiv.org/abs/1711.02825}, eprinttype = {arXiv}, eprint = {1711.02825}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-02825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/IsmailSS16, author = {Suhaila Ismail and Elena Sitnikova and Jill Slay}, title = {{SCADA} Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors}, journal = {Int. J. Cyber Warf. Terror.}, volume = {6}, number = {3}, pages = {79--95}, year = {2016}, url = {https://doi.org/10.4018/IJCWT.2016070107}, doi = {10.4018/IJCWT.2016070107}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/IsmailSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MoustafaS16, author = {Nour Moustafa and Jill Slay}, title = {The evaluation of Network Anomaly Detection Systems: Statistical analysis of the {UNSW-NB15} data set and the comparison with the {KDD99} data set}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {25}, number = {1-3}, pages = {18--31}, year = {2016}, url = {https://doi.org/10.1080/19393555.2015.1125974}, doi = {10.1080/19393555.2015.1125974}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MoustafaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ThompsonRSM16, author = {Marcus A. Thompson and Michael J. Ryan and Jill Slay and Alan C. McLucas}, title = {Harmonized taxonomies for security and resilience}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {25}, number = {1-3}, pages = {54--67}, year = {2016}, url = {https://doi.org/10.1080/19393555.2016.1145772}, doi = {10.1080/19393555.2016.1145772}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ThompsonRSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/WattS15, author = {Allan Charles Watt and Jill Slay}, title = {First responders actions to cope with volatile digital evidence}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {7}, number = {4}, pages = {381--399}, year = {2015}, url = {https://doi.org/10.1504/IJESDF.2015.072182}, doi = {10.1504/IJESDF.2015.072182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/WattS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/badgers/MoustafaS15, author = {Nour Moustafa and Jill Slay}, title = {The Significant Features of the {UNSW-NB15} and the {KDD99} Data Sets for Network Intrusion Detection Systems}, booktitle = {4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@RAID 2015, Kyoto, Japan, November 5, 2015}, pages = {25--31}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.ieeecomputersociety.org/10.1109/BADGERS.2015.014}, doi = {10.1109/BADGERS.2015.014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/badgers/MoustafaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ElsayedSS15, author = {Saber M. Elsayed and Ruhul A. Sarker and Jill Slay}, title = {Evaluating the performance of a differential evolution algorithm in anomaly detection}, booktitle = {{IEEE} Congress on Evolutionary Computation, {CEC} 2015, Sendai, Japan, May 25-28, 2015}, pages = {2490--2497}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CEC.2015.7257194}, doi = {10.1109/CEC.2015.7257194}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cec/ElsayedSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcis/MoustafaS15, author = {Nour Moustafa and Jill Slay}, title = {{UNSW-NB15:} a comprehensive data set for network intrusion detection systems {(UNSW-NB15} network data set)}, booktitle = {2015 Military Communications and Information Systems Conference, MilCIS 2015, Canberra, Australia, November 10-12, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MilCIS.2015.7348942}, doi = {10.1109/MILCIS.2015.7348942}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcis/MoustafaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/IsmailSS15, author = {Suhaila Ismail and Elena Sitnikova and Jill Slay}, editor = {Atreyi Kankanhalli and Andrew Burton{-}Jones and Thompson S. H. Teo}, title = {Studying {SCADA} Organisations Information Security Goals: An Integrated System Theory Approach}, booktitle = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015, Singapore, July 5-9, 2015}, pages = {77}, year = {2015}, url = {http://aisel.aisnet.org/pacis2015/77}, timestamp = {Sat, 12 Dec 2015 19:19:58 +0100}, biburl = {https://dblp.org/rec/conf/pacis/IsmailSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/XieHS14, author = {Miao Xie and Jiankun Hu and Jill Slay}, title = {Evaluating host-based anomaly detection systems: Application of the one-class {SVM} algorithm to {ADFA-LD}}, booktitle = {11th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2014, Xiamen, China, August 19-21, 2014}, pages = {978--982}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/FSKD.2014.6980972}, doi = {10.1109/FSKD.2014.6980972}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fskd/XieHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/IsmailSS14, author = {Suhaila Ismail and Elena Sitnikova and Jill Slay}, title = {Using integrated system theory approach to assess security for {SCADA} systems cyber security for critical infrastructures: {A} pilot study}, booktitle = {11th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2014, Xiamen, China, August 19-21, 2014}, pages = {1000--1006}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/FSKD.2014.6980976}, doi = {10.1109/FSKD.2014.6980976}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fskd/IsmailSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/IsmailSS14, author = {Suhaila Ismail and Elena Sitnikova and Jill Slay}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {Towards Developing {SCADA} Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {242--249}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_20}, doi = {10.1007/978-3-642-55415-5\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/IsmailSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ShahMS14, author = {Zubair Shah and Abdun Naser Mahmood and Jill Slay}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Forensic Potentials of Solid State Drives}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {153}, pages = {113--126}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23802-9\_11}, doi = {10.1007/978-3-319-23802-9\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ShahMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SlayS14, author = {Jill Slay and Fiona Schulz}, title = {Development of an Ontology Based Forensic Search Mechanism: Proof of Concept}, journal = {CoRR}, volume = {abs/1407.8258}, year = {2014}, url = {http://arxiv.org/abs/1407.8258}, eprinttype = {arXiv}, eprint = {1407.8258}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SlayS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AriffinDCS13, author = {Aswami Ariffin and Christian D'Orazio and Kim{-}Kwang Raymond Choo and Jill Slay}, title = {iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {375--382}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.50}, doi = {10.1109/ARES.2013.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AriffinDCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AriffinCS13, author = {Aswami Ariffin and Kim{-}Kwang Raymond Choo and Jill Slay}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Digital Camcorder Forensics}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {39--48}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Ariffin.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AriffinCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/AriffinSC13, author = {Aswami Ariffin and Jill Slay and Kim{-}Kwang Raymond Choo}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Data Recovery from Proprietary Formatted Cctv Hard Disks}, booktitle = {Advances in Digital Forensics {IX} - 9th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {410}, pages = {213--223}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41148-9\_15}, doi = {10.1007/978-3-642-41148-9\_15}, timestamp = {Sun, 25 Oct 2020 23:10:13 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/AriffinSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/IrwinDS12, author = {David Irwin and Arek Dadej and Jill Slay}, title = {Extraction Of Electronic Evidence From VoIP: Identification {\&} Analysis Of Digital Speech}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {55--82}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1128}, doi = {10.15394/JDFSL.2012.1128}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/IrwinDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/OsborneTS12, author = {Grant Osborne and Benjamin P. Turnbull and Jill Slay}, editor = {Xiaoying Bai and Fevzi Belli and Elisa Bertino and Carl K. Chang and Atilla El{\c{c}}i and Cristina Cerschi Seceleanu and Haihua Xie and Mohammad Zulkernine}, title = {Development of InfoVis Software for Digital Forensics}, booktitle = {36th Annual {IEEE} Computer Software and Applications Conference Workshops, {COMPSAC} 2012, Izmir, Turkey, July 16-20, 2012}, pages = {213--217}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/COMPSACW.2012.47}, doi = {10.1109/COMPSACW.2012.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/OsborneTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/OsborneTS12, author = {Grant Osborne and Hannah Thinyane and Jill Slay}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Visualizing Information in Digital Forensics}, booktitle = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {383}, pages = {35--47}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33962-2\_3}, doi = {10.1007/978-3-642-33962-2\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/OsborneTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeckettS11, author = {Jason Beckett and Jill Slay}, title = {Scientific underpinnings and background to standards and accreditation in digital forensics}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {114--121}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.08.001}, doi = {10.1016/J.DIIN.2011.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BeckettS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/IrwinSDS11, author = {David Irwin and Jill Slay and Arek Dadej and Malcolm Shore}, title = {Extraction of Electronic Evidence from VoIP: Forensic Analysis of {A} Virtual Hard Disk Vs {RAM}}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {1}, pages = {15--36}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1086}, doi = {10.15394/JDFSL.2011.1086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/IrwinSDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SimonS11, author = {Matthew Simon and Jill Slay}, title = {Recovery of Pidgin Chat Communication Artefacts from Physical Memory: {A} Pilot Test to Determine Feasibility}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {183--188}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.33}, doi = {10.1109/ARES.2011.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SimonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OsborneS11, author = {Grant Osborne and Jill Slay}, title = {Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {196--201}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.36}, doi = {10.1109/ARES.2011.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/OsborneS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/HuntS11, author = {Ray Hunt and Jill Slay}, editor = {Bharadwaj Veeravalli and Ian T. Foster}, title = {A new approach to developing attack taxonomies for network security - including case studies}, booktitle = {Proceedings of the 17th {IEEE} International Conference on Networks, {ICON} 2011, Singapore, December 14-16, 2011}, pages = {281--286}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICON.2011.6168489}, doi = {10.1109/ICON.2011.6168489}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icon/HuntS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/IrwinS11, author = {David Irwin and Jill Slay}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Extracting Evidence Related to VoIP Calls}, booktitle = {Advances in Digital Forensics {VII} - 7th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {361}, pages = {221--228}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24212-0\_17}, doi = {10.1007/978-3-642-24212-0\_17}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/IrwinS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GuoS10, author = {Yinghua Guo and Jill Slay}, title = {Testing Forensic Copy Function of Computer Forensics Investigation Tools}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {46--61}, year = {2010}, url = {https://doi.org/10.1080/15567280903521392}, doi = {10.1080/15567280903521392}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GuoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GuoS10, author = {Yinghua Guo and Jill Slay}, title = {Computer Forensic Function Testing: Media Preparation, Write Protection And Verification}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {5--20}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1072}, doi = {10.15394/JDFSL.2010.1072}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GuoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SimonS10, author = {Matthew Simon and Jill Slay}, title = {Recovery of Skype Application Activity Data from Physical Memory}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {283--288}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.73}, doi = {10.1109/ARES.2010.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SimonS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OsborneTS10, author = {Grant Osborne and Benjamin P. Turnbull and Jill Slay}, title = {The 'Explore, Investigate and Correlate' {(EIC)} Conceptual Framework for Digital Forensics Information Visualisation}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {629--634}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.74}, doi = {10.1109/ARES.2010.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/OsborneTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GuoS10, author = {Yinghua Guo and Jill Slay}, title = {A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {665--670}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.16}, doi = {10.1109/ARES.2010.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GuoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/GuoS10, author = {Yinghua Guo and Jill Slay}, editor = {Kam{-}Pui Chow and Sujeet Shenoi}, title = {Data Recovery Function Testing for Digital Forensic Tools}, booktitle = {Advances in Digital Forensics {VI} - Sixth {IFIP} {WG} 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {337}, pages = {297--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15506-2\_21}, doi = {10.1007/978-3-642-15506-2\_21}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/GuoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HuntS10, author = {Ray Hunt and Jill Slay}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {328--333}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.38}, doi = {10.1109/NSS.2010.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/HuntS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HuntS10, author = {Ray Hunt and Jill Slay}, title = {Achieving critical infrastructure protection through the interaction of computer security and network forensics}, booktitle = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010, August 17-19, 2010, Ottawa, Ontario, Canada}, pages = {23--30}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/PST.2010.5593243}, doi = {10.1109/PST.2010.5593243}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/HuntS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuoSB09, author = {Yinghua Guo and Jill Slay and Jason Beckett}, title = {Validation and verification of computer forensic software tools - Searching Function}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S12--S22}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.015}, doi = {10.1016/J.DIIN.2009.06.015}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GuoSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SlayS09, author = {Jill Slay and Matthew Simon}, title = {Voice Over {IP:} Privacy and Forensic Implications}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {1}, pages = {89--101}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009010106}, doi = {10.4018/JDCF.2009010106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SlayS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MubarakS09, author = {Sameera Mubarak and Jill Slay}, title = {Protecting clients from insider attacks on trust accounts}, journal = {Inf. Secur. Tech. Rep.}, volume = {14}, number = {4}, pages = {202--212}, year = {2009}, url = {https://doi.org/10.1016/j.istr.2010.04.006}, doi = {10.1016/J.ISTR.2010.04.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MubarakS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SimonS09, author = {Matthew Simon and Jill Slay}, title = {Enhancement of Forensic Computing Investigations through Memory Forensic Techniques}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {995--1000}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.119}, doi = {10.1109/ARES.2009.119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SimonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SlayS09, author = {Jill Slay and Elena Sitnikova}, editor = {Matthew Sorell}, title = {The Development of a Generic Framework for the Forensic Analysis of {SCADA} and Process Control Systems}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {77--82}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_9}, doi = {10.1007/978-3-642-02312-5\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SlayS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/SlayLTBL09, author = {Jill Slay and Yi{-}Chi Lin and Benjamin P. Turnbull and Jason Beckett and Paul Lin}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Towards a Formalization of Digital Forensics}, booktitle = {Advances in Digital Forensics {V} - Fifth {IFIP} {WG} 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {306}, pages = {37--47}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04155-6\_3}, doi = {10.1007/978-3-642-04155-6\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/SlayLTBL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PavlicST08, author = {Timothy Pavlic and Jill Slay and Benjamin P. Turnbull}, title = {Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {1}, pages = {35--56}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1036}, doi = {10.15394/JDFSL.2008.1036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/PavlicST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TurnbullS08, author = {Benjamin P. Turnbull and Jill Slay}, title = {Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1355--1360}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.135}, doi = {10.1109/ARES.2008.135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TurnbullS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BroadwayTS08, author = {Joshua Broadway and Benjamin P. Turnbull and Jill Slay}, title = {Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1361--1368}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.122}, doi = {10.1109/ARES.2008.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BroadwayTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SlayS08, author = {Jill Slay and Matthew Simon}, editor = {Matthew Sorell and Lang White}, title = {Voice over {IP} forensics}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {10}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2852}, doi = {10.4108/E-FORENSICS.2008.2852}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SlayS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/PavlicST08, author = {Timothy Pavlic and Jill Slay and Benjamin P. Turnbull}, editor = {Indrajit Ray and Sujeet Shenoi}, title = {Extracting Evidence Using Google Desktop Search}, booktitle = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008}, series = {{IFIP}}, volume = {285}, pages = {43--50}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-84927-0\_4}, doi = {10.1007/978-0-387-84927-0\_4}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/PavlicST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LinSL08, author = {Yi{-}Chi Lin and Jill Slay and I{-}Long Lin}, editor = {Christopher C. Yang and Hsinchun Chen and Michael Chau and Kuiyu Chang and Sheau{-}Dong Lang and Patrick S. Chen and Raymond Hsieh and Daniel Zeng and Fei{-}Yue Wang and Kathleen M. Carley and Wenji Mao and Justin Zhan}, title = {Computer Forensics and Culture}, booktitle = {Intelligence and Security Informatics, {IEEE} {ISI} 2008 International Workshops: PAISI, PACCF, and {SOCO} 2008, Taipei, Taiwan, June 17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5075}, pages = {288--297}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69304-8\_29}, doi = {10.1007/978-3-540-69304-8\_29}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/isi/LinSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BudimirS07, author = {Nikica Budimir and Jill Slay}, title = {Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {1}, pages = {75--92}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1018}, doi = {10.15394/JDFSL.2007.1018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BudimirS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/BeckettS07, author = {Jason Beckett and Jill Slay}, title = {Digital Forensics: Validation and Verification in a Dynamic Work Environment}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {266}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.175}, doi = {10.1109/HICSS.2007.175}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/BeckettS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SlayP07, author = {Jill Slay and Andrew Przibilla}, title = {iPod Forensics: Forensically Sound Examination of an Apple iPod}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {267}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.300}, doi = {10.1109/HICSS.2007.300}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SlayP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/TurnbullS07, author = {Benjamin P. Turnbull and Jill Slay}, title = {Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {267}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.617}, doi = {10.1109/HICSS.2007.617}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/TurnbullS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/SlayM07, author = {Jill Slay and Michael Miller}, editor = {Eric Goetz and Sujeet Shenoi}, title = {Lessons Learned from the Maroochy Water Breach}, booktitle = {Critical Infrastructure Protection, Post-Proceedings of the First Annual {IFIP} Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007}, series = {{IFIP}}, volume = {253}, pages = {73--82}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-75462-8\_6}, doi = {10.1007/978-0-387-75462-8\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-10/SlayM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/SimonS07, author = {Matthew Simon and Jill Slay}, editor = {Lynn Futcher and Ronald Dodge}, title = {Forensic Computing Training, Certification and Accreditation: An Australian Overview}, booktitle = {Fifth World Conference on Information Security Education, Proceedings of the {IFIP} {TC11} {WG} 11.8, {WISE} 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, {USA}}, series = {{IFIP}}, volume = {237}, pages = {105--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73269-5\_14}, doi = {10.1007/978-0-387-73269-5\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/SimonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SlayT06, author = {Jill Slay and Benjamin P. Turnbull}, title = {Computer Security Education and Research in Australia}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {5}, pages = {60--63}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.115}, doi = {10.1109/MSP.2006.115}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SlayT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/TurnbullBS06, author = {Benjamin P. Turnbull and Barry Blundell and Jill Slay}, title = {Google Desktop as a Source of Digital Evidence}, journal = {Int. J. Digit. EVid.}, volume = {5}, number = {1}, year = {2006}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/EFE47BD9-A897-6585-5EAB032ADF89EDCF.pdf}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/TurnbullBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SlayS06, author = {Jill Slay and Fiona Schulz}, title = {Development of an Ontology Based Forensic Search Mechanism: Proof of Concept}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {1}, pages = {25--44}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1002}, doi = {10.15394/JDFSL.2006.1002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SlayS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdim/MubarakS06, author = {Sameera Mubarak and Jill Slay}, title = {An explorative study on information security of trust accounts within law firms in South Australia: Implications for {IT} security management}, booktitle = {First {IEEE} International Conference on Digital Information Management (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings}, pages = {55--62}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICDIM.2007.369330}, doi = {10.1109/ICDIM.2007.369330}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdim/MubarakS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PudneyS05, author = {Phillip Pudney and Jill Slay}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {29--39}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_3}, doi = {10.1007/11506157\_3}, timestamp = {Thu, 26 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PudneyS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/LinS05, author = {Yi{-}Chi Lin and Jill Slay}, editor = {Craig Valli and Andrew Woodward}, title = {Non-Repudiation in Pure Mobile Ad Hoc Network}, booktitle = {Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005}, pages = {59--66}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Mon, 06 Mar 2006 09:42:31 +0100}, biburl = {https://dblp.org/rec/conf/aism/LinS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/TurnbullBS05, author = {Benjamin P. Turnbull and Barry Blundell and Jill Slay}, editor = {Craig Valli and Andrew Woodward}, title = {Googling Forensics}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {62--67}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/TurnbullBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/BlundellDSTW05, author = {Barry Blundell and Huang Xiao Dong and Jill Slay and Benjamin P. Turnbull and Tom Wilsdon}, title = {Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {39--46}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/BlundellDSTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/WilsdonS05, author = {Tom Wilsdon and Jill Slay}, title = {Towards {A} Validation Framework for Forensic Computing Tools in Australia}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {409--414}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Fri, 16 Sep 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/WilsdonS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/SlayJ05, author = {Jill Slay and Kris Jorgensen}, editor = {Mark Pollitt and Sujeet Shenoi}, title = {Applying Filter Clusters to Reduce Search State Space}, booktitle = {Advances in Digital Forensics, {IFIP} International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, February 13-16, 2005}, series = {{IFIP}}, volume = {194}, pages = {295--301}, publisher = {Springer}, year = {2005}, url = {http://dl.ifip.org/db/conf/ifip11-9/df2005/SlayJ05.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/SlayJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/WilsdonS05, author = {Tom Wilsdon and Jill Slay}, title = {Digital Forensics: Exploring Validation, Verification and Certification}, booktitle = {First International Workshop on Systematic Approaches to Digital Forensic Engineering {(SADFE} 2005), 7-10 November 2005, Taipei, Taiwan}, pages = {48--55}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SADFE.2005.11}, doi = {10.1109/SADFE.2005.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/WilsdonS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/SlayQ04, author = {Jill Slay and Gerald Quirchmayr}, title = {A Formal Model for the Relationship between Culture and Trust within is Security Management}, booktitle = {Proceedings of the 2nd Australian Information Security Management Conference, Securing the Future, Perth, Western Australia, November 26th, 2004}, pages = {159--166}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Mon, 06 Mar 2006 09:42:27 +0100}, biburl = {https://dblp.org/rec/conf/aism/SlayQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11/Slay04, author = {Jill Slay}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Doctor of Philosophy: {IT} Security}, booktitle = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, pages = {147--152}, publisher = {Kluwer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8145-6\_11}, doi = {10.1007/1-4020-8145-6\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11/Slay04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/QuirchmayrSKD03, author = {Gerald Quirchmayr and Jill Slay and Andy Koronios and Kathy Darzano}, title = {A Business Process Engineering Based Approach Towards Incorporating Security in the Design of Global Information Systems}, booktitle = {The Seventh Pacific Asia Conference on Information Systems, {PACIS} 2003, Adelaide, Australia, July 10-13, 2003}, pages = {77}, publisher = {AISeL}, year = {2003}, url = {http://aisel.aisnet.org/pacis2003/77}, timestamp = {Sat, 03 Mar 2012 13:29:57 +0100}, biburl = {https://dblp.org/rec/conf/pacis/QuirchmayrSKD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ets/Slay02, author = {Jill Slay}, title = {Human Activity Systems: {A} Theoretical Framework for Designing Learning for Multicultural Settings}, journal = {J. Educ. Technol. Soc.}, volume = {5}, number = {1}, year = {2002}, url = {http://ifets.ieee.org/periodical/vol\_1\_2002/slay.html}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ets/Slay02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip3/QuirchmayrS02, author = {Gerald Quirchmayr and Jill Slay}, editor = {Don Passey and Mike Kendall}, title = {Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science}, booktitle = {TelE-Learning: the Challenge for the Third Millennium, {IFIP} 17\({}^{\mbox{th}}\) World Computer Congress - {TC3} Stream on TelE-Learning, August 25-30, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, series = {{IFIP} Conference Proceedings}, volume = {230}, pages = {177--184}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 20 Sep 2002 14:22:42 +0200}, biburl = {https://dblp.org/rec/conf/ifip3/QuirchmayrS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8/SlayQ02, author = {Jill Slay and Gerald Quirchmayr}, editor = {Roland Traunm{\"{u}}ller}, title = {The Role Of Culture In the Development of Global E-Commerce Systems}, booktitle = {Information Systems: The e-Business Challenge, {IFIP} 17\({}^{\mbox{th}}\) World Computer Congress - {TC8} Stream on Information Systems: The e-Business Challenge, August 25-30, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, series = {{IFIP} Conference Proceedings}, volume = {222}, pages = {103--115}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 06 Sep 2002 09:48:17 +0200}, biburl = {https://dblp.org/rec/conf/ifip8/SlayQ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/QuirchmayrS01, author = {Gerald Quirchmayr and Jill Slay}, editor = {A Min Tjoa and Roland R. Wagner}, title = {Identifying Emerging Web-Communication Patterns Between Government and Citizens}, booktitle = {12th International Workshop on Database and Expert Systems Applications {(DEXA} 2001), 3-7 September 2001, Munich, Germany}, pages = {419--422}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/DEXA.2001.953097}, doi = {10.1109/DEXA.2001.953097}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/QuirchmayrS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip3/Slay98, author = {Jill Slay}, editor = {Gordon B. Davis}, title = {Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment}, booktitle = {Teleteaching '98 - Distance Learning, Training and Education, {IFIP} World Computer Congress 1998}, series = {books@ocg.at}, volume = {120}, pages = {921--930}, publisher = {Austrian Computer Society}, year = {1998}, timestamp = {Sat, 07 Sep 2019 11:59:26 +0200}, biburl = {https://dblp.org/rec/conf/ifip3/Slay98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.