default search action
BibTeX records: Craig Valli
@article{DBLP:journals/virology/SikosVGHWCK23, author = {Leslie F. Sikos and Craig Valli and Alexander E. Grojek and David J. Holmes and Samuel G. Wakeling and Warren Z. Cabral and Nickson M. Karie}, title = {CamDec: Advancing Axis {P1435-LE} video camera security using honeypot-based deception}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {19}, number = {4}, pages = {565--577}, year = {2023}, url = {https://doi.org/10.1007/s11416-023-00463-4}, doi = {10.1007/S11416-023-00463-4}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/SikosVGHWCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/CabralSV22, author = {Warren Z. Cabral and Leslie F. Sikos and Craig Valli}, title = {Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888911}, doi = {10.1109/DSC54232.2022.9888911}, timestamp = {Wed, 05 Oct 2022 15:16:45 +0200}, biburl = {https://dblp.org/rec/conf/desec/CabralSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AbrarHCSOAV21, author = {Hina Abrar and Syed Jawad Hussain and Junaid Chaudhry and Kashif Saleem and Mehmet A. Orgun and Jalal Al{-}Muhtadi and Craig Valli}, title = {Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry"}, journal = {{IEEE} Access}, volume = {9}, pages = {79628}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3084075}, doi = {10.1109/ACCESS.2021.3084075}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AbrarHCSOAV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KarieSYVK21, author = {Nickson M. Karie and Nor Masri Sahri and Wencheng Yang and Craig Valli and Victor R. Kebande}, title = {A Review of Security Standards and Frameworks for IoT-Based Smart Environments}, journal = {{IEEE} Access}, volume = {9}, pages = {121975--121995}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3109886}, doi = {10.1109/ACCESS.2021.3109886}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KarieSYVK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YangWSKAV21, author = {Wencheng Yang and Song Wang and Nor Masri Sahri and Nickson M. Karie and Mohiuddin Ahmed and Craig Valli}, title = {Biometrics for Internet-of-Things Security: {A} Review}, journal = {Sensors}, volume = {21}, number = {18}, pages = {6163}, year = {2021}, url = {https://doi.org/10.3390/s21186163}, doi = {10.3390/S21186163}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/YangWSKAV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CabralVSW21, author = {Warren Z. Cabral and Craig Valli and Leslie F. Sikos and Samuel G. Wakeling}, editor = {Audun J{\o}sang and Lynn Futcher and Janne Merete Hagen}, title = {Advanced Cowrie Configuration to Increase Honeypot Deceptiveness}, booktitle = {{ICT} Systems Security and Privacy Protection - 36th {IFIP} {TC} 11 International Conference, {SEC} 2021, Oslo, Norway, June 22-24, 2021, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {625}, pages = {317--331}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78120-0\_21}, doi = {10.1007/978-3-030-78120-0\_21}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/CabralVSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-13759, author = {Nickson M. Karie and Craig Valli}, title = {Digital Forensic Readiness Implementation in {SDN:} Issues and Challenges}, journal = {CoRR}, volume = {abs/2107.13759}, year = {2021}, url = {https://arxiv.org/abs/2107.13759}, eprinttype = {arXiv}, eprint = {2107.13759}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-13759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiat/SyedBIV20, author = {Naeem Firdous Syed and Zubair A. Baig and Ahmed Ibrahim and Craig Valli}, title = {Denial of service attack detection through machine learning for the IoT}, journal = {J. Inf. Telecommun.}, volume = {4}, number = {4}, pages = {482--503}, year = {2020}, url = {https://doi.org/10.1080/24751839.2020.1767484}, doi = {10.1080/24751839.2020.1767484}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jiat/SyedBIV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengYVSAZFCQ19, author = {Guanglou Zheng and Wencheng Yang and Craig Valli and Rajan Shankaran and Haider Abbas and Guanghe Zhang and Gengfa Fang and Junaid Chaudhry and Li Qiao}, title = {Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations}, journal = {{IEEE} Access}, volume = {7}, pages = {75629--75641}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2920850}, doi = {10.1109/ACCESS.2019.2920850}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhengYVSAZFCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/YangWZYV19, author = {Wencheng Yang and Song Wang and Guanglou Zheng and Jucheng Yang and Craig Valli}, title = {A Privacy-Preserving Lightweight Biometric System for Internet of Things Security}, journal = {{IEEE} Commun. Mag.}, volume = {57}, number = {3}, pages = {84--89}, year = {2019}, url = {https://doi.org/10.1109/MCOM.2019.1800378}, doi = {10.1109/MCOM.2019.1800378}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/YangWZYV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/YangWZV19, author = {Wencheng Yang and Song Wang and Guanglou Zheng and Craig Valli}, title = {Impact of feature proportion on matching performance of multi-biometric systems}, journal = {{ICT} Express}, volume = {5}, number = {1}, pages = {37--40}, year = {2019}, url = {https://doi.org/10.1016/j.icte.2018.03.001}, doi = {10.1016/J.ICTE.2018.03.001}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ict-express/YangWZV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YangWHIZMJV19, author = {Wencheng Yang and Song Wang and Jiankun Hu and Ahmed Ibrahim and Guanglou Zheng and Marcelo Jose Macedo and Michael N. Johnstone and Craig Valli}, title = {A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things}, journal = {Sensors}, volume = {19}, number = {13}, pages = {2985}, year = {2019}, url = {https://doi.org/10.3390/s19132985}, doi = {10.3390/S19132985}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/YangWHIZMJV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/YangWHZV19, author = {Wencheng Yang and Song Wang and Jiankun Hu and Guanglou Zheng and Craig Valli}, title = {Security and Accuracy of Fingerprint-Based Biometrics: {A} Review}, journal = {Symmetry}, volume = {11}, number = {2}, pages = {141}, year = {2019}, url = {https://doi.org/10.3390/sym11020141}, doi = {10.3390/SYM11020141}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/YangWHZV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/YangWHZYV19, author = {Wencheng Yang and Song Wang and Jiankun Hu and Guanglou Zheng and Jucheng Yang and Craig Valli}, title = {Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {7}, pages = {4244--4253}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2900665}, doi = {10.1109/TII.2019.2900665}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/YangWHZYV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/ZhengYVQSOM19, author = {Guanglou Zheng and Wencheng Yang and Craig Valli and Li Qiao and Rajan Shankaran and Mehmet A. Orgun and Subhas Chandra Mukhopadhyay}, title = {Finger-to-Heart {(F2H):} Authentication for Wireless Implantable Medical Devices}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {23}, number = {4}, pages = {1546--1557}, year = {2019}, url = {https://doi.org/10.1109/JBHI.2018.2864796}, doi = {10.1109/JBHI.2018.2864796}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/ZhengYVQSOM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/IbrahimVMC19, author = {Ahmed Ibrahim and Craig Valli and Ian McAteer and Junaid Chaudhry}, title = {Correction to: {A} security review of local government using {NIST} {CSF:} a case study}, journal = {J. Supercomput.}, volume = {75}, number = {9}, pages = {6158}, year = {2019}, url = {https://doi.org/10.1007/s11227-019-02972-w}, doi = {10.1007/S11227-019-02972-W}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/IbrahimVMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AbrarHCSOAV18, author = {Hina Abrar and Syed Jawad Hussain and Junaid Ahsenali Chaudhry and Kashif Saleem and Mehmet A. Orgun and Jalal Al{-}Muhtadi and Craig Valli}, title = {Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry}, journal = {{IEEE} Access}, volume = {6}, pages = {19140--19150}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2805919}, doi = {10.1109/ACCESS.2018.2805919}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AbrarHCSOAV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangWHZCAV18, author = {Wencheng Yang and Song Wang and Jiankun Hu and Guanglou Zheng and Junaid Ahsenali Chaudhry and Erwin Adi and Craig Valli}, title = {Securing Mobile Healthcare Data: {A} Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem}, journal = {{IEEE} Access}, volume = {6}, pages = {36939--36947}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2844182}, doi = {10.1109/ACCESS.2018.2844182}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangWHZCAV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/YangWHZV18, author = {Wencheng Yang and Song Wang and Jiankun Hu and Guanglou Zheng and Craig Valli}, title = {A fingerprint and finger-vein based cancelable multi-biometric system}, journal = {Pattern Recognit.}, volume = {78}, pages = {242--251}, year = {2018}, url = {https://doi.org/10.1016/j.patcog.2018.01.026}, doi = {10.1016/J.PATCOG.2018.01.026}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pr/YangWHZV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YangWZCV18, author = {Wencheng Yang and Song Wang and Guanglou Zheng and Junaid Ahsenali Chaudhry and Craig Valli}, title = {{ECB4CI:} an enhanced cancelable biometric system for securing critical infrastructures}, journal = {J. Supercomput.}, volume = {74}, number = {10}, pages = {4893--4909}, year = {2018}, url = {https://doi.org/10.1007/s11227-018-2266-0}, doi = {10.1007/S11227-018-2266-0}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/YangWZCV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/IbrahimVMC18, author = {Ahmed Ibrahim and Craig Valli and Ian McAteer and Junaid Ahsenali Chaudhry}, title = {A security review of local government using {NIST} {CSF:} a case study}, journal = {J. Supercomput.}, volume = {74}, number = {10}, pages = {5171--5186}, year = {2018}, url = {https://doi.org/10.1007/s11227-018-2479-2}, doi = {10.1007/S11227-018-2479-2}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/IbrahimVMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ismict/ChaudhryVCHR18, author = {Junaid Chaudhry and Craig Valli and Michael Crowley and Jon Haass and Peter Roberts}, title = {POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia}, booktitle = {12th International Symposium on Medical Information and Communication Technology, {ISMICT} 2018, Sydney, Australia, March 26-28, 2018}, pages = {1--10}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISMICT.2018.8573695}, doi = {10.1109/ISMICT.2018.8573695}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ismict/ChaudhryVCHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaigSVRHCJKISFP17, author = {Zubair A. Baig and Patryk Szewczyk and Craig Valli and Priya Rabadia and Peter Hannay and Maxim Chernyshev and Mike Johnstone and Paresh Kerai and Ahmed Ibrahim and Krishnun Sansurooah and Syed Naeem Firdous and Matthew Peacock}, title = {Future challenges for smart cities: Cyber-security and digital forensics}, journal = {Digit. Investig.}, volume = {22}, pages = {3--13}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.015}, doi = {10.1016/J.DIIN.2017.06.015}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaigSVRHCJKISFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChernyshevVJ17, author = {Maxim Chernyshev and Craig Valli and Michael N. Johnstone}, title = {Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1625--1636}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2678463}, doi = {10.1109/TIFS.2017.2678463}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChernyshevVJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17a, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {An Exploration of Some Security Issues Within the BACnet Protocol}, booktitle = {Information Systems Security and Privacy - Third International Conference, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {867}, pages = {252--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93354-2\_12}, doi = {10.1007/978-3-319-93354-2\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/PeacockJV17, author = {Matthew Peacock and Michael N. Johnstone and Craig Valli}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security Issues with BACnet Value Handling}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {546--552}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006263405460552}, doi = {10.5220/0006263405460552}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/PeacockJV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscit/ZhengZYVSO17, author = {Guanglou Zheng and Guanghe Zhang and Wencheng Yang and Craig Valli and Rajan Shankaran and Mehmet A. Orgun}, title = {From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices}, booktitle = {17th International Symposium on Communications and Information Technologies, {ISCIT} 2017, Cairns, Australia, September 25-27, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISCIT.2017.8261228}, doi = {10.1109/ISCIT.2017.8261228}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscit/ZhengZYVSO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/FirdousBVI17, author = {Syed Naeem Firdous and Zubair A. Baig and Craig Valli and Ahmed Ibrahim}, editor = {Yulei Wu and Geyong Min and Nektarios Georgalas and Ahmed Al{-}Dubi and Xiaolong Jin and Laurence T. Yang and Jianhua Ma and Po Yang}, title = {Modelling and Evaluation of Malicious Attacks against the IoT {MQTT} Protocol}, booktitle = {2017 {IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), Exeter, United Kingdom, June 21-23, 2017}, pages = {748--755}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2017.115}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/ithings/FirdousBVI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ChaudhrySISAV17, author = {Junaid Ahsenali Chaudhry and Kashif Saleem and Rafiqul Islam and Ali Selamat and Mudassar Ahmad and Craig Valli}, title = {{AZSPM:} Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments}, booktitle = {42nd {IEEE} Conference on Local Computer Networks Workshops, {LCN} Workshops 2017, Singapore, Singapore, October 9, 2017}, pages = {121--127}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/LCN.Workshops.2017.73}, doi = {10.1109/LCN.WORKSHOPS.2017.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ChaudhrySISAV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/monami/YangZIC0HV17, author = {Wencheng Yang and Guanglou Zheng and Ahmed Ibrahim and Junaid Ahsenali Chaudhry and Song Wang and Jiankun Hu and Craig Valli}, editor = {Jiankun Hu and Ibrahim Khalil and Zahir Tari and Sheng Wen}, title = {Application of 3D Delaunay Triangulation in Fingerprint Authentication System}, booktitle = {Mobile Networks and Management - 9th International Conference, {MONAMI} 2017, Melbourne, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {235}, pages = {291--298}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-90775-8\_23}, doi = {10.1007/978-3-319-90775-8\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/monami/YangZIC0HV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChernyshevVH16, author = {Maxim Chernyshev and Craig Valli and Peter Hannay}, title = {On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {584--593}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2507542}, doi = {10.1109/TIFS.2015.2507542}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChernyshevVH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ChernyshevVH16, author = {Maxim Chernyshev and Craig Valli and Peter Hannay}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {5487--5496}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.678}, doi = {10.1109/HICSS.2016.678}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ChernyshevVH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/Valli12, author = {Craig Valli}, editor = {Yang Xiang and Javier L{\'{o}}pez and C.{-}C. Jay Kuo and Wanlei Zhou}, title = {{SSH} - Somewhat Secure Host}, booktitle = {Cyberspace Safety and Security - 4th International Symposium, {CSS} 2012, Melbourne, Australia, December 12-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7672}, pages = {227--235}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35362-8\_18}, doi = {10.1007/978-3-642-35362-8\_18}, timestamp = {Fri, 22 Apr 2022 17:07:03 +0200}, biburl = {https://dblp.org/rec/conf/css/Valli12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-6025, author = {Craig Valli and Andrew Woodward}, title = {The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues}, journal = {CoRR}, volume = {abs/1207.6025}, year = {2012}, url = {http://arxiv.org/abs/1207.6025}, eprinttype = {arXiv}, eprint = {1207.6025}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-6025.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Valli10, author = {Craig Valli}, title = {Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1074}, doi = {10.15394/JDFSL.2010.1074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Valli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BrandVW10, author = {Murray Brand and Craig Valli and Andrew Woodward}, title = {Malware Forensics: Discovery of the Intent of Deception}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {4}, pages = {31--42}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1082}, doi = {10.15394/JDFSL.2010.1082}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BrandVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVDSDD10, author = {Andy Jones and Craig Valli and Glenn S. Dardick and Iain Sutherland and G. Dabibi and Gareth Davies}, title = {The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {4}, pages = {43--64}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1083}, doi = {10.15394/JDFSL.2010.1083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVDSDD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ValliL10, author = {Craig Valli and Mohammed Al Lawati}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Developing VoIP Router Honeypots}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {615--619}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ValliL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ValliH10, author = {Craig Valli and Peter Hannay}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Geotagging Where Cyberspace Comes to Your Place}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {627--632}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ValliH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SzewczykV10, author = {Patryk Szewczyk and Craig Valli}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Ignorant Experts: Computer and Network Security Support from Internet Service Providers}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {323--327}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.42}, doi = {10.1109/NSS.2010.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SzewczykV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csreaSAM/2010, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, publisher = {{CSREA} Press}, year = {2010}, isbn = {1-60132-163-5}, timestamp = {Fri, 10 Dec 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Valli09, author = {Craig Valli}, title = {Visualisation of Honeypot Data Using Graphviz and Afterglow}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {27--38}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1056}, doi = {10.15394/JDFSL.2009.1056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Valli09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ValliS09, author = {Craig Valli and Patryk Szewczyk}, title = {Insecurity by Obscurity: {A} Review of SoHo Router Literature from a Network Security Perspective}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {5--16}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1160}, doi = {10.15394/JDFSL.2009.1160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ValliS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ValliW09, author = {Craig Valli and Andrew Woodward}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {{SCADA} Security - Slowly Circling a Disaster Area}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {613--617}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ValliW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Valli09, author = {Craig Valli}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Snort {IDS} for {SCADA} Networks}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {618--621}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Valli09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVDS08, author = {Andy Jones and Craig Valli and Glenn S. Dardick and Iain Sutherland}, title = {The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {1}, pages = {5--24}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1034}, doi = {10.15394/JDFSL.2008.1034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVS08, author = {Andy Jones and Craig Valli and Iain Sutherland}, title = {Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {2}, pages = {55--70}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1041}, doi = {10.15394/JDFSL.2008.1041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ValliJ08, author = {Craig Valli and Andy Jones}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {604--607}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 09 Feb 2009 12:46:27 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ValliJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Valli07, author = {Craig Valli}, title = {Honeypot technologies and their applicability as a strategic internal countermeasure}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {4}, pages = {430--436}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.015503}, doi = {10.1504/IJICS.2007.015503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Valli07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Valli07, author = {Craig Valli}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {{IT} Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {506--509}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Valli07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVST06, author = {Andy Jones and Craig Valli and Iain Sutherland and Paula Thomas}, title = {The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {23--36}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1008}, doi = {10.15394/JDFSL.2006.1008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MorfittV06, author = {Kim Morfitt and Craig Valli}, title = {A Forensic Log File Extraction Tool for {ICQ} Instant Messaging Clients}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {51--64}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1010}, doi = {10.15394/JDFSL.2006.1010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MorfittV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Valli06, author = {Craig Valli}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {The Insider Threat to Medical Records; Has the Network Age Changed Anything?}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {410--414}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 06 Dec 2006 10:51:51 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Valli06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Valli06a, author = {Craig Valli}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {{SQL} Injection - Threats to Medical Systems: The Issues and Countermeasures}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {421--425}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 06 Dec 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Valli06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/MorfittV05, author = {Kim Morfitt and Craig Valli}, editor = {Craig Valli and Andrew Woodward}, title = {After Conversation - An Forensic {ICQ} Logfile Extraction Tool}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {54--61}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 15:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/MorfittV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli05, author = {Craig Valli}, editor = {Craig Valli and Andrew Woodward}, title = {Honeypot technologies and their applicability as an internal countermeasure}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {68--73}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliJ05, author = {Craig Valli and Andy Jones}, editor = {Craig Valli and Andrew Woodward}, title = {A {UK} and Australian Study of Hard Disk Disposal}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {74--78}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliP05, author = {Craig Valli and Paul Patak}, editor = {Craig Valli and Andrew Woodward}, title = {An investigation into the efficiency of forensic erasure tools for hard disk mechanisms}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {79--83}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliWWK05, author = {Craig Valli and Andrew Woodward and Ken Wild and Reino Karvinen}, editor = {Craig Valli and Andrew Woodward}, title = {An investigation into long range detection of passive {UHF} {RFID} tags}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {84--86}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliWWK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/Valli05, author = {Craig Valli}, title = {Issues Relating to the Forensics Analysis of {PDA} and Telephony {(PDAT)} Enabled Devices}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {363--368}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Thu, 23 Jun 2016 15:53:29 +0200}, biburl = {https://dblp.org/rec/conf/eciw/Valli05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aism/2005, editor = {Craig Valli and Andrew Woodward}, title = {Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, isbn = {0-7298-0611-1}, timestamp = {Mon, 06 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ausforensics/2005, editor = {Craig Valli and Andrew Woodward}, title = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, isbn = {0-7298-0612-X}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/Valli04, author = {Craig Valli}, title = {Non-business use of the {WWW} in three Western Australian organisations}, journal = {Internet Res.}, volume = {14}, number = {5}, pages = {353--359}, year = {2004}, url = {https://doi.org/10.1108/10662240410566944}, doi = {10.1108/10662240410566944}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/Valli04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli04, author = {Craig Valli}, title = {Wireless Snort - {A} {WIDS} in progress}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {112--116}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Fri, 20 Jul 2007 15:22:58 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli04a, author = {Craig Valli}, title = {Throwing out the Enterprise with the Hard Disk}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {124--129}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ValliW04, author = {Craig Valli and Peter Wolski}, editor = {Hamid R. Arabnia and Selim Aissi and Youngsong Mun}, title = {802.11b Wireless Networks Insecure at Any Speed}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}}, pages = {154--158}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ValliW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli03, author = {Craig Valli}, editor = {Craig Valli and Matt Warren}, title = {Honeyd - {A} {OS} Fingerprinting Artifice}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 16:11:52 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ausforensics/2003, editor = {Craig Valli and Matt Warren}, title = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, isbn = {0-7298-0542-5}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.