BibTeX records: Craig Valli

download as .bib file

@article{DBLP:journals/virology/SikosVGHWCK23,
  author       = {Leslie F. Sikos and
                  Craig Valli and
                  Alexander E. Grojek and
                  David J. Holmes and
                  Samuel G. Wakeling and
                  Warren Z. Cabral and
                  Nickson M. Karie},
  title        = {CamDec: Advancing Axis {P1435-LE} video camera security using honeypot-based
                  deception},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {19},
  number       = {4},
  pages        = {565--577},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11416-023-00463-4},
  doi          = {10.1007/S11416-023-00463-4},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/SikosVGHWCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/CabralSV22,
  author       = {Warren Z. Cabral and
                  Leslie F. Sikos and
                  Craig Valli},
  title        = {Shodan Indicators Used to Detect Standard Conpot Implementations and
                  Their Improvement Through Sophisticated Customization},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022,
                  Edinburgh, UK, June 22-24, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC54232.2022.9888911},
  doi          = {10.1109/DSC54232.2022.9888911},
  timestamp    = {Wed, 05 Oct 2022 15:16:45 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/CabralSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AbrarHCSOAV21,
  author       = {Hina Abrar and
                  Syed Jawad Hussain and
                  Junaid Chaudhry and
                  Kashif Saleem and
                  Mehmet A. Orgun and
                  Jalal Al{-}Muhtadi and
                  Craig Valli},
  title        = {Corrections to "Risk Analysis of Cloud Sourcing in Healthcare
                  and Public Health Industry"},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {79628},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3084075},
  doi          = {10.1109/ACCESS.2021.3084075},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AbrarHCSOAV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KarieSYVK21,
  author       = {Nickson M. Karie and
                  Nor Masri Sahri and
                  Wencheng Yang and
                  Craig Valli and
                  Victor R. Kebande},
  title        = {A Review of Security Standards and Frameworks for IoT-Based Smart
                  Environments},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {121975--121995},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3109886},
  doi          = {10.1109/ACCESS.2021.3109886},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KarieSYVK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YangWSKAV21,
  author       = {Wencheng Yang and
                  Song Wang and
                  Nor Masri Sahri and
                  Nickson M. Karie and
                  Mohiuddin Ahmed and
                  Craig Valli},
  title        = {Biometrics for Internet-of-Things Security: {A} Review},
  journal      = {Sensors},
  volume       = {21},
  number       = {18},
  pages        = {6163},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21186163},
  doi          = {10.3390/S21186163},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/YangWSKAV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CabralVSW21,
  author       = {Warren Z. Cabral and
                  Craig Valli and
                  Leslie F. Sikos and
                  Samuel G. Wakeling},
  editor       = {Audun J{\o}sang and
                  Lynn Futcher and
                  Janne Merete Hagen},
  title        = {Advanced Cowrie Configuration to Increase Honeypot Deceptiveness},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 36th {IFIP} {TC} 11
                  International Conference, {SEC} 2021, Oslo, Norway, June 22-24, 2021,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {625},
  pages        = {317--331},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78120-0\_21},
  doi          = {10.1007/978-3-030-78120-0\_21},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CabralVSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-13759,
  author       = {Nickson M. Karie and
                  Craig Valli},
  title        = {Digital Forensic Readiness Implementation in {SDN:} Issues and Challenges},
  journal      = {CoRR},
  volume       = {abs/2107.13759},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.13759},
  eprinttype    = {arXiv},
  eprint       = {2107.13759},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-13759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiat/SyedBIV20,
  author       = {Naeem Firdous Syed and
                  Zubair A. Baig and
                  Ahmed Ibrahim and
                  Craig Valli},
  title        = {Denial of service attack detection through machine learning for the
                  IoT},
  journal      = {J. Inf. Telecommun.},
  volume       = {4},
  number       = {4},
  pages        = {482--503},
  year         = {2020},
  url          = {https://doi.org/10.1080/24751839.2020.1767484},
  doi          = {10.1080/24751839.2020.1767484},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jiat/SyedBIV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengYVSAZFCQ19,
  author       = {Guanglou Zheng and
                  Wencheng Yang and
                  Craig Valli and
                  Rajan Shankaran and
                  Haider Abbas and
                  Guanghe Zhang and
                  Gengfa Fang and
                  Junaid Chaudhry and
                  Li Qiao},
  title        = {Fingerprint Access Control for Wireless Insulin Pump Systems Using
                  Cancelable Delaunay Triangulations},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {75629--75641},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2920850},
  doi          = {10.1109/ACCESS.2019.2920850},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhengYVSAZFCQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/YangWZYV19,
  author       = {Wencheng Yang and
                  Song Wang and
                  Guanglou Zheng and
                  Jucheng Yang and
                  Craig Valli},
  title        = {A Privacy-Preserving Lightweight Biometric System for Internet of
                  Things Security},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {57},
  number       = {3},
  pages        = {84--89},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCOM.2019.1800378},
  doi          = {10.1109/MCOM.2019.1800378},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/YangWZYV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/YangWZV19,
  author       = {Wencheng Yang and
                  Song Wang and
                  Guanglou Zheng and
                  Craig Valli},
  title        = {Impact of feature proportion on matching performance of multi-biometric
                  systems},
  journal      = {{ICT} Express},
  volume       = {5},
  number       = {1},
  pages        = {37--40},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.icte.2018.03.001},
  doi          = {10.1016/J.ICTE.2018.03.001},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ict-express/YangWZV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YangWHIZMJV19,
  author       = {Wencheng Yang and
                  Song Wang and
                  Jiankun Hu and
                  Ahmed Ibrahim and
                  Guanglou Zheng and
                  Marcelo Jose Macedo and
                  Michael N. Johnstone and
                  Craig Valli},
  title        = {A Cancelable Iris- and Steganography-Based User Authentication System
                  for the Internet of Things},
  journal      = {Sensors},
  volume       = {19},
  number       = {13},
  pages        = {2985},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19132985},
  doi          = {10.3390/S19132985},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/YangWHIZMJV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/YangWHZV19,
  author       = {Wencheng Yang and
                  Song Wang and
                  Jiankun Hu and
                  Guanglou Zheng and
                  Craig Valli},
  title        = {Security and Accuracy of Fingerprint-Based Biometrics: {A} Review},
  journal      = {Symmetry},
  volume       = {11},
  number       = {2},
  pages        = {141},
  year         = {2019},
  url          = {https://doi.org/10.3390/sym11020141},
  doi          = {10.3390/SYM11020141},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/YangWHZV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/YangWHZYV19,
  author       = {Wencheng Yang and
                  Song Wang and
                  Jiankun Hu and
                  Guanglou Zheng and
                  Jucheng Yang and
                  Craig Valli},
  title        = {Securing Deep Learning Based Edge Finger Vein Biometrics With Binary
                  Decision Diagram},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {15},
  number       = {7},
  pages        = {4244--4253},
  year         = {2019},
  url          = {https://doi.org/10.1109/TII.2019.2900665},
  doi          = {10.1109/TII.2019.2900665},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/YangWHZYV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/ZhengYVQSOM19,
  author       = {Guanglou Zheng and
                  Wencheng Yang and
                  Craig Valli and
                  Li Qiao and
                  Rajan Shankaran and
                  Mehmet A. Orgun and
                  Subhas Chandra Mukhopadhyay},
  title        = {Finger-to-Heart {(F2H):} Authentication for Wireless Implantable Medical
                  Devices},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {23},
  number       = {4},
  pages        = {1546--1557},
  year         = {2019},
  url          = {https://doi.org/10.1109/JBHI.2018.2864796},
  doi          = {10.1109/JBHI.2018.2864796},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/ZhengYVQSOM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/IbrahimVMC19,
  author       = {Ahmed Ibrahim and
                  Craig Valli and
                  Ian McAteer and
                  Junaid Chaudhry},
  title        = {Correction to: {A} security review of local government using {NIST}
                  {CSF:} a case study},
  journal      = {J. Supercomput.},
  volume       = {75},
  number       = {9},
  pages        = {6158},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11227-019-02972-w},
  doi          = {10.1007/S11227-019-02972-W},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/IbrahimVMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AbrarHCSOAV18,
  author       = {Hina Abrar and
                  Syed Jawad Hussain and
                  Junaid Ahsenali Chaudhry and
                  Kashif Saleem and
                  Mehmet A. Orgun and
                  Jalal Al{-}Muhtadi and
                  Craig Valli},
  title        = {Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {19140--19150},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2805919},
  doi          = {10.1109/ACCESS.2018.2805919},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AbrarHCSOAV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangWHZCAV18,
  author       = {Wencheng Yang and
                  Song Wang and
                  Jiankun Hu and
                  Guanglou Zheng and
                  Junaid Ahsenali Chaudhry and
                  Erwin Adi and
                  Craig Valli},
  title        = {Securing Mobile Healthcare Data: {A} Smart Card Based Cancelable Finger-Vein
                  Bio-Cryptosystem},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {36939--36947},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2844182},
  doi          = {10.1109/ACCESS.2018.2844182},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangWHZCAV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/YangWHZV18,
  author       = {Wencheng Yang and
                  Song Wang and
                  Jiankun Hu and
                  Guanglou Zheng and
                  Craig Valli},
  title        = {A fingerprint and finger-vein based cancelable multi-biometric system},
  journal      = {Pattern Recognit.},
  volume       = {78},
  pages        = {242--251},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.patcog.2018.01.026},
  doi          = {10.1016/J.PATCOG.2018.01.026},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pr/YangWHZV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YangWZCV18,
  author       = {Wencheng Yang and
                  Song Wang and
                  Guanglou Zheng and
                  Junaid Ahsenali Chaudhry and
                  Craig Valli},
  title        = {{ECB4CI:} an enhanced cancelable biometric system for securing critical
                  infrastructures},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {10},
  pages        = {4893--4909},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-018-2266-0},
  doi          = {10.1007/S11227-018-2266-0},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/YangWZCV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/IbrahimVMC18,
  author       = {Ahmed Ibrahim and
                  Craig Valli and
                  Ian McAteer and
                  Junaid Ahsenali Chaudhry},
  title        = {A security review of local government using {NIST} {CSF:} a case study},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {10},
  pages        = {5171--5186},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-018-2479-2},
  doi          = {10.1007/S11227-018-2479-2},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/IbrahimVMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismict/ChaudhryVCHR18,
  author       = {Junaid Chaudhry and
                  Craig Valli and
                  Michael Crowley and
                  Jon Haass and
                  Peter Roberts},
  title        = {POStCODE Middleware for Post-Market Surveillance of Medical Devices
                  for Cyber Security in Medical and Healthcare Sector in Australia},
  booktitle    = {12th International Symposium on Medical Information and Communication
                  Technology, {ISMICT} 2018, Sydney, Australia, March 26-28, 2018},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISMICT.2018.8573695},
  doi          = {10.1109/ISMICT.2018.8573695},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ismict/ChaudhryVCHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaigSVRHCJKISFP17,
  author       = {Zubair A. Baig and
                  Patryk Szewczyk and
                  Craig Valli and
                  Priya Rabadia and
                  Peter Hannay and
                  Maxim Chernyshev and
                  Mike Johnstone and
                  Paresh Kerai and
                  Ahmed Ibrahim and
                  Krishnun Sansurooah and
                  Syed Naeem Firdous and
                  Matthew Peacock},
  title        = {Future challenges for smart cities: Cyber-security and digital forensics},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {3--13},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.015},
  doi          = {10.1016/J.DIIN.2017.06.015},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaigSVRHCJKISFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChernyshevVJ17,
  author       = {Maxim Chernyshev and
                  Craig Valli and
                  Michael N. Johnstone},
  title        = {Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic
                  Bluetooth Devices Using Ubertooth One},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1625--1636},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2678463},
  doi          = {10.1109/TIFS.2017.2678463},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChernyshevVJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PeacockJV17a,
  author       = {Matthew Peacock and
                  Michael N. Johnstone and
                  Craig Valli},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {An Exploration of Some Security Issues Within the BACnet Protocol},
  booktitle    = {Information Systems Security and Privacy - Third International Conference,
                  {ICISSP} 2017, Porto, Portugal, February 19-21, 2017, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {867},
  pages        = {252--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93354-2\_12},
  doi          = {10.1007/978-3-319-93354-2\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PeacockJV17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/PeacockJV17,
  author       = {Matthew Peacock and
                  Michael N. Johnstone and
                  Craig Valli},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Security Issues with BACnet Value Handling},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {546--552},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006263405460552},
  doi          = {10.5220/0006263405460552},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/PeacockJV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/ZhengZYVSO17,
  author       = {Guanglou Zheng and
                  Guanghe Zhang and
                  Wencheng Yang and
                  Craig Valli and
                  Rajan Shankaran and
                  Mehmet A. Orgun},
  title        = {From WannaCry to WannaDie: Security trade-offs and design for implantable
                  medical devices},
  booktitle    = {17th International Symposium on Communications and Information Technologies,
                  {ISCIT} 2017, Cairns, Australia, September 25-27, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISCIT.2017.8261228},
  doi          = {10.1109/ISCIT.2017.8261228},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscit/ZhengZYVSO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/FirdousBVI17,
  author       = {Syed Naeem Firdous and
                  Zubair A. Baig and
                  Craig Valli and
                  Ahmed Ibrahim},
  editor       = {Yulei Wu and
                  Geyong Min and
                  Nektarios Georgalas and
                  Ahmed Al{-}Dubi and
                  Xiaolong Jin and
                  Laurence T. Yang and
                  Jianhua Ma and
                  Po Yang},
  title        = {Modelling and Evaluation of Malicious Attacks against the IoT {MQTT}
                  Protocol},
  booktitle    = {2017 {IEEE} International Conference on Internet of Things (iThings)
                  and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
                  Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
                  (SmartData), Exeter, United Kingdom, June 21-23, 2017},
  pages        = {748--755},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2017.115},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/FirdousBVI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ChaudhrySISAV17,
  author       = {Junaid Ahsenali Chaudhry and
                  Kashif Saleem and
                  Rafiqul Islam and
                  Ali Selamat and
                  Mudassar Ahmad and
                  Craig Valli},
  title        = {{AZSPM:} Autonomic Zero-Knowledge Security Provisioning Model for
                  Medical Control Systems in Fog Computing Environments},
  booktitle    = {42nd {IEEE} Conference on Local Computer Networks Workshops, {LCN}
                  Workshops 2017, Singapore, Singapore, October 9, 2017},
  pages        = {121--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/LCN.Workshops.2017.73},
  doi          = {10.1109/LCN.WORKSHOPS.2017.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ChaudhrySISAV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/monami/YangZIC0HV17,
  author       = {Wencheng Yang and
                  Guanglou Zheng and
                  Ahmed Ibrahim and
                  Junaid Ahsenali Chaudhry and
                  Song Wang and
                  Jiankun Hu and
                  Craig Valli},
  editor       = {Jiankun Hu and
                  Ibrahim Khalil and
                  Zahir Tari and
                  Sheng Wen},
  title        = {Application of 3D Delaunay Triangulation in Fingerprint Authentication
                  System},
  booktitle    = {Mobile Networks and Management - 9th International Conference, {MONAMI}
                  2017, Melbourne, Australia, December 13-15, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {235},
  pages        = {291--298},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-90775-8\_23},
  doi          = {10.1007/978-3-319-90775-8\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/monami/YangZIC0HV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChernyshevVH16,
  author       = {Maxim Chernyshev and
                  Craig Valli and
                  Peter Hannay},
  title        = {On 802.11 Access Point Locatability and Named Entity Recognition in
                  Service Set Identifiers},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {584--593},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2507542},
  doi          = {10.1109/TIFS.2015.2507542},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChernyshevVH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChernyshevVH16,
  author       = {Maxim Chernyshev and
                  Craig Valli and
                  Peter Hannay},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Service Set Identifier Geolocation for Forensic Purposes: Opportunities
                  and Challenges},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {5487--5496},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.678},
  doi          = {10.1109/HICSS.2016.678},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ChernyshevVH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/Valli12,
  author       = {Craig Valli},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  C.{-}C. Jay Kuo and
                  Wanlei Zhou},
  title        = {{SSH} - Somewhat Secure Host},
  booktitle    = {Cyberspace Safety and Security - 4th International Symposium, {CSS}
                  2012, Melbourne, Australia, December 12-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7672},
  pages        = {227--235},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35362-8\_18},
  doi          = {10.1007/978-3-642-35362-8\_18},
  timestamp    = {Fri, 22 Apr 2022 17:07:03 +0200},
  biburl       = {https://dblp.org/rec/conf/css/Valli12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-6025,
  author       = {Craig Valli and
                  Andrew Woodward},
  title        = {The 2008 Australian study of remnant data contained on 2nd hand hard
                  disks: the saga continues},
  journal      = {CoRR},
  volume       = {abs/1207.6025},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.6025},
  eprinttype    = {arXiv},
  eprint       = {1207.6025},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-6025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Valli10,
  author       = {Craig Valli},
  title        = {Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant
                  Activity},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1074},
  doi          = {10.15394/JDFSL.2010.1074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Valli10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BrandVW10,
  author       = {Murray Brand and
                  Craig Valli and
                  Andrew Woodward},
  title        = {Malware Forensics: Discovery of the Intent of Deception},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {4},
  pages        = {31--42},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1082},
  doi          = {10.15394/JDFSL.2010.1082},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BrandVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVDSDD10,
  author       = {Andy Jones and
                  Craig Valli and
                  Glenn S. Dardick and
                  Iain Sutherland and
                  G. Dabibi and
                  Gareth Davies},
  title        = {The 2009 Analysis of Information Remaining on Disks Offered for Sale
                  on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {4},
  pages        = {43--64},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1083},
  doi          = {10.15394/JDFSL.2010.1083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVDSDD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ValliL10,
  author       = {Craig Valli and
                  Mohammed Al Lawati},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {Developing VoIP Router Honeypots},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {615--619},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ValliL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ValliH10,
  author       = {Craig Valli and
                  Peter Hannay},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {Geotagging Where Cyberspace Comes to Your Place},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {627--632},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ValliH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SzewczykV10,
  author       = {Patryk Szewczyk and
                  Craig Valli},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Ignorant Experts: Computer and Network Security Support from Internet
                  Service Providers},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {323--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.42},
  doi          = {10.1109/NSS.2010.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/SzewczykV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csreaSAM/2010,
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  publisher    = {{CSREA} Press},
  year         = {2010},
  isbn         = {1-60132-163-5},
  timestamp    = {Fri, 10 Dec 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Valli09,
  author       = {Craig Valli},
  title        = {Visualisation of Honeypot Data Using Graphviz and Afterglow},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {27--38},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1056},
  doi          = {10.15394/JDFSL.2009.1056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Valli09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ValliS09,
  author       = {Craig Valli and
                  Patryk Szewczyk},
  title        = {Insecurity by Obscurity: {A} Review of SoHo Router Literature from
                  a Network Security Perspective},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {5--16},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1160},
  doi          = {10.15394/JDFSL.2009.1160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ValliS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ValliW09,
  author       = {Craig Valli and
                  Andrew Woodward},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {{SCADA} Security - Slowly Circling a Disaster Area},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {613--617},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ValliW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Valli09,
  author       = {Craig Valli},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Snort {IDS} for {SCADA} Networks},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {618--621},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Valli09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVDS08,
  author       = {Andy Jones and
                  Craig Valli and
                  Glenn S. Dardick and
                  Iain Sutherland},
  title        = {The 2007 Analysis of Information Remaining on Disks Offered for Sale
                  on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {1},
  pages        = {5--24},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1034},
  doi          = {10.15394/JDFSL.2008.1034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVDS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVS08,
  author       = {Andy Jones and
                  Craig Valli and
                  Iain Sutherland},
  title        = {Analysis of Information Remaining on Hand Held Devices Offered for
                  Sale on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {2},
  pages        = {55--70},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1041},
  doi          = {10.15394/JDFSL.2008.1041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ValliJ08,
  author       = {Craig Valli and
                  Andy Jones},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry
                  Devices: World-Class Security, Foiled by Humans},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {604--607},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Mon, 09 Feb 2009 12:46:27 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ValliJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Valli07,
  author       = {Craig Valli},
  title        = {Honeypot technologies and their applicability as a strategic internal
                  countermeasure},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {430--436},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.015503},
  doi          = {10.1504/IJICS.2007.015503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Valli07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Valli07,
  author       = {Craig Valli},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {{IT} Sharps: Issues Relating to Securely Disposing of Hard Disks from
                  Medical Information Systems},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {506--509},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Valli07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVST06,
  author       = {Andy Jones and
                  Craig Valli and
                  Iain Sutherland and
                  Paula Thomas},
  title        = {The 2006 Analysis of Information Remaining on Disks Offered for Sale
                  on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {23--36},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1008},
  doi          = {10.15394/JDFSL.2006.1008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MorfittV06,
  author       = {Kim Morfitt and
                  Craig Valli},
  title        = {A Forensic Log File Extraction Tool for {ICQ} Instant Messaging Clients},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {51--64},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1010},
  doi          = {10.15394/JDFSL.2006.1010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MorfittV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Valli06,
  author       = {Craig Valli},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {The Insider Threat to Medical Records; Has the Network Age Changed
                  Anything?},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {410--414},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 06 Dec 2006 10:51:51 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Valli06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Valli06a,
  author       = {Craig Valli},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {{SQL} Injection - Threats to Medical Systems: The Issues and Countermeasures},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {421--425},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 06 Dec 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Valli06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/MorfittV05,
  author       = {Kim Morfitt and
                  Craig Valli},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {After Conversation - An Forensic {ICQ} Logfile Extraction Tool},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {54--61},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 15:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/MorfittV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli05,
  author       = {Craig Valli},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Honeypot technologies and their applicability as an internal countermeasure},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {68--73},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/ValliJ05,
  author       = {Craig Valli and
                  Andy Jones},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {A {UK} and Australian Study of Hard Disk Disposal},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {74--78},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/ValliJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/ValliP05,
  author       = {Craig Valli and
                  Paul Patak},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {An investigation into the efficiency of forensic erasure tools for
                  hard disk mechanisms},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {79--83},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/ValliP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/ValliWWK05,
  author       = {Craig Valli and
                  Andrew Woodward and
                  Ken Wild and
                  Reino Karvinen},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {An investigation into long range detection of passive {UHF} {RFID}
                  tags},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {84--86},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/ValliWWK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eciw/Valli05,
  author       = {Craig Valli},
  title        = {Issues Relating to the Forensics Analysis of {PDA} and Telephony {(PDAT)}
                  Enabled Devices},
  booktitle    = {4th European Conference on Information Warfare and Security, University
                  of Glamorgan, UK, 11-12 July 2005},
  pages        = {363--368},
  publisher    = {Academic Conferences Limited, Reading, {UK}},
  year         = {2005},
  timestamp    = {Thu, 23 Jun 2016 15:53:29 +0200},
  biburl       = {https://dblp.org/rec/conf/eciw/Valli05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aism/2005,
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Proceedings of the 3rd Australian Information Security Management
                  Conference, Perth, Western Australia, 30th September 2005},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  isbn         = {0-7298-0611-1},
  timestamp    = {Mon, 06 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ausforensics/2005,
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  isbn         = {0-7298-0612-X},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/Valli04,
  author       = {Craig Valli},
  title        = {Non-business use of the {WWW} in three Western Australian organisations},
  journal      = {Internet Res.},
  volume       = {14},
  number       = {5},
  pages        = {353--359},
  year         = {2004},
  url          = {https://doi.org/10.1108/10662240410566944},
  doi          = {10.1108/10662240410566944},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/Valli04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli04,
  author       = {Craig Valli},
  title        = {Wireless Snort - {A} {WIDS} in progress},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {112--116},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Fri, 20 Jul 2007 15:22:58 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli04a,
  author       = {Craig Valli},
  title        = {Throwing out the Enterprise with the Hard Disk},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {124--129},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ValliW04,
  author       = {Craig Valli and
                  Peter Wolski},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi and
                  Youngsong Mun},
  title        = {802.11b Wireless Networks Insecure at Any Speed},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}},
  pages        = {154--158},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ValliW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli03,
  author       = {Craig Valli},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Honeyd - {A} {OS} Fingerprinting Artifice},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 16:11:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ausforensics/2003,
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  isbn         = {0-7298-0542-5},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}