Craig Valli
Craig Valli
Dirección de correo verificada de
Citado por
Citado por
Future challenges for smart cities: Cyber-security and digital forensics
ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ...
Digital Investigation 22, 3-13, 2017
Security and accuracy of fingerprint-based biometrics: A review
W Yang, S Wang, J Hu, G Zheng, C Valli
Symmetry 11 (2), 141, 2019
A fingerprint and finger-vein based cancelable multi-biometric system
W Yang, S Wang, J Hu, G Zheng, C Valli
Pattern Recognition 78, 242-251, 2018
A review of security standards and frameworks for IoT-based smart environments
NM Karie, NM Sahri, W Yang, C Valli, VR Kebande
IEEE Access 9, 121975-121995, 2021
Denial of service attack detection through machine learning for the IoT
NF Syed, Z Baig, A Ibrahim, C Valli
Journal of Information and Telecommunication 4 (4), 482-503, 2020
Modelling and evaluation of malicious attacks against the iot mqtt protocol
SN Firdous, Z Baig, C Valli, A Ibrahim
2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017
The convergence of IT and OT in critical infrastructure
G Murray, MN Johnstone, C Valli
Biometrics for internet-of-things security: A review
W Yang, S Wang, NM Sahri, NM Karie, M Ahmed, C Valli
Sensors 21 (18), 6163, 2021
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem
W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli
IEEE Access 6, 36939-36947, 2018
Securing deep learning based edge finger vein biometrics with binary decision diagram
W Yang, S Wang, J Hu, G Zheng, J Yang, C Valli
IEEE transactions on industrial Informatics 15 (7), 4244-4253, 2019
A security review of local government using NIST CSF: a case study
A Ibrahim, C Valli, I McAteer, J Chaudhry
The Journal of Supercomputing 74, 5171-5186, 2018
Malware Forensics: Discovery of the intent of Deception
M Brand, C Valli, A Woodward
Journal of Digital Forensics, Security and Law 5 (4), 31-42, 2010
Building a digital forensic laboratory: Establishing and managing a successful facility
A Jones, C Valli
Butterworth-Heinemann, 2011
Finger-to-heart (F2H): Authentication for wireless implantable medical devices
G Zheng, W Yang, C Valli, L Qiao, R Shankaran, MA Orgun, ...
IEEE journal of biomedical and health informatics 23 (4), 1546-1557, 2018
Risk analysis of cloud sourcing in healthcare and public health industry
H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ...
IEEE Access 6, 19140-19150, 2018
Review and Analysis of Cowrie Artefacts and Their Potential to be used Deceptively
SGW Warren Z Cabral, Craig Valli, Leslie F Sikos
2019 International Conference on Computational Science and Computational …, 2019
A privacy-preserving lightweight biometric system for internet of things security
W Yang, S Wang, G Zheng, J Yang, C Valli
IEEE Communications Magazine 57 (3), 84-89, 2019
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market
A Jones, C Valli, G Dardick, I Sutherland
Journal of Digital Forensics, Security and Law 3 (1), 5-24, 2008
A wrapper-based feature selection for analysis of large data sets
J Leng, C Valli, L Armstrong
IEEE, 2010
Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business
C Valli, I Martinus, JM Johnstone
International Conference on Security and Management, 71-75, 2014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20