Skip navigation

Items where Greenwich Author is "Gan, Diane"

Items where Greenwich Author is "Gan, Diane"

Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: ATM, congestion control, leaky bucket, multimedia, simulation | Computer security, security incidents. | Containment, Worm detection, Malware, Cyber defence | Cyber defence, Network worm, Worm containment, Malware | Cyber security, Cyber-physical security, Robotics, Vehicle security, Intrusion detection | Cyber security, Robotic vehicles, Vehicular security, Intrusion detection, Behaviour-based, Anomaly detection | Cyber security, cyber-physical security, cyber-physical systems, autonomous systems, robotic vehicles, vehicular security, intrusion detection | Cyber-physical security, Intrusion detection system, Bayesian network | Cyber-physical security, Vehicles, Intrusion detection, Cyber security, Cloud computing, Computational offloading | Digital forensics, statistical learning | Digital forensics; World wide web; Session-to-session analysis; Context analysis; Pattern of life; Internet history analysis | Forensics analysis, passive attack, digital footprint, Backtrack, Linux server, Metasploit, Nessus, Nmap, PHP-Backdoor and Weevely | Grippers; IP networks; Ports (Computers); Servers, Malware; Radiation detectors; Payloads; Cyber defence; Network worm; Worm detection | Human-as-a-Sensor; Social engineering; Semantic attacks; Cyber security | Internet of Things, IoT Security, HaaSS, intrusion detection | Lifelong learning, cyber, security, short course, teaching | Linux, UNIX, Forensics investigation, Digital evidence, Network, Enumeration, Digital artifacts, HexaFind, Big data | Mac OS X, forensics, RAM Dump, VolaGUI, Volafox, mach-o, linear | Malware analysis; testbed; virtualisation | O.MG Cable; programmable USB; file tampering attack; digital evidence credibility; miscarriage of justice; cyber fraud | PHP, MySQL, Apache, BLIND SQL injection, UNION SELECT, PHP shell, AMP platforms, injecting through proxy, SQLInjector, SQLInstillator, AMPAnasia, Meterpreter reverse shell, AMPAsuite, web application security, security flaws, SQL injection attacks | Problem-based Learning; Cross-disciplinary collaboration; peer-assessment; Expert Witness evidence; Peer Assisted Learning; STEM teaching | Security; Cyber crime; Social Engineering; Semantic attacks | Social Engineering, Internet of Everything | Social networks, stalking, information leakage | Virtualisation Technology; IT Security | Zeus banking malware; Zeus malware variants; machine learning; binary classification algorithms; deep learning; feature selection | Zeus banking malware; detecting banking malware using binary classification algorithms; decision tree algorithm; random forest algorithm; SVM algorithm; manual feature selection | access, attacks, computer, control, critical, cyber attack, cyber security, cyber terrorism, financial, government, industrial, information, insider, international, Internet, management, mechanisms, military, network, nuclear, security, software, Stuxnet, system, terrorist, threats | collaborative learning, experiential learning, simulated learning, PBL, peer-group learning | computer forensics project, research | computer forensics, problem-based learning strategy | computer forensics, teaching, assessments | cyber-physical security, cyber security, cyber-physical systems, vehicles, intrusion detection | digital forensics, internet history, session-to-session analysis, internet connection records, community detection | digital forensics; Adversary-in-the-middle; cyber-enabled fraud; screen crab; portable programmable devices; miscarriage of justice | emergency response, cyber security, rescue robots | extracting information, password cracking, vulnerability assessment, attack tools, digital fingerprinting, forensics | forensics tools; programmable USB device; forensic analyst; human user; frameup attack; Rubber Ducky; identical computers; identical baseline configurations; image forensics; legal counsel; human computer interaction; miscarriage of justice | online social networks; online privacy; data harvesting; Facebook; Twitter; OSINT | spam email, social engineering, regular expressions, targeted malicious email (TME) | survey, pervasive computing, network-level security and protection, physical security, emergency management | traffic congestion control, policing electric circuits, electronic circuits, | web attacks
Number of items: 44.

ATM, congestion control, leaky bucket, multimedia, simulation

Gan, D. ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and McKenzie, S. (1999) Traffic policing in ATM networks with multimedia traffic: the super leaky bucket. Computer Communications, 22 (5). pp. 439-450. ISSN 0140-3664 (doi:10.1016/S0140-3664(99)00056-0)

Computer security, security incidents.

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitrios (2007) Universities - victims or perpetrators of cyber crime? In: Jahankhani, Hamid and Palmer-Brown, Dominic, (eds.) Global e-Security, proceedings of the 3rd annual international conference, 2007. ICGeS, London, pp. 197-204. ISBN 978 0 9550008 4 3

Containment, Worm detection, Malware, Cyber defence

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Cyber defence, Network worm, Worm containment, Malware

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Cyber security, Cyber-physical security, Robotics, Vehicle security, Intrusion detection

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Cyber security, Robotic vehicles, Vehicular security, Intrusion detection, Behaviour-based, Anomaly detection

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Cyber security, cyber-physical security, cyber-physical systems, autonomous systems, robotic vehicles, vehicular security, intrusion detection

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Cyber-physical security, Intrusion detection system, Bayesian network

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Cyber-physical security, Vehicles, Intrusion detection, Cyber security, Cloud computing, Computational offloading

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Digital forensics, statistical learning

Gresty, David W., Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2014) Digital forensic analysis of internet history using principal component analysis. In: PGNET Proceedings of the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2014). Liverpool John Moores University, Liverpool, UK. ISBN 9781902560281

Digital forensics; World wide web; Session-to-session analysis; Context analysis; Pattern of life; Internet history analysis

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

Forensics analysis, passive attack, digital footprint, Backtrack, Linux server, Metasploit, Nessus, Nmap, PHP-Backdoor and Weevely

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

Grippers; IP networks; Ports (Computers); Servers, Malware; Radiation detectors; Payloads; Cyber defence; Network worm; Worm detection

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

Human-as-a-Sensor; Social engineering; Semantic attacks; Cyber security

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)

Internet of Things, IoT Security, HaaSS, intrusion detection

Ivory, Dennis, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2024) Enabling the Human-as-a-security-sensor paradigm in the Internet of Things. In: Pitropakis, Nikolaos and Katsikas, Sokratis, (eds.) Security and Privacy in Smart Environments. Lecture Notes in Computer Science (LNCS), 14800 . Springer, Cham. ISBN 978-3031667077; 978-3031667084 (In Press)

Lifelong learning, cyber, security, short course, teaching

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

Linux, UNIX, Forensics investigation, Digital evidence, Network, Enumeration, Digital artifacts, HexaFind, Big data

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Mac OS X, forensics, RAM Dump, VolaGUI, Volafox, mach-o, linear

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Malware analysis; testbed; virtualisation

Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) The V-Network testbed for malware analysis. In: 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, pp. 629-635. ISBN 978-1-4673-9546-5 (doi:10.1109/ICACCCT.2016.7831716)

O.MG Cable; programmable USB; file tampering attack; digital evidence credibility; miscarriage of justice; cyber fraud

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

PHP, MySQL, Apache, BLIND SQL injection, UNION SELECT, PHP shell, AMP platforms, injecting through proxy, SQLInjector, SQLInstillator, AMPAnasia, Meterpreter reverse shell, AMPAsuite, web application security, security flaws, SQL injection attacks

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

Problem-based Learning; Cross-disciplinary collaboration; peer-assessment; Expert Witness evidence; Peer Assisted Learning; STEM teaching

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

Security; Cyber crime; Social Engineering; Semantic attacks

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Social Engineering, Internet of Everything

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

Social networks, stalking, information leakage

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:10.3390/fi7010067)

Virtualisation Technology; IT Security

Frangiskatos, Dimitrios, Ghassemian, Mona and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2010) Technology perspective: Is green IT a threat to IT security? In: Information Security and Digital Forensics. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (41). Springer, Berlin, Heidelberg, New York, pp. 147-154. ISBN 978-3-642-11529-5 ISSN 1867-8211 (doi:10.1007/978-3-642-11530-1)

Zeus banking malware; Zeus malware variants; machine learning; binary classification algorithms; deep learning; feature selection

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2022) An investigation to detect banking malware network communication traffic using machine learning techniques. Journal of Cybersecurity and Privacy, 3 (1). pp. 1-23. ISSN 2624-800X (Online) (doi:10.3390/jcp3010001)

Zeus banking malware; detecting banking malware using binary classification algorithms; decision tree algorithm; random forest algorithm; SVM algorithm; manual feature selection

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2020) Comparing and analysing binary classification algorithms when used to detect the Zeus malware. In: 2019 Sixth HCT Information Technology Trends (ITT). Ras Al Khaimah, United Arab Emirates, 20-21 Nov. 2019. Information Technology Trends (ITT) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 6-11. ISBN 978-1728150611; 978-1728150628 (doi:10.1109/ITT48889.2019.9075115)

access, attacks, computer, control, critical, cyber attack, cyber security, cyber terrorism, financial, government, industrial, information, insider, international, Internet, management, mechanisms, military, network, nuclear, security, software, Stuxnet, system, terrorist, threats

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

collaborative learning, experiential learning, simulated learning, PBL, peer-group learning

Gan, D. ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Chadwick, D., Gresty, D., Vuong, T. and Phillips, E. (2017) Experiential and Simulated Learning: An Interdisciplinary Approach. In: Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI'17). IEEE, Las Vegas, Nevada, USA. ISBN 978-1-5386-2652-8 (doi:10.1109/CSCI.2017.313)

computer forensics project, research

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitris (2011) What makes a computer forensics project? In: 7th Annual Teaching Computer Forensics Workshop, 10 Nov 2011, University of Sunderland, UK. (Unpublished)

computer forensics, problem-based learning strategy

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitrios (2011) An educational paradigm for teaching computer forensics. In: Enhancing Employability of Computing Students. The Higher Education Academy, Information and Computer Sciences, University of Ulster at Jordanstown, UK. ISBN 9780956522030

computer forensics, teaching, assessments

Frangiskatos, Dimitrios, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Chadwick, David (2010) The development of challenging assessments for computer forensics students. In: 6th Annual Teaching Computer Forensics Workshop, 18 Nov 2010, University of Sunderland. (Unpublished)

cyber-physical security, cyber security, cyber-physical systems, vehicles, intrusion detection

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

digital forensics, internet history, session-to-session analysis, internet connection records, community detection

Gresty, David W., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

digital forensics; Adversary-in-the-middle; cyber-enabled fraud; screen crab; portable programmable devices; miscarriage of justice

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Durojaiye, Tolulope (2023) Forensic implication of a cyber-enabled fraud taking advantage of an offline Adversary-in-the-Middle (AiTM) attack. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO) 22th - 26th May 2023, Opatija, Croatia. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1258-1263. ISBN 978-9532331042; 978-9532331059; 978-1665494205 ISSN 1847-3938 (Print), 2623-8764 (Online) (doi:10.23919/MIPRO57284.2023.10159879)

emergency response, cyber security, rescue robots

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

extracting information, password cracking, vulnerability assessment, attack tools, digital fingerprinting, forensics

Oso, Christie and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics approach to digital fingerprinting on Windows servers. In: CFET 2012 : Cybercrime Forensics Education & Training. The 6th International Conference on Cybercrime Forensics Education & Training., 6-7 Sep 2012, Canterbury Christ Church University, Canterbury, Kent, UK.

forensics tools; programmable USB device; forensic analyst; human user; frameup attack; Rubber Ducky; identical computers; identical baseline configurations; image forensics; legal counsel; human computer interaction; miscarriage of justice

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

online social networks; online privacy; data harvesting; Facebook; Twitter; OSINT

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ivory, Dennis ORCID logoORCID: https://orcid.org/0000-0003-3415-4924 (2022) Online privacy of personal information – perceptions v reality. In: Security and Privacy in New Computing Environments 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (423). Springer, Cham, Switzerland, pp. 346-368. ISBN 978-3030967918 ; 978-3030967901 (doi:10.1007/978-3-030-96791-8_26)

spam email, social engineering, regular expressions, targeted malicious email (TME)

Vuong, Tuan Phan and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A targeted malicious email (TME) attack tool. In: 6th International Conference on Cybercrime Forensics Education & Training, 6-7 Sep 2012, Canterbury, Kent, UK.

survey, pervasive computing, network-level security and protection, physical security, emergency management

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

traffic congestion control, policing electric circuits, electronic circuits,

Gan, Diane Elisabeth ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (1998) Performance analysis of an ATM network with multimedia traffic: a simulation study. PhD thesis, University of Greenwich.

web attacks

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) The AMP attacker: a suite of tools for exploiting SQL injection vulnerabilities in web applications. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 81-88. ISBN 978-0947649852

This list was generated on Sun Dec 22 03:30:16 2024 UTC.