Skip navigation

Items where Author is "Gan, Diane"

Items where Author is "Gan, Diane"

Group by: Item Type | Uncontrolled Keywords | No Grouping
access Adversary-in-the-middle AMP platforms AMPAnasia AMPAsuite Anomaly detection Apache assessments attack tools attacks autonomous systems Backtrack Bayesian network Behaviour-based Big data binary classification algorithms BLIND SQL injection Cloud computing community detection Computational offloading computer computer forensics computer forensics project Computer security Containment Context analysis control critical Cross-disciplinary collaboration cyber Cyber defence cyber attack Cyber crime Cyber defence cyber fraud Cyber security cyber terrorism cyber-enabled fraud Cyber-physical security cyber-physical systems data harvesting decision tree algorithm deep learning detecting banking malware using binary classification algorithms Digital artifacts Digital evidence digital evidence credibility digital fingerprinting digital footprint digital forensics emergency management emergency response Enumeration Expert Witness evidence extracting information Facebook feature selection file tampering attack financial forensic analyst forensics Forensics analysis Forensics investigation forensics tools frameup attack government Grippers HaaSS HexaFind human computer interaction human user Human-as-a-Sensor identical baseline configurations identical computers image forensics industrial information information leakage injecting through proxy insider international Internet internet connection records internet history Internet history analysis Internet of Everything Internet of Things intrusion detection Intrusion detection system IoT Security IP networks IT Security legal counsel Lifelong learning linear Linux Linux server Mac OS X mach-o machine learning Malware Malware analysis management manual feature selection mechanisms Metasploit Meterpreter reverse shell military miscarriage of justice MySQL Nessus Network Network worm network-level security and protection Nmap nuclear O.MG Cable online privacy online social networks OSINT passive attack password cracking Pattern of life Payloads Peer Assisted Learning peer-assessment pervasive computing PHP PHP shell PHP-Backdoor and Weevely physical security portable programmable devices Ports (Computers) Problem-based Learning problem-based learning strategy programmable USB programmable USB device Radiation detectors RAM Dump random forest algorithm regular expressions rescue robots research Robotic vehicles Robotics Rubber Ducky screen crab Security security flaws security incidents Semantic attacks Semantic attacks Servers session-to-session analysis short course Social engineering Social networks software spam email SQL injection attacks SQLInjector SQLInstillator stalking statistical learning STEM teaching Stuxnet survey SVM algorithm system targeted malicious email (TME) teaching terrorist testbed threats Twitter UNION SELECT UNIX Vehicle security Vehicles Vehicular security virtualisation Virtualisation Technology Volafox VolaGUI vulnerability assessment web application security web attacks World wide web Worm containment Worm detection Zeus banking malware Zeus malware variants
Number of items: 233.

access

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Adversary-in-the-middle

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Durojaiye, Tolulope (2023) Forensic implication of a cyber-enabled fraud taking advantage of an offline Adversary-in-the-Middle (AiTM) attack. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO) 22th - 26th May 2023, Opatija, Croatia. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1258-1263. ISBN 978-9532331042; 978-9532331059; 978-1665494205 ISSN 1847-3938 (Print), 2623-8764 (Online) (doi:10.23919/MIPRO57284.2023.10159879)

AMP platforms

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

AMPAnasia

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

AMPAsuite

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

Anomaly detection

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Apache

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

assessments

Frangiskatos, Dimitrios, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Chadwick, David (2010) The development of challenging assessments for computer forensics students. In: 6th Annual Teaching Computer Forensics Workshop, 18 Nov 2010, University of Sunderland. (Unpublished)

attack tools

Oso, Christie and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics approach to digital fingerprinting on Windows servers. In: CFET 2012 : Cybercrime Forensics Education & Training. The 6th International Conference on Cybercrime Forensics Education & Training., 6-7 Sep 2012, Canterbury Christ Church University, Canterbury, Kent, UK.

attacks

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

autonomous systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Backtrack

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

Bayesian network

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Behaviour-based

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Big data

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

binary classification algorithms

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2022) An investigation to detect banking malware network communication traffic using machine learning techniques. Journal of Cybersecurity and Privacy, 3 (1). pp. 1-23. ISSN 2624-800X (Online) (doi:10.3390/jcp3010001)

BLIND SQL injection

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

Cloud computing

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

community detection

Gresty, David W., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Computational offloading

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

computer

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

computer forensics

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitrios (2011) An educational paradigm for teaching computer forensics. In: Enhancing Employability of Computing Students. The Higher Education Academy, Information and Computer Sciences, University of Ulster at Jordanstown, UK. ISBN 9780956522030

Frangiskatos, Dimitrios, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Chadwick, David (2010) The development of challenging assessments for computer forensics students. In: 6th Annual Teaching Computer Forensics Workshop, 18 Nov 2010, University of Sunderland. (Unpublished)

computer forensics project

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitris (2011) What makes a computer forensics project? In: 7th Annual Teaching Computer Forensics Workshop, 10 Nov 2011, University of Sunderland, UK. (Unpublished)

Computer security

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitrios (2007) Universities - victims or perpetrators of cyber crime? In: Jahankhani, Hamid and Palmer-Brown, Dominic, (eds.) Global e-Security, proceedings of the 3rd annual international conference, 2007. ICGeS, London, pp. 197-204. ISBN 978 0 9550008 4 3

Containment

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Context analysis

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

control

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

critical

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Cross-disciplinary collaboration

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

cyber

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

Cyber defence

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

cyber attack

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Cyber crime

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Cyber defence

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

cyber fraud

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

Cyber security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

cyber terrorism

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

cyber-enabled fraud

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Durojaiye, Tolulope (2023) Forensic implication of a cyber-enabled fraud taking advantage of an offline Adversary-in-the-Middle (AiTM) attack. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO) 22th - 26th May 2023, Opatija, Croatia. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1258-1263. ISBN 978-9532331042; 978-9532331059; 978-1665494205 ISSN 1847-3938 (Print), 2623-8764 (Online) (doi:10.23919/MIPRO57284.2023.10159879)

Cyber-physical security

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

cyber-physical systems

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

data harvesting

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ivory, Dennis ORCID logoORCID: https://orcid.org/0000-0003-3415-4924 (2022) Online privacy of personal information – perceptions v reality. In: Security and Privacy in New Computing Environments 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (423). Springer, Cham, Switzerland, pp. 346-368. ISBN 978-3030967918 ; 978-3030967901 (doi:10.1007/978-3-030-96791-8_26)

decision tree algorithm

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2020) Comparing and analysing binary classification algorithms when used to detect the Zeus malware. In: 2019 Sixth HCT Information Technology Trends (ITT). Ras Al Khaimah, United Arab Emirates, 20-21 Nov. 2019. Information Technology Trends (ITT) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 6-11. ISBN 978-1728150611; 978-1728150628 (doi:10.1109/ITT48889.2019.9075115)

deep learning

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2022) An investigation to detect banking malware network communication traffic using machine learning techniques. Journal of Cybersecurity and Privacy, 3 (1). pp. 1-23. ISSN 2624-800X (Online) (doi:10.3390/jcp3010001)

detecting banking malware using binary classification algorithms

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2020) Comparing and analysing binary classification algorithms when used to detect the Zeus malware. In: 2019 Sixth HCT Information Technology Trends (ITT). Ras Al Khaimah, United Arab Emirates, 20-21 Nov. 2019. Information Technology Trends (ITT) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 6-11. ISBN 978-1728150611; 978-1728150628 (doi:10.1109/ITT48889.2019.9075115)

Digital artifacts

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Digital evidence

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

digital evidence credibility

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

digital fingerprinting

Oso, Christie and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics approach to digital fingerprinting on Windows servers. In: CFET 2012 : Cybercrime Forensics Education & Training. The 6th International Conference on Cybercrime Forensics Education & Training., 6-7 Sep 2012, Canterbury Christ Church University, Canterbury, Kent, UK.

digital footprint

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

digital forensics

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Durojaiye, Tolulope (2023) Forensic implication of a cyber-enabled fraud taking advantage of an offline Adversary-in-the-Middle (AiTM) attack. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO) 22th - 26th May 2023, Opatija, Croatia. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1258-1263. ISBN 978-9532331042; 978-9532331059; 978-1665494205 ISSN 1847-3938 (Print), 2623-8764 (Online) (doi:10.23919/MIPRO57284.2023.10159879)

Gresty, David W., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

Gresty, David W., Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2014) Digital forensic analysis of internet history using principal component analysis. In: PGNET Proceedings of the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2014). Liverpool John Moores University, Liverpool, UK. ISBN 9781902560281

emergency management

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

emergency response

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

Enumeration

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Expert Witness evidence

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

extracting information

Oso, Christie and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics approach to digital fingerprinting on Windows servers. In: CFET 2012 : Cybercrime Forensics Education & Training. The 6th International Conference on Cybercrime Forensics Education & Training., 6-7 Sep 2012, Canterbury Christ Church University, Canterbury, Kent, UK.

Facebook

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ivory, Dennis ORCID logoORCID: https://orcid.org/0000-0003-3415-4924 (2022) Online privacy of personal information – perceptions v reality. In: Security and Privacy in New Computing Environments 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (423). Springer, Cham, Switzerland, pp. 346-368. ISBN 978-3030967918 ; 978-3030967901 (doi:10.1007/978-3-030-96791-8_26)

feature selection

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2022) An investigation to detect banking malware network communication traffic using machine learning techniques. Journal of Cybersecurity and Privacy, 3 (1). pp. 1-23. ISSN 2624-800X (Online) (doi:10.3390/jcp3010001)

file tampering attack

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

financial

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

forensic analyst

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

forensics

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Oso, Christie and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics approach to digital fingerprinting on Windows servers. In: CFET 2012 : Cybercrime Forensics Education & Training. The 6th International Conference on Cybercrime Forensics Education & Training., 6-7 Sep 2012, Canterbury Christ Church University, Canterbury, Kent, UK.

Forensics analysis

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

Forensics investigation

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

forensics tools

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

frameup attack

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

government

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Grippers

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

HaaSS

Ivory, Dennis, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2024) Enabling the Human-as-a-security-sensor paradigm in the Internet of Things. In: Pitropakis, Nikolaos and Katsikas, Sokratis, (eds.) Security and Privacy in Smart Environments. Lecture Notes in Computer Science (LNCS), 14800 . Springer, Cham. ISBN 978-3031667077; 978-3031667084 (In Press)

HexaFind

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

human computer interaction

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

human user

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

Human-as-a-Sensor

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)

identical baseline configurations

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

identical computers

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

image forensics

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

industrial

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

information

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

information leakage

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:10.3390/fi7010067)

injecting through proxy

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

insider

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

international

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Internet

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

internet connection records

Gresty, David W., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

internet history

Gresty, David W., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Internet history analysis

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

Internet of Everything

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

Internet of Things

Ivory, Dennis, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2024) Enabling the Human-as-a-security-sensor paradigm in the Internet of Things. In: Pitropakis, Nikolaos and Katsikas, Sokratis, (eds.) Security and Privacy in Smart Environments. Lecture Notes in Computer Science (LNCS), 14800 . Springer, Cham. ISBN 978-3031667077; 978-3031667084 (In Press)

intrusion detection

Ivory, Dennis, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2024) Enabling the Human-as-a-security-sensor paradigm in the Internet of Things. In: Pitropakis, Nikolaos and Katsikas, Sokratis, (eds.) Security and Privacy in Smart Environments. Lecture Notes in Computer Science (LNCS), 14800 . Springer, Cham. ISBN 978-3031667077; 978-3031667084 (In Press)

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Intrusion detection system

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Anthony, Richard (2018) Detecting cyber-physical threats in an autonomous robotic vehicle using Bayesian Networks. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1-6. ISBN 978-1538630679 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20)

IoT Security

Ivory, Dennis, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2024) Enabling the Human-as-a-security-sensor paradigm in the Internet of Things. In: Pitropakis, Nikolaos and Katsikas, Sokratis, (eds.) Security and Privacy in Smart Environments. Lecture Notes in Computer Science (LNCS), 14800 . Springer, Cham. ISBN 978-3031667077; 978-3031667084 (In Press)

IP networks

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

IT Security

Frangiskatos, Dimitrios, Ghassemian, Mona and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2010) Technology perspective: Is green IT a threat to IT security? In: Information Security and Digital Forensics. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (41). Springer, Berlin, Heidelberg, New York, pp. 147-154. ISBN 978-3-642-11529-5 ISSN 1867-8211 (doi:10.1007/978-3-642-11530-1)

legal counsel

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

Lifelong learning

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

linear

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

Linux

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Linux server

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

Mac OS X

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

mach-o

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

machine learning

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2022) An investigation to detect banking malware network communication traffic using machine learning techniques. Journal of Cybersecurity and Privacy, 3 (1). pp. 1-23. ISSN 2624-800X (Online) (doi:10.3390/jcp3010001)

Malware

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

Malware analysis

Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) The V-Network testbed for malware analysis. In: 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, pp. 629-635. ISBN 978-1-4673-9546-5 (doi:10.1109/ICACCCT.2016.7831716)

management

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

manual feature selection

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2020) Comparing and analysing binary classification algorithms when used to detect the Zeus malware. In: 2019 Sixth HCT Information Technology Trends (ITT). Ras Al Khaimah, United Arab Emirates, 20-21 Nov. 2019. Information Technology Trends (ITT) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 6-11. ISBN 978-1728150611; 978-1728150628 (doi:10.1109/ITT48889.2019.9075115)

mechanisms

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Metasploit

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

Meterpreter reverse shell

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

military

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

miscarriage of justice

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Durojaiye, Tolulope (2023) Forensic implication of a cyber-enabled fraud taking advantage of an offline Adversary-in-the-Middle (AiTM) attack. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO) 22th - 26th May 2023, Opatija, Croatia. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1258-1263. ISBN 978-9532331042; 978-9532331059; 978-1665494205 ISSN 1847-3938 (Print), 2623-8764 (Online) (doi:10.23919/MIPRO57284.2023.10159879)

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

MySQL

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

Nessus

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

Network

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Network worm

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

network-level security and protection

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

Nmap

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

nuclear

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

O.MG Cable

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

online privacy

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ivory, Dennis ORCID logoORCID: https://orcid.org/0000-0003-3415-4924 (2022) Online privacy of personal information – perceptions v reality. In: Security and Privacy in New Computing Environments 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (423). Springer, Cham, Switzerland, pp. 346-368. ISBN 978-3030967918 ; 978-3030967901 (doi:10.1007/978-3-030-96791-8_26)

online social networks

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ivory, Dennis ORCID logoORCID: https://orcid.org/0000-0003-3415-4924 (2022) Online privacy of personal information – perceptions v reality. In: Security and Privacy in New Computing Environments 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (423). Springer, Cham, Switzerland, pp. 346-368. ISBN 978-3030967918 ; 978-3030967901 (doi:10.1007/978-3-030-96791-8_26)

OSINT

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ivory, Dennis ORCID logoORCID: https://orcid.org/0000-0003-3415-4924 (2022) Online privacy of personal information – perceptions v reality. In: Security and Privacy in New Computing Environments 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (423). Springer, Cham, Switzerland, pp. 346-368. ISBN 978-3030967918 ; 978-3030967901 (doi:10.1007/978-3-030-96791-8_26)

passive attack

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

password cracking

Oso, Christie and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics approach to digital fingerprinting on Windows servers. In: CFET 2012 : Cybercrime Forensics Education & Training. The 6th International Conference on Cybercrime Forensics Education & Training., 6-7 Sep 2012, Canterbury Christ Church University, Canterbury, Kent, UK.

Pattern of life

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

Payloads

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

Peer Assisted Learning

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

peer-assessment

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

pervasive computing

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

PHP

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

PHP shell

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

PHP-Backdoor and Weevely

Andrade, Jhonattan Javier Barriga and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics investigation into attacks on Linux servers. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 73-80. ISBN 9780947649852

physical security

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

portable programmable devices

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Durojaiye, Tolulope (2023) Forensic implication of a cyber-enabled fraud taking advantage of an offline Adversary-in-the-Middle (AiTM) attack. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO) 22th - 26th May 2023, Opatija, Croatia. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1258-1263. ISBN 978-9532331042; 978-9532331059; 978-1665494205 ISSN 1847-3938 (Print), 2623-8764 (Online) (doi:10.23919/MIPRO57284.2023.10159879)

Ports (Computers)

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

Problem-based Learning

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

problem-based learning strategy

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitrios (2011) An educational paradigm for teaching computer forensics. In: Enhancing Employability of Computing Students. The Higher Education Academy, Information and Computer Sciences, University of Ulster at Jordanstown, UK. ISBN 9780956522030

programmable USB

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)

programmable USB device

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

Radiation detectors

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

RAM Dump

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

random forest algorithm

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2020) Comparing and analysing binary classification algorithms when used to detect the Zeus malware. In: 2019 Sixth HCT Information Technology Trends (ITT). Ras Al Khaimah, United Arab Emirates, 20-21 Nov. 2019. Information Technology Trends (ITT) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 6-11. ISBN 978-1728150611; 978-1728150628 (doi:10.1109/ITT48889.2019.9075115)

regular expressions

Vuong, Tuan Phan and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A targeted malicious email (TME) attack tool. In: 6th International Conference on Cybercrime Forensics Education & Training, 6-7 Sep 2012, Canterbury, Kent, UK.

rescue robots

Vuong, Tuan, Filippoupolitis, Avgoustinos, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2014) Physical indicators of cyber attacks against a rescue robot. In: 2014 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). IEEE, Piscataway, NJ, US, pp. 338-343. ISBN 9781479927364 (doi:10.1109/PerComW.2014.6815228)

research

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitris (2011) What makes a computer forensics project? In: 7th Annual Teaching Computer Forensics Workshop, 10 Nov 2011, University of Sunderland, UK. (Unpublished)

Robotic vehicles

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

Robotics

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Rubber Ducky

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2021) Have you been framed and can you prove it? In: 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1236-1241. ISBN 978-1665447614; 978-9532331011; 978-9532331011 ISSN 2623-8764 (Online) (doi:10.23919/MIPRO52101.2021.9596889)

screen crab

Lawal, Damola, Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Durojaiye, Tolulope (2023) Forensic implication of a cyber-enabled fraud taking advantage of an offline Adversary-in-the-Middle (AiTM) attack. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO) 22th - 26th May 2023, Opatija, Croatia. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1258-1263. ISBN 978-9532331042; 978-9532331059; 978-1665494205 ISSN 1847-3938 (Print), 2623-8764 (Online) (doi:10.23919/MIPRO57284.2023.10159879)

Security

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

security flaws

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

security incidents

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Frangiskatos, Dimitrios (2007) Universities - victims or perpetrators of cyber crime? In: Jahankhani, Hamid and Palmer-Brown, Dominic, (eds.) Global e-Security, proceedings of the 3rd annual international conference, 2007. ICGeS, London, pp. 197-204. ISBN 978 0 9550008 4 3

Semantic attacks

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)

Semantic attacks

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Servers

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

session-to-session analysis

Gresty, David W., Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ierotheou, Constantinos (2017) Towards web usage attribution via graph community detection in grouped internet connection records. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Elsevier Digital Investigation, 16 . IEEE, Exeter, UK, 365 -372. ISBN 978-1538630662 (doi:10.1109/iThings-GreenCom-CPSCom-SmartData.2017.61)

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

short course

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

Social engineering

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE. ISBN 978-1-5090-5757-3 (doi:10.1109/SERA.2017.7965754)

Heartfield, Ryan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) You are probably not the weakest link: Towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access, 4. pp. 6910-6928. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2016.2616285)

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Heartfield, Ryan (2016) Social engineering in the internet of everything. Cutter IT Journal, 29 (7). pp. 20-29. ISSN 1522-7383

Vuong, Tuan Phan and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A targeted malicious email (TME) attack tool. In: 6th International Conference on Cybercrime Forensics Education & Training, 6-7 Sep 2012, Canterbury, Kent, UK.

Social networks

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:10.3390/fi7010067)

software

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

spam email

Vuong, Tuan Phan and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A targeted malicious email (TME) attack tool. In: 6th International Conference on Cybercrime Forensics Education & Training, 6-7 Sep 2012, Canterbury, Kent, UK.

SQL injection attacks

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

SQLInjector

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

SQLInstillator

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

stalking

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Jenkins, Lily R. (2015) Social networking privacy — Who's stalking you? Future Internet, 7 (1). pp. 67-93. ISSN 1999-5903 (Print), 1999-5903 (Online) (doi:10.3390/fi7010067)

statistical learning

Gresty, David W., Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2014) Digital forensic analysis of internet history using principal component analysis. In: PGNET Proceedings of the 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2014). Liverpool John Moores University, Liverpool, UK. ISBN 9781902560281

STEM teaching

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Vuong, Tuan and Phillips, Edward (2017) Cross-disciplinary Teaching of both Computer Forensics Students and Law Students Using Peer-Assessment in a Simulated Expert Witness Scenario. In: 8th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2017), 9th - 10th October 2017, Singapore.

Stuxnet

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

survey

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:10.3390/fi5020205)

SVM algorithm

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2020) Comparing and analysing binary classification algorithms when used to detect the Zeus malware. In: 2019 Sixth HCT Information Technology Trends (ITT). Ras Al Khaimah, United Arab Emirates, 20-21 Nov. 2019. Information Technology Trends (ITT) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 6-11. ISBN 978-1728150611; 978-1728150628 (doi:10.1109/ITT48889.2019.9075115)

system

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

targeted malicious email (TME)

Vuong, Tuan Phan and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A targeted malicious email (TME) attack tool. In: 6th International Conference on Cybercrime Forensics Education & Training, 6-7 Sep 2012, Canterbury, Kent, UK.

teaching

Chadwick, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Frangiskatos, Dimitrios (2012) Short course teaching of cyber security for mid-career physical security professionals with limited academic background. In: CFET: 6th International Conference on Cybercrime Forensics Education & Training. Canterbury Christ Church University, Canterbury, pp. 12-22. ISBN 9781899253944

Frangiskatos, Dimitrios, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Chadwick, David (2010) The development of challenging assessments for computer forensics students. In: 6th Annual Teaching Computer Forensics Workshop, 18 Nov 2010, University of Sunderland. (Unpublished)

terrorist

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

testbed

Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) The V-Network testbed for malware analysis. In: 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, pp. 629-635. ISBN 978-1-4673-9546-5 (doi:10.1109/ICACCCT.2016.7831716)

threats

MacKinnon, Lachlan, Bacon, Liz, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Chadwick, David and Frangiskatos, Dimitrios (2013) Cyber security countermeasures to combat cyber terrorism. In: Akhgar, Babak and Yates, Simeon, (eds.) Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Butterworth-Heinemann, Oxford, UK, pp. 234-256. ISBN 9780124071919

Twitter

Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Ivory, Dennis ORCID logoORCID: https://orcid.org/0000-0003-3415-4924 (2022) Online privacy of personal information – perceptions v reality. In: Security and Privacy in New Computing Environments 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (423). Springer, Cham, Switzerland, pp. 346-368. ISBN 978-3030967918 ; 978-3030967901 (doi:10.1007/978-3-030-96791-8_26)

UNION SELECT

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

UNIX

Bayley, Fletcher and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic analysis of digital attack tool artifacts. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 73-80. ISBN 9780947649975

Vehicle security

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2015) Performance evaluation of cyber-physical intrusion detection on a robotic vehicle. In: 13th International Conference on Pervasive Intelligence and Computing (IEEE-PICOM 2015). IEEE, Piscataway, NJ, US, pp. 2106-2113. ISBN 9781509001538 (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.313)

Vehicles

Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Vuong, Tuan, Heartfield, Ryan, Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700, Yoon, Yongpil and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Cloud-based cyber-physical intrusion detection for vehicles using Deep Learning. IEEE Access, 6. pp. 3491-3508. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2017.2782159)

Vuong, Tuan Phan, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:10.1109/WIFS.2015.7368559)

Vehicular security

Bezemskij, Anatolij, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182, Anthony, Richard J. and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. In: 2016 15th International Conference on Ubiquitous Computing and Communications and 2016 8th International Symposium on Cyberspace and Security (IUCC-CSS). IEEE, pp. 61-68. ISBN 978-1-5090-5567-8 (doi:10.1109/IUCC-CSS.2016.017)

Bezemskij, Anatolij, Anthony, Richard John, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Threat evaluation based on automatic sensor signal characterisation and anomaly detection. In: The Twelfth International Conference on Autonomic and Autonomous Systems (ICAS 2016). IARIA. ISBN 978-1612084831 ISSN 2308-3913

virtualisation

Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2017) The V-Network testbed for malware analysis. In: 2016 International Conference on Advanced Communication Control and Computing Technologies (ICACCCT). IEEE, pp. 629-635. ISBN 978-1-4673-9546-5 (doi:10.1109/ICACCCT.2016.7831716)

Virtualisation Technology

Frangiskatos, Dimitrios, Ghassemian, Mona and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2010) Technology perspective: Is green IT a threat to IT security? In: Information Security and Digital Forensics. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (41). Springer, Berlin, Heidelberg, New York, pp. 147-154. ISBN 978-3-642-11529-5 ISSN 1867-8211 (doi:10.1007/978-3-642-11530-1)

Volafox

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

VolaGUI

Coppock, Tom and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) Forensic investigation into Mac OS X volatile memory. In: Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013). University of Strathclyde Publishing, Strathclyde, Scotland, UK, pp. 65-72. ISBN 0-947649-97-5

vulnerability assessment

Oso, Christie and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) A forensics approach to digital fingerprinting on Windows servers. In: CFET 2012 : Cybercrime Forensics Education & Training. The 6th International Conference on Cybercrime Forensics Education & Training., 6-7 Sep 2012, Canterbury Christ Church University, Canterbury, Kent, UK.

web application security

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2013) SQL injection attacks with the AMPA suite. International Journal of Electronic Security and Digital Forensics, 5 (2). pp. 139-160. ISSN 1751-911X (Print), 1751-9128 (Online) (doi:10.1504/IJESDF.2013.055051)

web attacks

Cecchini, Simone and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2012) The AMP attacker: a suite of tools for exploiting SQL injection vulnerabilities in web applications. In: Issues in cybercrime, security and digital forensics. University of Strathclyde Continuing Education Centre, Glasgow, UK, pp. 81-88. ISBN 978-0947649852

World wide web

Gresty, David, Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Ierotheou, Constantinos (2016) Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of internet history. Digital Investigation, 16 (Suppl.). S124-S133. ISSN 1742-2876 (doi:10.1016/j.diin.2016.01.015)

Worm containment

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A safeguard against fast self-propagating malware. In: Proceedings of the 6th International Conference on Communication and Network Security (ICCNS '16). ACM, New York, pp. 65-69. ISBN 978-1-4503-4783-9 (doi:10.1145/3017971.3017974)

Worm detection

Aminu Ahmad, Muhammad, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) Early containment of fast network worm malware. In: 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS). IEEE. ISBN 978-1-5090-2098-0 (doi:10.1109/NICS.2016.7725649)

Ahmad, Muhammad Aminu, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2016) A countermeasure mechanism for fast scanning malware. In: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, pp. 1-8. ISBN 978-1-5090-0710-3 (doi:10.1109/CyberSecPODS.2016.7502345)

Zeus banking malware

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2022) An investigation to detect banking malware network communication traffic using machine learning techniques. Journal of Cybersecurity and Privacy, 3 (1). pp. 1-23. ISSN 2624-800X (Online) (doi:10.3390/jcp3010001)

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2020) Comparing and analysing binary classification algorithms when used to detect the Zeus malware. In: 2019 Sixth HCT Information Technology Trends (ITT). Ras Al Khaimah, United Arab Emirates, 20-21 Nov. 2019. Information Technology Trends (ITT) . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 6-11. ISBN 978-1728150611; 978-1728150628 (doi:10.1109/ITT48889.2019.9075115)

Zeus malware variants

Kazi, Mohamed ORCID logoORCID: https://orcid.org/0000-0001-5105-3581, Woodhead, Steve and Gan, Diane ORCID logoORCID: https://orcid.org/0000-0002-0920-7572 (2022) An investigation to detect banking malware network communication traffic using machine learning techniques. Journal of Cybersecurity and Privacy, 3 (1). pp. 1-23. ISSN 2624-800X (Online) (doi:10.3390/jcp3010001)

This list was generated on Sun Dec 22 07:29:27 2024 UTC.