Search Results - "Hannay, Peter"
-
1
Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions
Published in Computers (Basel) (01-04-2023)“…Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains such as smart grid, healthcare, the military, and…”
Get full text
Journal Article -
2
Preparing for Secure Wireless Medical Environment in 2050: A Vision
Published in IEEE access (01-01-2018)“…The world is on the verge of a technological evolution that will revolutionize Internet access across the globe using direct device-to-satellite links. Such…”
Get full text
Journal Article -
3
Kindle Forensics: Acquisition & Analysis
Published in The journal of digital forensics, security and law (01-01-2011)“…The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection…”
Get full text
Journal Article -
4
-
5
On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers
Published in IEEE transactions on information forensics and security (01-03-2016)“…The 802.11 active service discovery mechanism requires the transmission of various attributes in a plain text. These attributes can be collected using passive…”
Get full text
Journal Article -
6
Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges
Published in 2016 49th Hawaii International Conference on System Sciences (HICSS) (01-01-2016)“…We discuss the use of selected passive wireless device fingerprinting and prior location inference techniques from a forensic perspective. With specific focus…”
Get full text
Conference Proceeding Journal Article -
7
Future challenges for smart cities: Cyber-security and digital forensics
Published in Digital investigation (01-09-2017)“…Smart cities are comprised of diverse and interconnected components constantly exchanging data and facilitating improved living for a nation's population. Our…”
Get full text
Journal Article -
8
Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone
Published in The journal of digital forensics, security and law (01-01-2018)“…Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical…”
Get full text
Journal Article -
9
Using Traffic Analysis to Identify the Second Generation Onion Router
Published in 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing (01-10-2011)“…Anonymous networks provide security for users by obfuscating messages with encryption and hiding communications amongst cover traffic provided by other network…”
Get full text
Conference Proceeding -
10
OUR COLONIAL TROOPS: A SUGGESTION.; [TO THE EDITOR OF THE "SPECTATOR"]
Published in The Spectator (London. 1828) (09-06-1900)Get full text
Magazine Article