Craig Valli
Orcid: 0000-0002-2298-9791
According to our database1,
Craig Valli
authored at least 64 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception.
J. Comput. Virol. Hacking Tech., November, 2023
2022
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
IEEE Access, 2021
Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry".
IEEE Access, 2021
Proceedings of the ICT Systems Security and Privacy Protection, 2021
2020
J. Inf. Telecommun., 2020
2019
J. Supercomput., 2019
IEEE J. Biomed. Health Informatics, 2019
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram.
IEEE Trans. Ind. Informatics, 2019
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
Sensors, 2019
ICT Express, 2019
IEEE Commun. Mag., 2019
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.
IEEE Access, 2019
2018
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures.
J. Supercomput., 2018
J. Supercomput., 2018
Pattern Recognit., 2018
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem.
IEEE Access, 2018
IEEE Access, 2018
POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia.
Proceedings of the 12th International Symposium on Medical Information and Communication Technology, 2018
2017
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One.
IEEE Trans. Inf. Forensics Secur., 2017
Digit. Investig., 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments.
Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
Proceedings of the Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers.
IEEE Trans. Inf. Forensics Secur., 2016
Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2012
The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues
CoRR, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2010
J. Digit. Forensics Secur. Law, 2010
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2010
J. Digit. Forensics Secur. Law, 2010
Ignorant Experts: Computer and Network Security Support from Internet Service Providers.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Developing VoIP Router Honeypots.
Proceedings of the 2010 International Conference on Security & Management, 2010
Geotagging Where Cyberspace Comes to Your Place.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective.
J. Digit. Forensics Secur. Law, 2009
J. Digit. Forensics Secur. Law, 2009
SCADA Security - Slowly Circling a Disaster Area.
Proceedings of the 2009 International Conference on Security & Management, 2009
Snort IDS for SCADA Networks.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008
A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Honeypot technologies and their applicability as a strategic internal countermeasure.
Int. J. Inf. Comput. Secur., 2007
IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
J. Digit. Forensics Secur. Law, 2006
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2006
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures.
Proceedings of the 2006 International Conference on Security & Management, 2006
The Insider Threat to Medical Records; Has the Network Age Changed Anything?
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
An investigation into long range detection of passive UHF RFID tags.
Proceedings of 3rd Australian Computer, 2005
An investigation into the efficiency of forensic erasure tools for hard disk mechanisms.
Proceedings of 3rd Australian Computer, 2005
A UK and Australian Study of Hard Disk Disposal.
Proceedings of 3rd Australian Computer, 2005
Honeypot technologies and their applicability as an internal countermeasure.
Proceedings of 3rd Australian Computer, 2005
After Conversation - An Forensic ICQ Logfile Extraction Tool.
Proceedings of 3rd Australian Computer, 2005
2004
Internet Res., 2004
802.11b Wireless Networks Insecure at Any Speed.
Proceedings of the International Conference on Security and Management, 2004
Throwing out the Enterprise with the Hard Disk.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004
Wireless Snort - A WIDS in progress.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004
2003
Honeyd - A OS Fingerprinting Artifice.
Proceedings of the 1st Australian Computer, 2003