Diane Gan
Orcid: 0000-0002-0920-7572
According to our database1,
Diane Gan
authored at least 23 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Forensic Implication of a Cyber-Enabled Fraud Taking Advantage of an Offline Adversary-in-the-Middle (AiTM) Attack.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023
2022
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques.
J. Cybersecur. Priv., December, 2022
Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware.
Int. J. Grid Util. Comput., 2022
2021
Proceedings of the 44th International Convention on Information, 2021
2019
Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019
2018
IEEE Access, 2018
2017
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
2016
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history.
Digit. Investig., 2016
You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks.
IEEE Access, 2016
Proceedings of the 6th International Conference on Communication and Network Security, 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016
2015
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Future Internet, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
2009
Proceedings of the Information Security and Digital Forensics, 2009
1999
Comput. Commun., 1999