Jill Slay
Orcid: 0000-0002-2352-8815Affiliations:
- University of South Australia, Department of Science, Technology, Engineering and Mathematics, Adelaide, Australia
According to our database1,
Jill Slay
authored at least 91 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications.
IEEE Internet Things J., February, 2024
A threat intelligence framework for protecting smart satellite-based healthcare networks.
Neural Comput. Appl., January, 2024
IEEE Trans. Engineering Management, 2024
2022
Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2022
A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks.
Comput. Electr. Eng., 2022
2021
Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks.
IEEE Trans. Sustain. Comput., 2021
Int. J. Crit. Infrastructure Prot., 2021
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
2019
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks.
IEEE Trans. Big Data, 2019
J. Netw. Comput. Appl., 2019
2018
Proceedings of the Advances in Digital Forensics XIV, 2018
2017
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017
CoRR, 2017
CoRR, 2017
Proceedings of the 28th Annual Workshop of the Psychology of Programming Interest Group, 2017
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
2016
Inf. Secur. J. A Glob. Perspect., 2016
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set.
Inf. Secur. J. A Glob. Perspect., 2016
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors.
Int. J. Cyber Warf. Terror., 2016
2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set).
Proceedings of the 2015 Military Communications and Information Systems Conference, 2015
Evaluating the performance of a differential evolution algorithm in anomaly detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015
The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the Eleventh Australasian Information Security Conference, 2013
iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech.
J. Digit. Forensics Secur. Law, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM.
J. Digit. Forensics Secur. Law, 2011
Scientific underpinnings and background to standards and accreditation in digital forensics.
Digit. Investig., 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
A new approach to developing attack taxonomies for network security - including case studies.
Proceedings of the 17th IEEE International Conference on Networks, 2011
Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility.
Proceedings of the Sixth International Conference on Availability, 2011
Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Computer Forensic Function Testing: Media Preparation, Write Protection And Verification.
J. Digit. Forensics Secur. Law, 2010
J. Digit. Forensic Pract., 2010
Achieving critical infrastructure protection through the interaction of computer security and network forensics.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the ARES 2010, 2010
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation.
Proceedings of the ARES 2010, 2010
A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools.
Proceedings of the ARES 2010, 2010
2009
Inf. Secur. Tech. Rep., 2009
Int. J. Digit. Crime Forensics, 2009
Validation and verification of computer forensic software tools - Searching Function.
Digit. Investig., 2009
Proceedings of the Advances in Digital Forensics V, 2009
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.
Proceedings of the Forensics in Telecommunications, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications.
J. Digit. Forensics Secur. Law, 2008
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
Proceedings of the The Third International Conference on Availability, 2008
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
Proceedings of the The Third International Conference on Availability, 2008
2007
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence.
J. Digit. Forensics Secur. Law, 2007
Forensic Computing Training, Certification and Accreditation: An Australian Overview.
Proceedings of the Fifth World Conference on Information Security Education, 2007
Proceedings of the Critical Infrastructure Protection, 2007
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
2006
J. Digit. Forensics Secur. Law, 2006
An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006
Proceedings of the Australasian Conference on Information Systems, 2006
2005
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005
Proceedings of the Advances in Digital Forensics, 2005
Towards A Validation Framework for Forensic Computing Tools in Australia.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
Googling Forensics.
Proceedings of 3rd Australian Computer, 2005
Non-Repudiation in Pure Mobile Ad Hoc Network.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Information Security Management, Education and Privacy, 2004
A Formal Model for the Relationship between Culture and Trust within is Security Management.
Proceedings of the 2nd Australian Information Security Management Conference, 2004
2003
A Business Process Engineering Based Approach Towards Incorporating Security in the Design of Global Information Systems.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003
2002
Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings.
J. Educ. Technol. Soc., 2002
The Role Of Culture In the Development of Global E-Commerce Systems.
Proceedings of the Information Systems: The e-Business Challenge, 2002
Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science.
Proceedings of the TelE-Learning: the Challenge for the Third Millennium, IFIP 17<sup>th</sup> World Computer Congress, 2002
2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
1998
Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment.
Proceedings of the Teleteaching '98 - Distance Learning, 1998