Peter Hannay
Orcid: 0000-0002-6570-0441
According to our database1,
Peter Hannay
authored at least 17 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions.
Comput., April, 2023
2018
J. Digit. Forensics Secur. Law, 2018
IEEE Access, 2018
2017
Digit. Investig., 2017
2016
On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers.
IEEE Trans. Inf. Forensics Secur., 2016
Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Proceedings of the Internet of Things. IoT Infrastructures, 2015
2011
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
2010
Geotagging Where Cyberspace Comes to Your Place.
Proceedings of the 2010 International Conference on Security & Management, 2010
The 2010 IDN Homograph Attack Mitigation Survey.
Proceedings of the 2010 International Conference on Security & Management, 2010
Using Traffic Analysis to Identify Tor Usage - A Proposed Study.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
Firewire Forensics in Modern Operating Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009
Fun & Games: An Introduction to Console Forensics.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP.
Proceedings of the 2008 International Conference on Security & Management, 2008
Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims.
Proceedings of the 2008 International Conference on Security & Management, 2008