image

  • Lallie, H. S., Debattista, K., & Bal, J. (2019). A Review of Attack Graph Visual Syntax. Computer Science Reviews (Elsevier), Vol 35, issue 1
  • Lallie, H.S., Dashcam Forensics: Dashcam forensics: A preliminary analysis of 7 dashcam devices (2020), 33(1), June 2020.  The dataset accompanying this paper can be downloaded from here: https://bit.ly/388dUY7
  • Lallie, H. S., Debattista, K., Bal, J. (2018). Evaluating Practitioner Attack Graph Configuration Preferences. Computers and Security, 79(1), 117-131
  • Lallie, H. S., Debattista, K., & Bal, J. (2018). An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. IEEE Transactions on Information Forensics and Security, 13(5), 1110-1122.
  • Irons, A., Lallie, H.S., (2014), Digital Forensics to Intelligent Forensics, Future Forensics, available http://www.mdpi.com/1999-5903/6/3/584
  • Chockalingam, S., Lallie, H.S., (2014), Alarming! Security Aspects of the Wireless Vehicle: Review, International Journal of Cyber-Security and Digital Forensics, Vol 2, Issue 4, pp200-208 available: http://sdiwc.us/digitlib/journal_paper.php?paper=00001138.pdf
  • Chockalingam, S., Lallie, H.S., (2014), Conceptual Idea of Online SMS User Account Penetration Testing, International Journal of Security, Privacy, and Trust Management, available http://airccse.org/journal/ijsptm/current2014.html
  • Lallie H.S., Griffiths N., (2014), Where Has This Hard Disk Been? Extracting Geospatial Intelligence from Digital Storage Systems, in Blackwell and Zhu (ed). Unifying Design Patterns with Security Attack and Forensic Patterns, Springer, London, UK, pp247-258, available: http://lallie.co.uk/wp-content/uploads/2014/12/Where-has-this-hard-disk-been.pdf
  • Lallie, H.S., (2014), The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence, Future Internet (special edition: Contemporary and Future Digital Forensics), http://www.mdpi.com/journal/futureinternet/special_issues/digital-forensics
  • Lallie, H.S., (2013), External Validity and Referential Ambiguity in Geospatial Patterns, Second International workshop on Cyber-patterns, Unifying Design Patterns with Security Attack and Forensic Patterns, 8-9 July 2013, Oxford Brookes University available (http://lallie.co.uk/wp-content/uploads/2015/02/Lallie-2013-External-Validity-and-Referential-Ambiguity-in-Geospatial-Patterns.pdf)
  • Lallie H.S., Chen, Y., (2013), GeoTract: Issues in Pattern Matching Geospatial Data on Digital Storage Systems, 3rd International Conference on Cybercrime, Security and Digital Forensics, 10-11 June, University of Cardiff, available: http://lallie.co.uk/wp-content/uploads/2014/12/Lallie-and-Chen-2013-GeoTract_Issues-in-Pattern-Matching-Geospatial-Data-on-Digital-Storage-Systems.pdf
  • Ghoshal, N., Goswami, A., Lallie, H., (2012), Adaptive Steganography for Image Authentication based on Chromatic Property (ASIACP), The International Conference on Frontiers in Intelligent Computing Theory and Applications (FICTA), 22-23 December, 2012. Bhubaneswar Engineering College, Orissa, India. Available: http://lallie.co.uk/wp-content/uploads/2014/12/Adaptive-Data-Hiding-for-Image-Authentication-based-on-Chromatic-Property-ADHIACP.pdf
  • Middleton, R., D., Day D.J., Lallie H., (2012), Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries, The IEEE International Conference on Internet of Things (November 20-23, 2012 Besançon, France)
  • Day, David, Flores, Denys, and Lallie, Harjinder, Singh (2012). CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. In: Third International Symposium on Mobile and Wireless Network Security (MWNS-12) in conjunction with TrustCom 2012: The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 25-27th June 2012.  IEEE Computer Society
  • Lallie H., Pimlott, L., (2012), Challenges in applying the ACPO principles to Cloud forensic Investigations, Journal of Digital Forensics Security and Law, Vol 7, Number 1, 2012
  • Lallie H., Bains P., (2012), An Overview of the Jumplist Configuration File in Windows 7, Journal of Digital Forensics, Security and Law, Vol 7, Number 1, 2012
  • Lallie H.S., Benford D., (2012), Challenging the Reliability of iPhone Geo-Tags, The International Journal of Forensic Computer Science [available online at: http://www.ijofcs.org/abstract-v06n1-pp04.html]
  • Lallie H.S., (2012), An Overview of the Digital Forensics Infrastructure of India, The International Journal of Digital Forensics & Incident Response [Published online on 1st March 2012: http://dx.doi.org/10.1016/j.diin.2012.02.2002]
  • Liu, Z., Lallie, H.S., Liu, L., A Hash-based Secure Interface on Plain Connection, 6th International ICST Conference on Communications and Networking in China, August 17-19, 2011, Harbin, China
  • Lallie H., (2010), Developing Usable hard disk images for Forensic training, education and research, 4th International Conference on Cybercrime Forensics Education and Training, Canterbury Christchurch University, available (http://lallie.co.uk/wp-content/uploads/2014/12/Developing-Usable-Digital-Investigation-Case-Studies.pdf)
  • Lallie H., Briggs P., (2010), Windows 7 Registry Forensic Evidence Created by Three Popular BitTorrent Clients, The International Journal of Digital Forensics & Incident Response (March 2011)
  • Mahmood Z., Lallie H., Cloud Computing: Issues in Data availability and Privacy, The First International Workshop for Innovative Methods for Intrusion Prevention and Detection Systems Gosier, Guadeloupe, France (March 2011) available (http://lallie.co.uk/wp-content/uploads/2015/02/Cloud-ComputingIssues-in-Data-Mobility-and-Security.pdf)
  • Ma, Minhua, H. Zheng, and H. Lallie, (2010), Virtual Reality and 3D Animation in Forensic Visualisation. Journal of Forensic Sciences, 55(5), 1227-1231, September 2010, Wiley: Malden, USA

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply