Craig Valli

Orcid: 0000-0002-2298-9791

According to our database1, Craig Valli authored at least 64 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception.
J. Comput. Virol. Hacking Tech., November, 2023

2022
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Biometrics for Internet-of-Things Security: A Review.
Sensors, 2021

Digital Forensic Readiness Implementation in SDN: Issues and Challenges.
CoRR, 2021

A Review of Security Standards and Frameworks for IoT-Based Smart Environments.
IEEE Access, 2021

Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry".
IEEE Access, 2021

Advanced Cowrie Configuration to Increase Honeypot Deceptiveness.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
Denial of service attack detection through machine learning for the IoT.
J. Inf. Telecommun., 2020

2019
Correction to: A security review of local government using NIST CSF: a case study.
J. Supercomput., 2019

Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices.
IEEE J. Biomed. Health Informatics, 2019

Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram.
IEEE Trans. Ind. Informatics, 2019

Security and Accuracy of Fingerprint-Based Biometrics: A Review.
Symmetry, 2019

A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
Sensors, 2019

Impact of feature proportion on matching performance of multi-biometric systems.
ICT Express, 2019

A Privacy-Preserving Lightweight Biometric System for Internet of Things Security.
IEEE Commun. Mag., 2019

Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations.
IEEE Access, 2019

2018
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures.
J. Supercomput., 2018

A security review of local government using NIST CSF: a case study.
J. Supercomput., 2018

A fingerprint and finger-vein based cancelable multi-biometric system.
Pattern Recognit., 2018

Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem.
IEEE Access, 2018

Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry.
IEEE Access, 2018

POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia.
Proceedings of the 12th International Symposium on Medical Information and Communication Technology, 2018

2017
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One.
IEEE Trans. Inf. Forensics Secur., 2017

Future challenges for smart cities: Cyber-security and digital forensics.
Digit. Investig., 2017

Application of 3D Delaunay Triangulation in Fingerprint Authentication System.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments.
Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, 2017

Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

An Exploration of Some Security Issues Within the BACnet Protocol.
Proceedings of the Information Systems Security and Privacy, 2017

Security Issues with BACnet Value Handling.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers.
IEEE Trans. Inf. Forensics Secur., 2016

Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2012
The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues
CoRR, 2012

SSH - Somewhat Secure Host.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2010
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity.
J. Digit. Forensics Secur. Law, 2010

The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2010

Malware Forensics: Discovery of the Intent of Deception.
J. Digit. Forensics Secur. Law, 2010

Ignorant Experts: Computer and Network Security Support from Internet Service Providers.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Developing VoIP Router Honeypots.
Proceedings of the 2010 International Conference on Security & Management, 2010

Geotagging Where Cyberspace Comes to Your Place.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective.
J. Digit. Forensics Secur. Law, 2009

Visualisation of Honeypot Data Using Graphviz and Afterglow.
J. Digit. Forensics Secur. Law, 2009

SCADA Security - Slowly Circling a Disaster Area.
Proceedings of the 2009 International Conference on Security & Management, 2009

Snort IDS for SCADA Networks.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008

The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2008

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Honeypot technologies and their applicability as a strategic internal countermeasure.
Int. J. Inf. Comput. Secur., 2007

IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients.
J. Digit. Forensics Secur. Law, 2006

The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
J. Digit. Forensics Secur. Law, 2006

SQL Injection - Threats to Medical Systems: The Issues and Countermeasures.
Proceedings of the 2006 International Conference on Security & Management, 2006

The Insider Threat to Medical Records; Has the Network Age Changed Anything?
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

An investigation into long range detection of passive UHF RFID tags.
Proceedings of 3rd Australian Computer, 2005

An investigation into the efficiency of forensic erasure tools for hard disk mechanisms.
Proceedings of 3rd Australian Computer, 2005

A UK and Australian Study of Hard Disk Disposal.
Proceedings of 3rd Australian Computer, 2005

Honeypot technologies and their applicability as an internal countermeasure.
Proceedings of 3rd Australian Computer, 2005

After Conversation - An Forensic ICQ Logfile Extraction Tool.
Proceedings of 3rd Australian Computer, 2005

2004
Non-business use of the WWW in three Western Australian organisations.
Internet Res., 2004

802.11b Wireless Networks Insecure at Any Speed.
Proceedings of the International Conference on Security and Management, 2004

Throwing out the Enterprise with the Hard Disk.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004

Wireless Snort - A WIDS in progress.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004

2003
Honeyd - A OS Fingerprinting Artifice.
Proceedings of the 1st Australian Computer, 2003


  Loading...