Diane Gan

Orcid: 0000-0002-0920-7572

According to our database1, Diane Gan authored at least 23 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Forensic Implication of a Cyber-Enabled Fraud Taking Advantage of an Offline Adversary-in-the-Middle (AiTM) Attack.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

2022
An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques.
J. Cybersecur. Priv., December, 2022

Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware.
Int. J. Grid Util. Comput., 2022

2021
Have You Been Framed and Can You Prove It?
Proceedings of the 44th International Convention on Information, 2021

2019
Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

2018
Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning.
IEEE Access, 2018

2017
An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2016
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history.
Digit. Investig., 2016

You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks.
IEEE Access, 2016

A Safeguard against Fast Self-propagating Malware.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A countermeasure mechanism for fast scanning malware.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Behaviour-Based Anomaly Detection of Cyber-Physical Attacks on a Robotic Vehicle.
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016

2015
Social Networking Privacy - Who's Stalking You?
Future Internet, 2015

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Physical indicators of cyber attacks against a rescue robot.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
SQL injection attacks with the AMPA suite.
Int. J. Electron. Secur. Digit. Forensics, 2013

A Review of Cyber Threats and Defence Approaches in Emergency Management.
Future Internet, 2013

A taxonomy of cyber attack and defence mechanisms for emergency management networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

2009
Technology Perspective: Is Green IT a Threat to IT Security?
Proceedings of the Information Security and Digital Forensics, 2009

1999
Traffic policing in ATM networks with multimedia traffic: the super leaky bucket.
Comput. Commun., 1999


  Loading...