Harjinder Singh Lallie

Orcid: 0000-0002-1558-5115

Affiliations:
  • University of Warwick, Cyber Security Centre, WMG, Coventry, UK


According to our database1, Harjinder Singh Lallie authored at least 25 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure search scheme for encrypted data in the VANET cloud with random query trapdoor.
Inf. Secur. J. A Glob. Perspect., September, 2023

The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation.
Cogn. Technol. Work., August, 2023

Understanding Cyber Threats Against the Universities, Colleges, and Schools.
CoRR, 2023

An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers.
Comput. Secur., 2023

2022
A comprehensive survey on secure software-defined network for the Internet of Things.
Trans. Emerg. Telecommun. Technol., 2022

Measuring User Perceived Security of Mobile Banking Applications.
CoRR, 2022

Applying Artificial Intelligence for Age Estimation in Digital Forensic Investigations.
CoRR, 2022

2021
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
Comput. Secur., 2021

2020
Dashcam forensics: A preliminary analysis of 7 dashcam devices.
Digit. Investig., 2020

A review of attack graph and attack tree visual syntax in cyber security.
Comput. Sci. Rev., 2020

2019
Towards a standardised attack graph visual syntax.
PhD thesis, 2019

2018
An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception.
IEEE Trans. Inf. Forensics Secur., 2018

Evaluating practitioner cyber-security attack graph configuration preferences.
Comput. Secur., 2018

2014
The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence.
Future Internet, 2014

Digital Forensics to Intelligent Forensics.
Future Internet, 2014

The Conceptual Idea of Online Social Media Site (SMS) User Account Penetration Testing System.
CoRR, 2014

Where has this Hard Disk Been?: Extracting Geospatial Intelligence from Digital Storage Systems.
Proceedings of the Cyberpatterns, 2014

2012
An Overview of the Jumplist Configuration File in Windows 7.
J. Digit. Forensics Secur. Law, 2012

Challenges in applying the ACPO principles in cloud forensic investigations.
J. Digit. Forensics Secur. Law, 2012

An overview of the digital forensic investigation infrastructure of India.
Digit. Investig., 2012

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Using Digital Logs to Reduce Academic Misdemeanour by Students in Digital Forensic Assessments.
J. Inf. Technol. Educ. Innov. Pract., 2011

Windows 7 registry forensic evidence created by three popular BitTorrent clients.
Digit. Investig., 2011

A hash-based secure interface on plain connection.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011


  Loading...