Jill Slay

Orcid: 0000-0002-2352-8815

Affiliations:
  • University of South Australia, Department of Science, Technology, Engineering and Mathematics, Adelaide, Australia


According to our database1, Jill Slay authored at least 89 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications.
IEEE Internet Things J., February, 2024

A threat intelligence framework for protecting smart satellite-based healthcare networks.
Neural Comput. Appl., January, 2024

2022
Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2022

A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks.
Comput. Electr. Eng., 2022

2021
Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks.
IEEE Trans. Sustain. Comput., 2021

On Edge Caching in Satellite - IoT Networks.
IEEE Internet Things Mag., 2021

Power systems resilience: Definition and taxonomy with a view towards metrics.
Int. J. Crit. Infrastructure Prot., 2021

Cyber terrorism: A homogenized taxonomy and definition.
Comput. Secur., 2021

Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial Networks.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

2019
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks.
IEEE Trans. Big Data, 2019

A holistic review of Network Anomaly Detection Systems: A comprehensive survey.
J. Netw. Comput. Appl., 2019

2018
A Network Forensic Scheme Using Correntropy-Variation for Attack Detection.
Proceedings of the Advances in Digital Forensics XIV, 2018

2017
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling.
J. Netw. Comput. Appl., 2017

RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis.
CoRR, 2017

Designing Privacy for You : A User Centric Approach For Privacy.
CoRR, 2017

A hybrid feature selection for network intrusion detection systems: Central points.
CoRR, 2017

Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs.
Proceedings of the 28th Annual Workshop of the Psychology of Programming Interest Group, 2017

Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
Harmonized taxonomies for security and resilience.
Inf. Secur. J. A Glob. Perspect., 2016

The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set.
Inf. Secur. J. A Glob. Perspect., 2016

SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors.
Int. J. Cyber Warf. Terror., 2016

2015
First responders actions to cope with volatile digital evidence.
Int. J. Electron. Secur. Digit. Forensics, 2015

Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set).
Proceedings of the 2015 Military Communications and Information Systems Conference, 2015

Evaluating the performance of a differential evolution algorithm in anomaly detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems.
Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2015

2014
Forensic Potentials of Solid State Drives.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

2013
Data Recovery from Proprietary Formatted Cctv Hard Disks.
Proceedings of the Advances in Digital Forensics IX, 2013

Digital Camcorder Forensics.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech.
J. Digit. Forensics Secur. Law, 2012

Visualizing Information in Digital Forensics.
Proceedings of the Advances in Digital Forensics VIII, 2012

Development of InfoVis Software for Digital Forensics.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM.
J. Digit. Forensics Secur. Law, 2011

Scientific underpinnings and background to standards and accreditation in digital forensics.
Digit. Investig., 2011

Extracting Evidence Related to VoIP Calls.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

A new approach to developing attack taxonomies for network security - including case studies.
Proceedings of the 17th IEEE International Conference on Networks, 2011

Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility.
Proceedings of the Sixth International Conference on Availability, 2011

Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Computer Forensic Function Testing: Media Preparation, Write Protection And Verification.
J. Digit. Forensics Secur. Law, 2010

Testing Forensic Copy Function of Computer Forensics Investigation Tools.
J. Digit. Forensic Pract., 2010

Achieving critical infrastructure protection through the interaction of computer security and network forensics.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Data Recovery Function Testing for Digital Forensic Tools.
Proceedings of the Advances in Digital Forensics VI, 2010

Recovery of Skype Application Activity Data from Physical Memory.
Proceedings of the ARES 2010, 2010

The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation.
Proceedings of the ARES 2010, 2010

A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools.
Proceedings of the ARES 2010, 2010

2009
Protecting clients from insider attacks on trust accounts.
Inf. Secur. Tech. Rep., 2009

Voice Over IP: Privacy and Forensic Implications.
Int. J. Digit. Crime Forensics, 2009

Validation and verification of computer forensic software tools - Searching Function.
Digit. Investig., 2009

Towards a Formalization of Digital Forensics.
Proceedings of the Advances in Digital Forensics V, 2009

The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.
Proceedings of the Forensics in Telecommunications, 2009

Enhancement of Forensic Computing Investigations through Memory Forensic Techniques.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications.
J. Digit. Forensics Secur. Law, 2008

Computer Forensics and Culture.
Proceedings of the Intelligence and Security Informatics, 2008

Extracting Evidence Using Google Desktop Search.
Proceedings of the Advances in Digital Forensics IV, 2008

Voice over IP forensics.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics.
Proceedings of the The Third International Conference on Availability, 2008

Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
Proceedings of the The Third International Conference on Availability, 2008

2007
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence.
J. Digit. Forensics Secur. Law, 2007

Forensic Computing Training, Certification and Accreditation: An Australian Overview.
Proceedings of the Fifth World Conference on Information Security Education, 2007

Lessons Learned from the Maroochy Water Breach.
Proceedings of the Critical Infrastructure Protection, 2007

Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

iPod Forensics: Forensically Sound Examination of an Apple iPod.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Digital Forensics: Validation and Verification in a Dynamic Work Environment.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Development of an Ontology Based Forensic Search Mechanism: Proof of Concept.
J. Digit. Forensics Secur. Law, 2006

Google Desktop as a Source of Digital Evidence.
Int. J. Digit. EVid., 2006

Computer Security Education and Research in Australia.
IEEE Secur. Priv., 2006

An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

2005
Digital Forensics: Exploring Validation, Verification and Certification.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Applying Filter Clusters to Reduce Search State Space.
Proceedings of the Advances in Digital Forensics, 2005

Towards A Validation Framework for Forensic Computing Tools in Australia.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Googling Forensics.
Proceedings of 3rd Australian Computer, 2005

Non-Repudiation in Pure Mobile Ad Hoc Network.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Doctor of Philosophy: IT Security.
Proceedings of the Information Security Management, Education and Privacy, 2004

A Formal Model for the Relationship between Culture and Trust within is Security Management.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

2003
A Business Process Engineering Based Approach Towards Incorporating Security in the Design of Global Information Systems.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

2002
Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings.
J. Educ. Technol. Soc., 2002

The Role Of Culture In the Development of Global E-Commerce Systems.
Proceedings of the Information Systems: The e-Business Challenge, 2002

Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science.
Proceedings of the TelE-Learning: the Challenge for the Third Millennium, IFIP 17<sup>th</sup> World Computer Congress, 2002

2001
Identifying Emerging Web-Communication Patterns Between Government and Citizens.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

1998
Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment.
Proceedings of the Teleteaching '98 - Distance Learning, 1998


  Loading...