Peter Hannay

Orcid: 0000-0002-6570-0441

According to our database1, Peter Hannay authored at least 17 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions.
Comput., April, 2023

2018
Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone.
J. Digit. Forensics Secur. Law, 2018

Preparing for Secure Wireless Medical Environment in 2050: A Vision.
IEEE Access, 2018

2017
Future challenges for smart cities: Cyber-security and digital forensics.
Digit. Investig., 2017

2016
On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers.
IEEE Trans. Inf. Forensics Secur., 2016

Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Controlled Android Application Execution for the IoT Infrastructure.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

2011
Kindle Forensics: Acquisition & Analysis.
J. Digit. Forensics Secur. Law, 2011

Using Traffic Analysis to Identify the Second Generation Onion Router.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Geotagging Where Cyberspace Comes to Your Place.
Proceedings of the 2010 International Conference on Security & Management, 2010

The 2010 IDN Homograph Attack Mitigation Survey.
Proceedings of the 2010 International Conference on Security & Management, 2010

Using Traffic Analysis to Identify Tor Usage - A Proposed Study.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Freegate: A Defence against the Pending Censorship of Australia?.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

Firewire Forensics in Modern Operating Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009

Fun & Games: An Introduction to Console Forensics.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP.
Proceedings of the 2008 International Conference on Security & Management, 2008

Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims.
Proceedings of the 2008 International Conference on Security & Management, 2008


  Loading...