Richard Macfarlane

Orcid: 0000-0002-5325-2872

According to our database1, Richard Macfarlane authored at least 17 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation.
Forensic Sci. Int. Digit. Investig., September, 2023

Majority Voting Approach to Ransomware Detection.
CoRR, 2023

2022
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.
Entropy, 2022

NapierOne: A modern mixed file data set alternative to Govdocs1.
Digit. Investig., 2022

2021
Differential area analysis for ransomware attack detection within mixed file datasets.
Comput. Secur., 2021

2020
Evaluation of live forensic techniques in ransomware attack mitigation.
Digit. Investig., 2020

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction.
CoRR, 2020

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Identifying Vulnerabilities Using Internet-Wide Scanning Data.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2018
Distance Measurement Methods for Improved Insider Threat Detection.
Secur. Commun. Networks, 2018

Privacy Parameter Variation Using RAPPOR on a Malware Dataset.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
A methodology for the security evaluation within third-party Android Marketplaces.
Digit. Investig., 2017

2016
Evaluation of TFTP DDoS amplification attack.
Comput. Secur., 2016

2015
Fast contraband detection in large capacity disk drives.
Digit. Investig., 2015

2013
Approaches to the classification of high entropy file fragments.
Digit. Investig., 2013

2012
Formal security policy implementations in network firewalls.
Comput. Secur., 2012

Security Issues of a Publicly Accessible Cloud Computing Infrastructure.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...