default search action
Craig Valli
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j32]Leslie F. Sikos, Craig Valli, Alexander E. Grojek, David J. Holmes, Samuel G. Wakeling, Warren Z. Cabral, Nickson M. Karie:
CamDec: Advancing Axis P1435-LE video camera security using honeypot-based deception. J. Comput. Virol. Hacking Tech. 19(4): 565-577 (2023) - 2022
- [c30]Warren Z. Cabral, Leslie F. Sikos, Craig Valli:
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization. DSC 2022: 1-7 - 2021
- [j31]Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli:
Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry". IEEE Access 9: 79628 (2021) - [j30]Nickson M. Karie, Nor Masri Sahri, Wencheng Yang, Craig Valli, Victor R. Kebande:
A Review of Security Standards and Frameworks for IoT-Based Smart Environments. IEEE Access 9: 121975-121995 (2021) - [j29]Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, Craig Valli:
Biometrics for Internet-of-Things Security: A Review. Sensors 21(18): 6163 (2021) - [c29]Warren Z. Cabral, Craig Valli, Leslie F. Sikos, Samuel G. Wakeling:
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness. SEC 2021: 317-331 - [i2]Nickson M. Karie, Craig Valli:
Digital Forensic Readiness Implementation in SDN: Issues and Challenges. CoRR abs/2107.13759 (2021) - 2020
- [j28]Naeem Firdous Syed, Zubair A. Baig, Ahmed Ibrahim, Craig Valli:
Denial of service attack detection through machine learning for the IoT. J. Inf. Telecommun. 4(4): 482-503 (2020)
2010 – 2019
- 2019
- [j27]Guanglou Zheng, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, Li Qiao:
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access 7: 75629-75641 (2019) - [j26]Wencheng Yang, Song Wang, Guanglou Zheng, Jucheng Yang, Craig Valli:
A Privacy-Preserving Lightweight Biometric System for Internet of Things Security. IEEE Commun. Mag. 57(3): 84-89 (2019) - [j25]Wencheng Yang, Song Wang, Guanglou Zheng, Craig Valli:
Impact of feature proportion on matching performance of multi-biometric systems. ICT Express 5(1): 37-40 (2019) - [j24]Wencheng Yang, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone, Craig Valli:
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors 19(13): 2985 (2019) - [j23]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Craig Valli:
Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry 11(2): 141 (2019) - [j22]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Jucheng Yang, Craig Valli:
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram. IEEE Trans. Ind. Informatics 15(7): 4244-4253 (2019) - [j21]Guanglou Zheng, Wencheng Yang, Craig Valli, Li Qiao, Rajan Shankaran, Mehmet A. Orgun, Subhas Chandra Mukhopadhyay:
Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices. IEEE J. Biomed. Health Informatics 23(4): 1546-1557 (2019) - [j20]Ahmed Ibrahim, Craig Valli, Ian McAteer, Junaid Chaudhry:
Correction to: A security review of local government using NIST CSF: a case study. J. Supercomput. 75(9): 6158 (2019) - 2018
- [j19]Hina Abrar, Syed Jawad Hussain, Junaid Ahsenali Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli:
Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access 6: 19140-19150 (2018) - [j18]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Ahsenali Chaudhry, Erwin Adi, Craig Valli:
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem. IEEE Access 6: 36939-36947 (2018) - [j17]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Craig Valli:
A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit. 78: 242-251 (2018) - [j16]Wencheng Yang, Song Wang, Guanglou Zheng, Junaid Ahsenali Chaudhry, Craig Valli:
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures. J. Supercomput. 74(10): 4893-4909 (2018) - [j15]Ahmed Ibrahim, Craig Valli, Ian McAteer, Junaid Ahsenali Chaudhry:
A security review of local government using NIST CSF: a case study. J. Supercomput. 74(10): 5171-5186 (2018) - [c28]Junaid Chaudhry, Craig Valli, Michael Crowley, Jon Haass, Peter Roberts:
POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia. ISMICT 2018: 1-10 - 2017
- [j14]Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya Rabadia, Peter Hannay, Maxim Chernyshev, Mike Johnstone, Paresh Kerai, Ahmed Ibrahim, Krishnun Sansurooah, Syed Naeem Firdous, Matthew Peacock:
Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investig. 22: 3-13 (2017) - [j13]Maxim Chernyshev, Craig Valli, Michael N. Johnstone:
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Trans. Inf. Forensics Secur. 12(7): 1625-1636 (2017) - [c27]Matthew Peacock, Michael N. Johnstone, Craig Valli:
An Exploration of Some Security Issues Within the BACnet Protocol. ICISSP (Revised Selected Papers) 2017: 252-272 - [c26]Matthew Peacock, Michael N. Johnstone, Craig Valli:
Security Issues with BACnet Value Handling. ICISSP 2017: 546-552 - [c25]Guanglou Zheng, Guanghe Zhang, Wencheng Yang, Craig Valli, Rajan Shankaran, Mehmet A. Orgun:
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices. ISCIT 2017: 1-5 - [c24]Syed Naeem Firdous, Zubair A. Baig, Craig Valli, Ahmed Ibrahim:
Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. iThings/GreenCom/CPSCom/SmartData 2017: 748-755 - [c23]Junaid Ahsenali Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, Craig Valli:
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. LCN Workshops 2017: 121-127 - [c22]Wencheng Yang, Guanglou Zheng, Ahmed Ibrahim, Junaid Ahsenali Chaudhry, Song Wang, Jiankun Hu, Craig Valli:
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. MONAMI 2017: 291-298 - 2016
- [j12]Maxim Chernyshev, Craig Valli, Peter Hannay:
On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Trans. Inf. Forensics Secur. 11(3): 584-593 (2016) - [c21]Maxim Chernyshev, Craig Valli, Peter Hannay:
Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges. HICSS 2016: 5487-5496 - 2012
- [c20]Craig Valli:
SSH - Somewhat Secure Host. CSS 2012: 227-235 - [i1]Craig Valli, Andrew Woodward:
The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues. CoRR abs/1207.6025 (2012) - 2010
- [j11]Craig Valli:
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. J. Digit. Forensics Secur. Law 5(2): 35-44 (2010) - [j10]Murray Brand, Craig Valli, Andrew Woodward:
Malware Forensics: Discovery of the Intent of Deception. J. Digit. Forensics Secur. Law 5(4): 31-42 (2010) - [j9]Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies:
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 5(4): 43-64 (2010) - [c19]Craig Valli, Mohammed Al Lawati:
Developing VoIP Router Honeypots. Security and Management 2010: 615-619 - [c18]Craig Valli, Peter Hannay:
Geotagging Where Cyberspace Comes to Your Place. Security and Management 2010: 627-632 - [c17]Patryk Szewczyk, Craig Valli:
Ignorant Experts: Computer and Network Security Support from Internet Service Providers. NSS 2010: 323-327 - [e4]Hamid R. Arabnia, Kevin Daimi, Michael R. Grimaila, George Markowsky, Selim Aissi, Victor A. Clincy, Leonidas Deligiannidis, Donara Gabrielyan, Gevorg Margarov, Ashu M. G. Solo, Craig Valli, Patricia A. H. Williams:
Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2010, ISBN 1-60132-163-5 [contents]
2000 – 2009
- 2009
- [j8]Craig Valli:
Visualisation of Honeypot Data Using Graphviz and Afterglow. J. Digit. Forensics Secur. Law 4(2): 27-38 (2009) - [j7]Craig Valli, Patryk Szewczyk:
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. J. Digit. Forensics Secur. Law 4(3): 5-16 (2009) - [c16]Craig Valli, Andrew Woodward:
SCADA Security - Slowly Circling a Disaster Area. Security and Management 2009: 613-617 - [c15]Craig Valli:
Snort IDS for SCADA Networks. Security and Management 2009: 618-621 - 2008
- [j6]Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland:
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 3(1): 5-24 (2008) - [j5]Andy Jones, Craig Valli, Iain Sutherland:
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 3(2): 55-70 (2008) - [c14]Craig Valli, Andy Jones:
A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. Security and Management 2008: 604-607 - 2007
- [j4]Craig Valli:
Honeypot technologies and their applicability as a strategic internal countermeasure. Int. J. Inf. Comput. Secur. 1(4): 430-436 (2007) - [c13]Craig Valli:
IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems. Security and Management 2007: 506-509 - 2006
- [j3]Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas:
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 1(3): 23-36 (2006) - [j2]Kim Morfitt, Craig Valli:
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients. J. Digit. Forensics Secur. Law 1(3): 51-64 (2006) - [c12]Craig Valli:
The Insider Threat to Medical Records; Has the Network Age Changed Anything? Security and Management 2006: 410-414 - [c11]Craig Valli:
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures. Security and Management 2006: 421-425 - 2005
- [c10]Kim Morfitt, Craig Valli:
After Conversation - An Forensic ICQ Logfile Extraction Tool. Australian Computer, Network & Information Forensics Conference 2005: 54-61 - [c9]Craig Valli:
Honeypot technologies and their applicability as an internal countermeasure. Australian Computer, Network & Information Forensics Conference 2005: 68-73 - [c8]Craig Valli, Andy Jones:
A UK and Australian Study of Hard Disk Disposal. Australian Computer, Network & Information Forensics Conference 2005: 74-78 - [c7]Craig Valli, Paul Patak:
An investigation into the efficiency of forensic erasure tools for hard disk mechanisms. Australian Computer, Network & Information Forensics Conference 2005: 79-83 - [c6]Craig Valli, Andrew Woodward, Ken Wild, Reino Karvinen:
An investigation into long range detection of passive UHF RFID tags. Australian Computer, Network & Information Forensics Conference 2005: 84-86 - [c5]Craig Valli:
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices. ECIW 2005: 363-368 - [e3]Craig Valli, Andrew Woodward:
Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005. School of Computer and Information Science, Edith Cowan University, Western Australia 2005, ISBN 0-7298-0611-1 [contents] - [e2]Craig Valli, Andrew Woodward:
Proceedings of 3rd Australian Computer, Network & Information Forensics Conference, 2005, Perth, Western Australia. School of Computer and Information Science, Edith Cowan University, Western Australia 2005, ISBN 0-7298-0612-X [contents] - 2004
- [j1]Craig Valli:
Non-business use of the WWW in three Western Australian organisations. Internet Res. 14(5): 353-359 (2004) - [c4]Craig Valli:
Wireless Snort - A WIDS in progress. Australian Computer, Network & Information Forensics Conference 2004: 112-116 - [c3]Craig Valli:
Throwing out the Enterprise with the Hard Disk. Australian Computer, Network & Information Forensics Conference 2004: 124-129 - [c2]Craig Valli, Peter Wolski:
802.11b Wireless Networks Insecure at Any Speed. Security and Management 2004: 154-158 - 2003
- [c1]Craig Valli:
Honeyd - A OS Fingerprinting Artifice. Australian Computer, Network & Information Forensics Conference 2003 - [e1]Craig Valli, Matt Warren:
1st Australian Computer, Network & Information Forensics Conference, 25 November 2003, Perth, Western Australia. School of Computer and Information Science, Edith Cowan University, Western Australia 2003, ISBN 0-7298-0542-5 [contents]
Coauthor Index
aka: Junaid Ahsenali Chaudhry
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint