Digital forensics to intelligent forensics A Irons, HS Lallie Future Internet 6 (3), 584-596, 2014 | 55 | 2014 |
Virtual reality and 3D animation in forensic visualization M Ma, H Zheng, H Lallie Journal of forensic sciences 55 (5), 1227-1231, 2010 | 55 | 2010 |
Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... arXiv preprint arXiv:2006.11929, 2020 | 26 | 2020 |
An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception HS Lallie, K Debattista, J Bal IEEE Transactions on Information Forensics and Security 13 (5), 1110-1122, 2017 | 26 | 2017 |
Windows 7 registry forensic evidence created by three popular BitTorrent clients HS Lallie, PJ Briggs Digital investigation 7 (3-4), 127-134, 2011 | 20 | 2011 |
A Hash-based Secure Interface on Plain Connection Z Liu, H Lallie, L Liu 6th International ICST Conference on Communications and Networking, 2011 | 15 | 2011 |
A review of attack graph and attack tree visual syntax in cyber security HS Lallie, K Debattista, J Bal Computer Science Review 35, 100219, 2020 | 13 | 2020 |
Challenges in applying the ACPO principles to Cloud forensic Investigations H Lallie, L Pimlott Journal of Digital Forensics Security and Law 7 (1), 2012 | 13* | 2012 |
Condor: A hybrid IDS to offer improved intrusion detection DJ Day, DA Flores, HS Lallie 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 8 | 2012 |
Challenging the Reliability of iPhone-Geo-tags H Lallie, D Benford The International Journal of Forensic Computer Science 6 (1), 59-67, 2011 | 8 | 2011 |
Evaluating practitioner cyber-security attack graph configuration preferences HS Lallie, K Debattista, J Bal Computers & Security 79, 117-131, 2018 | 7 | 2018 |
Alarming! Security aspects of the wireless vehicle S Chockalingam, HS Lallie International Journal of Cyber-Security and Digital Forensics 3 (4), 200-208, 2014 | 6 | 2014 |
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. arXiv 2020 HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... arXiv preprint cs.CR/2006.11929, 0 | 6 | |
EMOTION IN SIKH MUSICOLOGY HS Lallie, S Kaur, K Singh Routledge, 2012 | 5 | 2012 |
An overview of the digital forensic investigation infrastructure of India HS Lallie Digital Investigation 9 (1), 3-7, 2012 | 4 | 2012 |
An Overview of the Jumplist Configuration File in Windows 7 H Lallie, P Bains Journal of Digital Forensics, Security and Law 7 (1), 2012 | 4 | 2012 |
Geospatial Crypto Reconnaissance: A Campus Self-Discovery Game HS Lallie Interdisciplinary Journal of e-Skills and Life Long Learning 11, 001-010, 2015 | 3 | 2015 |
Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries R Middleton, D Day, H Lallie The IEEE International Conference on Internet of Things, 2012 | 3 | 2012 |
Developing Usable hard disk images for Forensic training, education and research H Lallie 4th International Conference on Cybercrime Forensics Education and Training, 2010 | 3 | 2010 |
Where has this hard disk been?: Extracting geospatial intelligence from digital storage systems HS Lallie, N Griffiths Cyberpatterns, 247-255, 2014 | 2 | 2014 |