Spremljaj
Harjinder Singh Lallie
Harjinder Singh Lallie
University Reader (Cyber Security), University of Warwick
Preverjeni e-poštni naslov na warwick.ac.uk
Naslov
Navedeno
Navedeno
Leto
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & security 105, 102248, 2021
8522021
A review of attack graph and attack tree visual syntax in cyber security
HS Lallie, K Debattista, J Bal
Computer Science Review 35, 100219, 2020
2382020
Security factors on the intention to use mobile banking applications in the UK older generation (55+). A mixed-method study using modified UTAUT and MTAM-with perceived cyber …
Y Hanif, HS Lallie
Technology in Society 67, 101693, 2021
1322021
Virtual reality and 3D animation in forensic visualization
M Ma, H Zheng, H Lallie
Journal of forensic sciences 55 (5), 1227-1231, 2010
1232010
Digital forensics to intelligent forensics
A Irons, HS Lallie
Future Internet 6 (3), 584-596, 2014
1092014
An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception
HS Lallie, K Debattista, J Bal
IEEE Transactions on Information Forensics and Security 13 (5), 1110-1122, 2017
762017
Measuring user perceived security of mobile banking applications
R Apaua, HS Lallie
arXiv preprint arXiv:2201.03052, 2022
222022
Windows 7 registry forensic evidence created by three popular BitTorrent clients
HS Lallie, PJ Briggs
Digital Investigation 7 (3-4), 127-134, 2011
212011
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed
Internet of Things 27, 101227, 2024
192024
Dashcam forensics: A preliminary analysis of 7 dashcam devices
HS Lallie
Forensic Science International: Digital Investigation 33, 200910, 2020
192020
Evaluating practitioner cyber-security attack graph configuration preferences
HS Lallie, K Debattista, J Bal
Computers & Security 79, 117-131, 2018
182018
Challenges in applying the ACPO principles to Cloud forensic Investigations
H Lallie, L Pimlott
Journal of Digital Forensics Security and Law 7 (1), 2012
17*2012
A Hash-based Secure Interface on Plain Connection
Z Liu, H Lallie, L Liu
6th International ICST Conference on Communications and Networking, 2011
172011
The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation
D Lee, HS Lallie, N Michaelides
Cognition, Technology & Work 25 (2), 273-289, 2023
162023
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie
Computers & Security 130, 103254, 2023
162023
Applying artificial intelligence for age estimation in digital forensic investigations
T Grubl, HS Lallie
arXiv preprint arXiv:2201.03045, 2022
112022
CONDOR: A hybrid ids to offer improved intrusion detection
DJ Day, DA Flores, HS Lallie
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
112012
Challenging the Reliability of iPhone-Geo-tags
H Lallie, D Benford
The International Journal of Forensic Computer Science 6 (1), 59-67, 2011
102011
Blockchain Forensics: A Systematic Literature Review of Techniques, Applications, Challenges, and Future Directions
HF Atlam, N Ekuri, MA Azad, HS Lallie
Electronics 13 (17), 3568, 2024
92024
Understanding Cyber Threats Against the Universities, Colleges, and Schools
HS Lallie, A Thompson, E Titis, P Stephens
arXiv preprint arXiv:2307.07755, 2023
72023
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20