关注
Harjinder Singh Lallie
Harjinder Singh Lallie
University Reader (Cyber Security), University of Warwick
在 warwick.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & security 105, 102248, 2021
7432021
A review of attack graph and attack tree visual syntax in cyber security
HS Lallie, K Debattista, J Bal
Computer Science Review 35, 100219, 2020
1922020
Virtual reality and 3D animation in forensic visualization
M Ma, H Zheng, H Lallie
Journal of forensic sciences 55 (5), 1227-1231, 2010
1102010
Digital forensics to intelligent forensics
A Irons, HS Lallie
Future Internet 6 (3), 584-596, 2014
1042014
Security factors on the intention to use mobile banking applications in the UK older generation (55+). A mixed-method study using modified UTAUT and MTAM-with perceived cyber …
Y Hanif, HS Lallie
Technology in Society 67, 101693, 2021
922021
An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception
HS Lallie, K Debattista, J Bal
IEEE Transactions on Information Forensics and Security 13 (5), 1110-1122, 2017
692017
Windows 7 registry forensic evidence created by three popular BitTorrent clients
HS Lallie, PJ Briggs
Digital Investigation 7 (3-4), 127-134, 2011
222011
Challenges in applying the ACPO principles to Cloud forensic Investigations
H Lallie, L Pimlott
Journal of Digital Forensics Security and Law 7 (1), 2012
18*2012
Evaluating practitioner cyber-security attack graph configuration preferences
HS Lallie, K Debattista, J Bal
Computers & Security 79, 117-131, 2018
172018
A Hash-based Secure Interface on Plain Connection
Z Liu, H Lallie, L Liu
6th International ICST Conference on Communications and Networking, 2011
162011
Dashcam forensics: A preliminary analysis of 7 dashcam devices
HS Lallie
Forensic Science International: Digital Investigation 33, 200910, 2020
132020
Measuring user perceived security of mobile banking applications
R Apaua, HS Lallie
arXiv preprint arXiv:2201.03052, 2022
112022
CONDOR: A hybrid ids to offer improved intrusion detection
DJ Day, DA Flores, HS Lallie
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
112012
Challenging the Reliability of iPhone-Geo-tags
H Lallie, D Benford
The International Journal of Forensic Computer Science 6 (1), 59-67, 2011
102011
Applying artificial intelligence for age estimation in digital forensic investigations
T Grubl, HS Lallie
arXiv preprint arXiv:2201.03045, 2022
82022
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie
Computers & Security 130, 103254, 2023
72023
EMOTION IN SIKH MUSICOLOGY
HS Lallie, S Kaur, K Singh
Routledge, 2012
72012
An overview of the digital forensic investigation infrastructure of India
HS Lallie
Digital Investigation 9 (1), 3-7, 2012
72012
Alarming! Security aspects of the wireless vehicle
S Chockalingam, HS Lallie
62014
Geospatial Crypto Reconnaissance: A Campus Self-Discovery Game
HS Lallie
Interdisciplinary Journal of e-Skills and Life Long Learning 11, 001-010, 2015
52015
系统目前无法执行此操作,请稍后再试。
文章 1–20