Future challenges for smart cities: Cyber-security and digital forensics ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ... Digital Investigation 22, 3-13, 2017 | 317 | 2017 |
Security and accuracy of fingerprint-based biometrics: A review W Yang, S Wang, J Hu, G Zheng, C Valli Symmetry 11 (2), 141, 2019 | 238 | 2019 |
A fingerprint and finger-vein based cancelable multi-biometric system W Yang, S Wang, J Hu, G Zheng, C Valli Pattern Recognition 78, 242-251, 2018 | 216 | 2018 |
A review of security standards and frameworks for IoT-based smart environments NM Karie, NM Sahri, W Yang, C Valli, VR Kebande IEEE Access 9, 121975-121995, 2021 | 120 | 2021 |
Denial of service attack detection through machine learning for the IoT NF Syed, Z Baig, A Ibrahim, C Valli Journal of Information and Telecommunication 4 (4), 482-503, 2020 | 113 | 2020 |
Modelling and evaluation of malicious attacks against the iot mqtt protocol SN Firdous, Z Baig, C Valli, A Ibrahim 2017 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2017 | 108 | 2017 |
The convergence of IT and OT in critical infrastructure G Murray, MN Johnstone, C Valli | 83 | 2017 |
Biometrics for internet-of-things security: A review W Yang, S Wang, NM Sahri, NM Karie, M Ahmed, C Valli Sensors 21 (18), 6163, 2021 | 77 | 2021 |
Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem W Yang, S Wang, J Hu, G Zheng, J Chaudhry, E Adi, C Valli IEEE Access 6, 36939-36947, 2018 | 73 | 2018 |
Securing deep learning based edge finger vein biometrics with binary decision diagram W Yang, S Wang, J Hu, G Zheng, J Yang, C Valli IEEE transactions on industrial Informatics 15 (7), 4244-4253, 2019 | 70 | 2019 |
A security review of local government using NIST CSF: a case study A Ibrahim, C Valli, I McAteer, J Chaudhry The Journal of Supercomputing 74, 5171-5186, 2018 | 65 | 2018 |
Malware Forensics: Discovery of the intent of Deception M Brand, C Valli, A Woodward Journal of Digital Forensics, Security and Law 5 (4), 31-42, 2010 | 62 | 2010 |
Finger-to-heart (F2H): Authentication for wireless implantable medical devices G Zheng, W Yang, C Valli, L Qiao, R Shankaran, MA Orgun, ... IEEE journal of biomedical and health informatics 23 (4), 1546-1557, 2018 | 52 | 2018 |
Building a digital forensic laboratory: Establishing and managing a successful facility A Jones, C Valli Butterworth-Heinemann, 2011 | 51 | 2011 |
Review and Analysis of Cowrie Artefacts and Their Potential to be used Deceptively SGW Warren Z Cabral, Craig Valli, Leslie F Sikos 2019 International Conference on Computational Science and Computational …, 2019 | 42 | 2019 |
Risk analysis of cloud sourcing in healthcare and public health industry H Abrar, SJ Hussain, J Chaudhry, K Saleem, MA Orgun, J Al-Muhtadi, ... IEEE Access 6, 19140-19150, 2018 | 42 | 2018 |
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market A Jones, C Valli, G Dardick, I Sutherland Journal of Digital Forensics, Security and Law 3 (1), 5-24, 2008 | 42 | 2008 |
A privacy-preserving lightweight biometric system for internet of things security W Yang, S Wang, G Zheng, J Yang, C Valli IEEE Communications Magazine 57 (3), 84-89, 2019 | 41 | 2019 |
A wrapper-based feature selection for analysis of large data sets J Leng, C Valli, L Armstrong IEEE, 2010 | 38 | 2010 |
A critical analysis of ECG-based key distribution for securing wearable and implantable medical devices G Zheng, R Shankaran, W Yang, C Valli, L Qiao, MA Orgun, ... IEEE Sensors Journal 19 (3), 1186-1198, 2018 | 36 | 2018 |