Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ... Computers & security 105, 102248, 2021 | 808 | 2021 |
A review of attack graph and attack tree visual syntax in cyber security HS Lallie, K Debattista, J Bal Computer Science Review 35, 100219, 2020 | 214 | 2020 |
Virtual reality and 3D animation in forensic visualization M Ma, H Zheng, H Lallie Journal of forensic sciences 55 (5), 1227-1231, 2010 | 117 | 2010 |
Digital forensics to intelligent forensics A Irons, HS Lallie Future Internet 6 (3), 584-596, 2014 | 107 | 2014 |
Security factors on the intention to use mobile banking applications in the UK older generation (55+). A mixed-method study using modified UTAUT and MTAM-with perceived cyber … Y Hanif, HS Lallie Technology in Society 67, 101693, 2021 | 106 | 2021 |
An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception HS Lallie, K Debattista, J Bal IEEE Transactions on Information Forensics and Security 13 (5), 1110-1122, 2017 | 71 | 2017 |
Windows 7 registry forensic evidence created by three popular BitTorrent clients HS Lallie, PJ Briggs Digital Investigation 7 (3-4), 127-134, 2011 | 22 | 2011 |
Evaluating practitioner cyber-security attack graph configuration preferences HS Lallie, K Debattista, J Bal Computers & Security 79, 117-131, 2018 | 18 | 2018 |
Challenges in applying the ACPO principles to Cloud forensic Investigations H Lallie, L Pimlott Journal of Digital Forensics Security and Law 7 (1), 2012 | 18* | 2012 |
A Hash-based Secure Interface on Plain Connection Z Liu, H Lallie, L Liu 6th International ICST Conference on Communications and Networking, 2011 | 17 | 2011 |
Measuring user perceived security of mobile banking applications R Apaua, HS Lallie arXiv preprint arXiv:2201.03052, 2022 | 15 | 2022 |
Dashcam forensics: A preliminary analysis of 7 dashcam devices HS Lallie Forensic Science International: Digital Investigation 33, 200910, 2020 | 14 | 2020 |
CONDOR: A hybrid ids to offer improved intrusion detection DJ Day, DA Flores, HS Lallie 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 11 | 2012 |
The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation D Lee, HS Lallie, N Michaelides Cognition, Technology & Work 25 (2), 273-289, 2023 | 10 | 2023 |
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers AM Pirca, HS Lallie Computers & Security 130, 103254, 2023 | 10 | 2023 |
Challenging the Reliability of iPhone-Geo-tags H Lallie, D Benford The International Journal of Forensic Computer Science 6 (1), 59-67, 2011 | 10 | 2011 |
Applying artificial intelligence for age estimation in digital forensic investigations T Grubl, HS Lallie arXiv preprint arXiv:2201.03045, 2022 | 9 | 2022 |
EMOTION IN SIKH MUSICOLOGY HS Lallie, S Kaur, K Singh Routledge, 2012 | 7 | 2012 |
An overview of the digital forensic investigation infrastructure of India HS Lallie Digital Investigation 9 (1), 3-7, 2012 | 7 | 2012 |
Alarming! Security aspects of the wireless vehicle S Chockalingam, HS Lallie | 6 | 2014 |