default search action
Jill Slay
Person information
- affiliation: University of South Australia, Department of Science, Technology, Engineering and Mathematics, Adelaide, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Sara Salim, Nour Moustafa, Mohamed Hassanian, David Ormod, Jill Slay:
Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications. IEEE Internet Things J. 11(3): 3853-3867 (2024) - [j29]Muna Al-Hawawreh, Nour Moustafa, Jill Slay:
A threat intelligence framework for protecting smart satellite-based healthcare networks. Neural Comput. Appl. 36(1): 15-35 (2024) - [j28]Mohammed Hassanin, Nour Moustafa, Imran Razzak, M. Tanveer, David G. A. Ormrod, Jill Slay:
Dynamic Hypersphere Embedding Scale Against Adversarial Attacks. IEEE Trans. Engineering Management 71: 12475-12486 (2024) - 2022
- [j27]Nickolaos Koroniotis, Nour Moustafa, Jill Slay:
A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks. Comput. Electr. Eng. 99: 107745 (2022) - [j26]Quynh Tu Ngo, Khoa Tran Phan, Wei Xiang, Abdun Mahmood, Jill Slay:
Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Networks. IEEE Trans. Aerosp. Electron. Syst. 58(3): 1753-1765 (2022) - 2021
- [j25]Jordan J. Plotnek, Jill Slay:
Cyber terrorism: A homogenized taxonomy and definition. Comput. Secur. 102: 102145 (2021) - [j24]Jordan J. Plotnek, Jill Slay:
Power systems resilience: Definition and taxonomy with a view towards metrics. Int. J. Crit. Infrastructure Prot. 33: 100411 (2021) - [j23]Quynh Tu Ngo, Khoa Tran Phan, Wei Xiang, Abdun Mahmood, Jill Slay:
On Edge Caching in Satellite - IoT Networks. IEEE Internet Things Mag. 4(4): 107-112 (2021) - [j22]Nour Moustafa, Gaurav Misra, Jill Slay:
Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks. IEEE Trans. Sustain. Comput. 6(2): 245-256 (2021) - [c58]Quynh Tu Ngo, Khoa Tran Phan, Wei Xiang, Abdun Naser Mahmood, Jill Slay:
Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial Networks. CSoNet 2021: 291-302
2010 – 2019
- 2019
- [j21]Nour Moustafa, Jiankun Hu, Jill Slay:
A holistic review of Network Anomaly Detection Systems: A comprehensive survey. J. Netw. Comput. Appl. 128: 33-55 (2019) - [j20]Nour Moustafa, Jill Slay, Gideon Creech:
Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks. IEEE Trans. Big Data 5(4): 481-494 (2019) - 2018
- [c57]Nour Moustafa, Jill Slay:
A Network Forensic Scheme Using Correntropy-Variation for Attack Detection. IFIP Int. Conf. Digital Forensics 2018: 225-239 - 2017
- [j19]Waqas Haider, Jiankun Hu, Jill Slay, Benjamin P. Turnbull, Yi Xie:
Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87: 185-192 (2017) - [c56]Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay:
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs. HCI (22) 2017: 160-173 - [c55]Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage, Jill Slay:
Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy. HCI (22) 2017: 739-752 - [c54]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay:
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques. MONAMI 2017: 30-44 - [c53]Chamila Wijayarathna, Nalin A. G. Arachchilage, Jill Slay:
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs. PPIG 2017: 5 - [i7]Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay:
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs. CoRR abs/1703.09846 (2017) - [i6]Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage, Jill Slay:
Designing Privacy for You : A User Centric Approach For Privacy. CoRR abs/1703.09847 (2017) - [i5]Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay:
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs. CoRR abs/1706.00138 (2017) - [i4]Nour Moustafa, Jill Slay:
A hybrid feature selection for network intrusion detection systems: Central points. CoRR abs/1707.05505 (2017) - [i3]Nour Moustafa, Jill Slay:
RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis. CoRR abs/1711.02824 (2017) - [i2]Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay:
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques. CoRR abs/1711.02825 (2017) - 2016
- [j18]Suhaila Ismail, Elena Sitnikova, Jill Slay:
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors. Int. J. Cyber Warf. Terror. 6(3): 79-95 (2016) - [j17]Nour Moustafa, Jill Slay:
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. A Glob. Perspect. 25(1-3): 18-31 (2016) - [j16]Marcus A. Thompson, Michael J. Ryan, Jill Slay, Alan C. McLucas:
Harmonized taxonomies for security and resilience. Inf. Secur. J. A Glob. Perspect. 25(1-3): 54-67 (2016) - 2015
- [j15]Allan Charles Watt, Jill Slay:
First responders actions to cope with volatile digital evidence. Int. J. Electron. Secur. Digit. Forensics 7(4): 381-399 (2015) - [c52]Nour Moustafa, Jill Slay:
The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems. BADGERS@RAID 2015: 25-31 - [c51]Saber M. Elsayed, Ruhul A. Sarker, Jill Slay:
Evaluating the performance of a differential evolution algorithm in anomaly detection. CEC 2015: 2490-2497 - [c50]Nour Moustafa, Jill Slay:
UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). MilCIS 2015: 1-6 - [c49]Suhaila Ismail, Elena Sitnikova, Jill Slay:
Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach. PACIS 2015: 77 - 2014
- [c48]Miao Xie, Jiankun Hu, Jill Slay:
Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD. FSKD 2014: 978-982 - [c47]Suhaila Ismail, Elena Sitnikova, Jill Slay:
Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study. FSKD 2014: 1000-1006 - [c46]Suhaila Ismail, Elena Sitnikova, Jill Slay:
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. SEC 2014: 242-249 - [c45]Zubair Shah, Abdun Naser Mahmood, Jill Slay:
Forensic Potentials of Solid State Drives. SecureComm (2) 2014: 113-126 - [i1]Jill Slay, Fiona Schulz:
Development of an Ontology Based Forensic Search Mechanism: Proof of Concept. CoRR abs/1407.8258 (2014) - 2013
- [c44]Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay:
iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? ARES 2013: 375-382 - [c43]Aswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay:
Digital Camcorder Forensics. AISC 2013: 39-48 - [c42]Aswami Ariffin, Jill Slay, Kim-Kwang Raymond Choo:
Data Recovery from Proprietary Formatted Cctv Hard Disks. IFIP Int. Conf. Digital Forensics 2013: 213-223 - 2012
- [j14]David Irwin, Arek Dadej, Jill Slay:
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech. J. Digit. Forensics Secur. Law 7(3): 55-82 (2012) - [c41]Grant Osborne, Benjamin P. Turnbull, Jill Slay:
Development of InfoVis Software for Digital Forensics. COMPSAC Workshops 2012: 213-217 - [c40]Grant Osborne, Hannah Thinyane, Jill Slay:
Visualizing Information in Digital Forensics. IFIP Int. Conf. Digital Forensics 2012: 35-47 - 2011
- [j13]Jason Beckett, Jill Slay:
Scientific underpinnings and background to standards and accreditation in digital forensics. Digit. Investig. 8(2): 114-121 (2011) - [j12]David Irwin, Jill Slay, Arek Dadej, Malcolm Shore:
Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM. J. Digit. Forensics Secur. Law 6(1): 15-36 (2011) - [c39]Matthew Simon, Jill Slay:
Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility. ARES 2011: 183-188 - [c38]Grant Osborne, Jill Slay:
Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence. ARES 2011: 196-201 - [c37]Ray Hunt, Jill Slay:
A new approach to developing attack taxonomies for network security - including case studies. ICON 2011: 281-286 - [c36]David Irwin, Jill Slay:
Extracting Evidence Related to VoIP Calls. IFIP Int. Conf. Digital Forensics 2011: 221-228 - 2010
- [j11]Yinghua Guo, Jill Slay:
Testing Forensic Copy Function of Computer Forensics Investigation Tools. J. Digit. Forensic Pract. 3(1): 46-61 (2010) - [j10]Yinghua Guo, Jill Slay:
Computer Forensic Function Testing: Media Preparation, Write Protection And Verification. J. Digit. Forensics Secur. Law 5(2): 5-20 (2010) - [c35]Matthew Simon, Jill Slay:
Recovery of Skype Application Activity Data from Physical Memory. ARES 2010: 283-288 - [c34]Grant Osborne, Benjamin P. Turnbull, Jill Slay:
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. ARES 2010: 629-634 - [c33]Yinghua Guo, Jill Slay:
A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools. ARES 2010: 665-670 - [c32]Yinghua Guo, Jill Slay:
Data Recovery Function Testing for Digital Forensic Tools. IFIP Int. Conf. Digital Forensics 2010: 297-311 - [c31]Ray Hunt, Jill Slay:
The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure. NSS 2010: 328-333 - [c30]Ray Hunt, Jill Slay:
Achieving critical infrastructure protection through the interaction of computer security and network forensics. PST 2010: 23-30
2000 – 2009
- 2009
- [j9]Yinghua Guo, Jill Slay, Jason Beckett:
Validation and verification of computer forensic software tools - Searching Function. Digit. Investig. 6(Supplement): S12-S22 (2009) - [j8]Jill Slay, Matthew Simon:
Voice Over IP: Privacy and Forensic Implications. Int. J. Digit. Crime Forensics 1(1): 89-101 (2009) - [j7]Sameera Mubarak, Jill Slay:
Protecting clients from insider attacks on trust accounts. Inf. Secur. Tech. Rep. 14(4): 202-212 (2009) - [c29]Matthew Simon, Jill Slay:
Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. ARES 2009: 995-1000 - [c28]Jill Slay, Elena Sitnikova:
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. e-Forensics 2009: 77-82 - [c27]Jill Slay, Yi-Chi Lin, Benjamin P. Turnbull, Jason Beckett, Paul Lin:
Towards a Formalization of Digital Forensics. IFIP Int. Conf. Digital Forensics 2009: 37-47 - 2008
- [j6]Timothy Pavlic, Jill Slay, Benjamin P. Turnbull:
Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications. J. Digit. Forensics Secur. Law 3(1): 35-56 (2008) - [c26]Benjamin P. Turnbull, Jill Slay:
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. ARES 2008: 1355-1360 - [c25]Joshua Broadway, Benjamin P. Turnbull, Jill Slay:
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. ARES 2008: 1361-1368 - [c24]Jill Slay, Matthew Simon:
Voice over IP forensics. e-Forensics 2008: 10 - [c23]Timothy Pavlic, Jill Slay, Benjamin P. Turnbull:
Extracting Evidence Using Google Desktop Search. IFIP Int. Conf. Digital Forensics 2008: 43-50 - [c22]Yi-Chi Lin, Jill Slay, I-Long Lin:
Computer Forensics and Culture. ISI Workshops 2008: 288-297 - 2007
- [j5]Nikica Budimir, Jill Slay:
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence. J. Digit. Forensics Secur. Law 2(1): 75-92 (2007) - [c21]Jason Beckett, Jill Slay:
Digital Forensics: Validation and Verification in a Dynamic Work Environment. HICSS 2007: 266 - [c20]Jill Slay, Andrew Przibilla:
iPod Forensics: Forensically Sound Examination of an Apple iPod. HICSS 2007: 267 - [c19]Benjamin P. Turnbull, Jill Slay:
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. HICSS 2007: 267 - [c18]Jill Slay, Michael Miller:
Lessons Learned from the Maroochy Water Breach. Critical Infrastructure Protection 2007: 73-82 - [c17]Matthew Simon, Jill Slay:
Forensic Computing Training, Certification and Accreditation: An Australian Overview. World Conference on Information Security Education 2007: 105-112 - 2006
- [j4]Jill Slay, Benjamin P. Turnbull:
Computer Security Education and Research in Australia. IEEE Secur. Priv. 4(5): 60-63 (2006) - [j3]Benjamin P. Turnbull, Barry Blundell, Jill Slay:
Google Desktop as a Source of Digital Evidence. Int. J. Digit. EVid. 5(1) (2006) - [j2]Jill Slay, Fiona Schulz:
Development of an Ontology Based Forensic Search Mechanism: Proof of Concept. J. Digit. Forensics Secur. Law 1(1): 25-44 (2006) - [c16]Jill Slay, Michael Miller:
A Security Architecture for SCADA Networks. ACIS 2006 - [c15]Sameera Mubarak, Jill Slay:
An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management. ICDIM 2006: 55-62 - 2005
- [c14]Phillip Pudney, Jill Slay:
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. ACISP 2005: 29-39 - [c13]Yi-Chi Lin, Jill Slay:
Non-Repudiation in Pure Mobile Ad Hoc Network. AISM 2005: 59-66 - [c12]Benjamin P. Turnbull, Barry Blundell, Jill Slay:
Googling Forensics. Australian Computer, Network & Information Forensics Conference 2005: 62-67 - [c11]Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin P. Turnbull, Tom Wilsdon:
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. ECIW 2005: 39-46 - [c10]Tom Wilsdon, Jill Slay:
Towards A Validation Framework for Forensic Computing Tools in Australia. ECIW 2005: 409-414 - [c9]Jill Slay, Kris Jorgensen:
Applying Filter Clusters to Reduce Search State Space. IFIP Int. Conf. Digital Forensics 2005: 295-301 - [c8]Tom Wilsdon, Jill Slay:
Digital Forensics: Exploring Validation, Verification and Certification. SADFE 2005: 48-55 - 2004
- [c7]Jill Slay, Gerald Quirchmayr:
A Formal Model for the Relationship between Culture and Trust within is Security Management. AISM 2004: 159-166 - [c6]Jill Slay:
Doctor of Philosophy: IT Security. International Information Security Workshops 2004: 147-152 - 2003
- [c5]Gerald Quirchmayr, Jill Slay, Andy Koronios, Kathy Darzano:
A Business Process Engineering Based Approach Towards Incorporating Security in the Design of Global Information Systems. PACIS 2003: 77 - 2002
- [j1]Jill Slay:
Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings. J. Educ. Technol. Soc. 5(1) (2002) - [c4]Gerald Quirchmayr, Jill Slay:
Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science. TelE-Learning 2002: 177-184 - [c3]Jill Slay, Gerald Quirchmayr:
The Role Of Culture In the Development of Global E-Commerce Systems. Information Systems: The e-Business Challenge 2002: 103-115 - 2001
- [c2]Gerald Quirchmayr, Jill Slay:
Identifying Emerging Web-Communication Patterns Between Government and Citizens. DEXA Workshop 2001: 419-422
1990 – 1999
- 1998
- [c1]Jill Slay:
Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment. Teleteaching 1998: 921-930
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint