Lecturer in Cybersecurity
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, (30162-30173). doi:10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...