Internet of things (iot): Research, simulators, and testbeds M Chernyshev, Z Baig, O Bello, S Zeadally IEEE Internet of Things Journal 5 (3), 1637-1647, 2017 | 352 | 2017 |
Future challenges for smart cities: Cyber-security and digital forensics ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ... Digital Investigation 22, 3-13, 2017 | 338 | 2017 |
Healthcare data breaches: Implications for digital forensic readiness M Chernyshev, S Zeadally, Z Baig Journal of medical systems 43, 1-12, 2019 | 149 | 2019 |
Mobile forensics: advances, challenges, and research opportunities M Chernyshev, S Zeadally, Z Baig, A Woodward IEEE Security & Privacy 15 (6), 42-51, 2017 | 72 | 2017 |
Internet of things forensics: The need, process models, and open issues M Chernyshev, S Zeadally, Z Baig, A Woodward IT professional 20 (3), 40-49, 2018 | 67 | 2018 |
On 802.11 access point locatability and named entity recognition in service set identifiers M Chernyshev, C Valli, P Hannay IEEE Transactions on Information Forensics and Security 11 (3), 584-593, 2015 | 30 | 2015 |
Revisiting urban war nibbling: Mobile passive discovery of classic bluetooth devices using ubertooth one M Chernyshev, C Valli, M Johnstone IEEE Transactions on Information Forensics and Security 12 (7), 1625-1636, 2017 | 18 | 2017 |
Cloud-native application security: Risks, opportunities, and challenges in securing the evolving attack surface M Chernyshev, Z Baig, S Zeadally Computer 54 (11), 47-57, 2021 | 10 | 2021 |
Security assessment of IoT devices: The case of two smart TVs M Chernyshev, P Hannay SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015 | 7 | 2015 |
Verification of primitive sub ghz rf replay attack techniques based on visual signal analysis M Chernyshev SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013 | 4 | 2013 |
Service set identifier geolocation for forensic purposes: Opportunities and challenges M Chernyshev, C Valli, P Hannay 2016 49th Hawaii International Conference on System Sciences (HICSS), 5487-5496, 2016 | 3 | 2016 |
An overview of bluetooth device discovery and fingerprinting techniques–assessing the local context M Chernyshev RI Security Research Institute, Edith Cowan University, Perth, Western Australia, 2015 | 3 | 2015 |
802.11 tracking and surveillance-a forensic perspective M Chernyshev, C Valli, P Hannay Proceedings of the International Conference on Security and Management (SAM …, 2015 | 2 | 2015 |
The zombies strike back: Towards client-side beef detection M Chernyshev, P Hannay | 1 | 2014 |
Locational wireless and social media-based surveillance M Chernyshev | 1 | 2014 |
Your wireless footprint can help police catch a thief M Chernyshev The Conversation, 2016 | | 2016 |