Follow
Harjinder Singh Lallie
Harjinder Singh Lallie
University Reader (Cyber Security), University of Warwick
Verified email at warwick.ac.uk
Title
Cited by
Cited by
Year
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
HS Lallie, LA Shepherd, JRC Nurse, A Erola, G Epiphaniou, C Maple, ...
Computers & security 105, 102248, 2021
8572021
A review of attack graph and attack tree visual syntax in cyber security
HS Lallie, K Debattista, J Bal
Computer Science Review 35, 100219, 2020
2402020
Security factors on the intention to use mobile banking applications in the UK older generation (55+). A mixed-method study using modified UTAUT and MTAM-with perceived cyber …
Y Hanif, HS Lallie
Technology in Society 67, 101693, 2021
1362021
Virtual reality and 3D animation in forensic visualization
M Ma, H Zheng, H Lallie
Journal of forensic sciences 55 (5), 1227-1231, 2010
1242010
Digital forensics to intelligent forensics
A Irons, HS Lallie
Future Internet 6 (3), 584-596, 2014
1092014
An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception
HS Lallie, K Debattista, J Bal
IEEE Transactions on Information Forensics and Security 13 (5), 1110-1122, 2017
772017
Measuring user perceived security of mobile banking applications
R Apaua, HS Lallie
arXiv preprint arXiv:2201.03052, 2022
222022
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed
Internet of Things 27, 101227, 2024
212024
Windows 7 registry forensic evidence created by three popular BitTorrent clients
HS Lallie, PJ Briggs
Digital Investigation 7 (3-4), 127-134, 2011
212011
The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation
D Lee, HS Lallie, N Michaelides
Cognition, Technology & Work 25 (2), 273-289, 2023
202023
Dashcam forensics: A preliminary analysis of 7 dashcam devices
HS Lallie
Forensic Science International: Digital Investigation 33, 200910, 2020
192020
Evaluating practitioner cyber-security attack graph configuration preferences
HS Lallie, K Debattista, J Bal
Computers & Security 79, 117-131, 2018
192018
Challenges in applying the ACPO principles to Cloud forensic Investigations
H Lallie, L Pimlott
Journal of Digital Forensics Security and Law 7 (1), 2012
17*2012
A Hash-based Secure Interface on Plain Connection
Z Liu, H Lallie, L Liu
6th International ICST Conference on Communications and Networking, 2011
172011
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie
Computers & Security 130, 103254, 2023
162023
Applying artificial intelligence for age estimation in digital forensic investigations
T Grubl, HS Lallie
arXiv preprint arXiv:2201.03045, 2022
112022
CONDOR: A hybrid ids to offer improved intrusion detection
DJ Day, DA Flores, HS Lallie
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
112012
Blockchain Forensics: A Systematic Literature Review of Techniques, Applications, Challenges, and Future Directions
HF Atlam, N Ekuri, MA Azad, HS Lallie
Electronics 13 (17), 3568, 2024
102024
Challenging the Reliability of iPhone-Geo-tags
H Lallie, D Benford
The International Journal of Forensic Computer Science 6 (1), 59-67, 2011
102011
An overview of the digital forensic investigation infrastructure of India
HS Lallie
Digital Investigation 9 (1), 3-7, 2012
82012
The system can't perform the operation now. Try again later.
Articles 1–20