default search action
Harjinder Singh Lallie 0001
Person information
- affiliation: University of Warwick, Cyber Security Centre, WMG, Coventry, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Suraj Harsha Kamtam, Harjinder Singh Lallie, Muhammad Ajmal Azad:
The application of AI techniques for firearm detection in digital forensic investigation. Int. J. Electron. Secur. Digit. Forensics 16(3): 372-396 (2024) - [j17]Muhammad Ajmal Azad, Sidrah Abdullah, Junaid Arshad, Harjinder Singh Lallie, Yussuf Ahmed:
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT. Internet Things 27: 101227 (2024) - 2023
- [j16]Ana Maria Pirca, Harjinder Singh Lallie:
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers. Comput. Secur. 130: 103254 (2023) - [j15]Daeun Lee, Harjinder Singh Lallie, Nadine Michaelides:
The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. Cogn. Technol. Work. 25(2-3): 273-289 (2023) - [j14]Nayana Hegde, Sunilkumar S. Manvi, Harjinder Singh Lallie:
Secure search scheme for encrypted data in the VANET cloud with random query trapdoor. Inf. Secur. J. A Glob. Perspect. 32(5): 383-400 (2023) - [i6]Daeun Lee, Harjinder Singh Lallie, Nadine Michaelides:
The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. CoRR abs/2307.02916 (2023) - [i5]Harjinder Singh Lallie, Andrew Thompson, Elzbieta Titis, Paul Stephens:
Understanding Cyber Threats Against the Universities, Colleges, and Schools. CoRR abs/2307.07755 (2023) - 2022
- [j13]Monzir Babiker Mohamed, Olasunkanmi Matthew Alofe, Muhammad Ajmal Azad, Harjinder Singh Lallie, Kaniz Fatema, Tahir Sharif:
A comprehensive survey on secure software-defined network for the Internet of Things. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [i4]Thomas Grubl, Harjinder Singh Lallie:
Applying Artificial Intelligence for Age Estimation in Digital Forensic Investigations. CoRR abs/2201.03045 (2022) - [i3]Richard Apaua, Harjinder Singh Lallie:
Measuring User Perceived Security of Mobile Banking Applications. CoRR abs/2201.03052 (2022) - 2021
- [j12]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105: 102248 (2021) - 2020
- [j11]Harjinder Singh Lallie, Kurt Debattista, Jay Bal:
A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 35: 100219 (2020) - [j10]Harjinder Singh Lallie:
Dashcam forensics: A preliminary analysis of 7 dashcam devices. Digit. Investig. 33: 200910 (2020) - [i2]Harjinder Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier J. A. Bellekens:
Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. CoRR abs/2006.11929 (2020)
2010 – 2019
- 2019
- [b1]Harjinder Singh Lallie:
Towards a standardised attack graph visual syntax. University of Warwick, Coventry, UK, 2019 - 2018
- [j9]Harjinder Singh Lallie, Kurt Debattista, Jay Bal:
Evaluating practitioner cyber-security attack graph configuration preferences. Comput. Secur. 79: 117-131 (2018) - [j8]Harjinder Singh Lallie, Kurt Debattista, Jay Bal:
An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. IEEE Trans. Inf. Forensics Secur. 13(5): 1110-1122 (2018) - 2014
- [j7]Harjinder Singh Lallie:
The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence. Future Internet 6(2): 190-202 (2014) - [j6]Alastair Irons, Harjinder Singh Lallie:
Digital Forensics to Intelligent Forensics. Future Internet 6(3): 584-596 (2014) - [p1]Harjinder Singh Lallie, Nathan Griffiths:
Where has this Hard Disk Been?: Extracting Geospatial Intelligence from Digital Storage Systems. Cyberpatterns 2014: 247-255 - [i1]Sabarathinam Chockalingam, Harjinder Singh Lallie:
The Conceptual Idea of Online Social Media Site (SMS) User Account Penetration Testing System. CoRR abs/1409.3037 (2014) - 2012
- [j5]Harjinder Singh Lallie:
An overview of the digital forensic investigation infrastructure of India. Digit. Investig. 9(1): 3-7 (2012) - [j4]Harjinder Singh Lallie, Parmjit Bains:
An Overview of the Jumplist Configuration File in Windows 7. J. Digit. Forensics Secur. Law 7(1): 15-28 (2012) - [j3]Harjinder Singh Lallie:
Challenges in applying the ACPO principles in cloud forensic investigations. J. Digit. Forensics Secur. Law 7(1): 71-86 (2012) - [c3]Raymond Middleton, David J. Day, Harjinder Singh Lallie:
Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries. GreenCom 2012: 102-108 - [c2]David J. Day, Denys A. Flores, Harjinder Singh Lallie:
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection. TrustCom 2012: 931-936 - 2011
- [j2]Harjinder Singh Lallie, Philip James Briggs:
Windows 7 registry forensic evidence created by three popular BitTorrent clients. Digit. Investig. 7(3-4): 127-134 (2011) - [j1]Harjinder Singh Lallie, Phillip Lawson, David J. Day:
Using Digital Logs to Reduce Academic Misdemeanour by Students in Digital Forensic Assessments. J. Inf. Technol. Educ. Innov. Pract. 10: 255-269 (2011) - [c1]Zhenxing Liu, Harjinder Singh Lallie, Lu Liu, Yongzhao Zhan, Kaigui Wu:
A hash-based secure interface on plain connection. CHINACOM 2011: 1236-1239
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint