Top of page
Global Site Navigation

ECU Security Research Institute - ECU Strategic Research Centre

Local Section Navigation
You are here: Main Content

Refereed Journal Articles


  • Cook, D., Waugh, B., Abdipanah, M., Hashemi, O., Abdul Rahman, S., (2014), Twitter Deception and Influence: Issues of Identity, Slacktivism, and Puppetry. Journal of Information Warfare, 13(1), 58 - 71,
  • Ahmad, P., Brogan, M., Johnstone, M., (2014), The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation. Australian Academic and Research Libraries, 45(1), 35-47, DOI: 10.1080/00048623.2014.885374.


  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N., (2013), A Response Selection for Intrusion Response Systems: Response Strategy Model (RSM). Security and Communication Networks, N/A(N/A), N/A, Early View Online, DOI: 10.1002/sec.896.
  • Li, F., Clarke, N., Papadaki, M., Dowland, P., (2013), Active Authentication for Mobile Devices Utilising Behavioural Profiling. International Journal of Information Security, 12(online), 1-14, Germany.
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P., (2013), Co-operative user identity verification using an Authentication Aura. Computers and Security, 39(Part b), 486-502, United Kingdom, DOI: 10.1016/j.cose.2013.09.011.
  • Corkill, J., Davies, A., (2013), The contemporary Australian intelligence domain. The AIPIO Journal, 21(2), 37-53, Deakin West, ACT.
  • Hannay, P., (2013), Geo Forensics: Classes of Locational Data Sources for Embedded Devices. IACSIT International Journal of Engineering and Technology, 5(2), 261-264.
  • Khonji, M., Iraqi, Y., Jones, A., (2013), Phishing Detection: A Literature Survey. IEEE Communications Surveys and Tutorials, 15(4), 2091-2121, United States, DOI: 10.1109/SURV.2013.032213.00009.


  • Hannay, P., Baatard, G., (2012), GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering. Journal of Network Forensics, 4(1), 14-26, Joondalup, WA.
  • Griffiths, M., Brooks, D., (2012), Informing security through Cultural Cognition: The influence of cultural bias on operational security. Journal of Applied Security Research, 7(2), 218-238, Binghamton, NY, DOI: 10.1080/19361610.2012.656256.
  • Brooks, D., (2012), Corporate Security: Using knowledge construction to define a practising body of knowledge. Asian Journal of Criminology, NA(NA), 1-13, DOI: 10.1007/s11417-012-9135-1.
  • Johnstone, M., Jarvis, J., (2012), On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks. Journal of Network Forensics, 4(1), 27-39, Perth, Australia.
  • Larsen, A., Crowley, M. (2012). 'Virtue Ethics: Analysing emotions in a police interview with a crime suspect.' Policing: a journal of policy and practice,6(3), 291-300, Oxford.
  • Khonji, M., Iraqi, Y., Jones, A., (2012), Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach. International Journal for Information Security Research, 2(1/2), 236-245, United Kingdom.
  • Baek, J., Vu, QH., Shoufan, A., Jones, A., Wong, DS., (2012), Stateful Public-Key Encryption Schemes Forward-Secure against State Exposure. The Computer Journal, 56(4), 497-507, DOI: doi:10.1093/comjnl/bxs151.


  • Ahmad, A., Warren, M., and Ruighaver, A. does traditional security risk assessment have a future in Information Security, Journal of Information Warfare, volume 10 Issue 3, 16-28
  • Brooks, D. J. (2011). Security risk management: A psychometric map of expert knowledge structure. International Journal of Risk Management, 13(01), 14-41.
  • Brooks, D. J.. Organizational security: Understanding practice boundaries from knowledge construct to a body of knowledge. Asian Journal of Criminology.
  • Coles-Kemp, L., Reddington, J. & Williams, P.A.H. (2011). Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud. Information Security Technical Report, In press
  • Cook D.M and Smith T (2011) The Battle for Money Transfers: The allure of Paypal and Western Union over Familial remittance networks, Journal of Information Warfare, Volume 10 Issue 1.
  • Corkill, J., (2011) Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community. The Journal of the Australian Institute of Professional Intelligence Officers, Volume 19 Issue 1, 3-12
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P., (2011) authentication Aura – A distributed approach to user authentication, Journal of Information Assurance and Security, volume 6 Issue 1
  • Jali, M., Furnell, S., Dowland, P. (2011) Quantifying the effect of graphical password guidelines for better security. IFIP Advances in Information and Communication Technology, volume 354 issue 2011, 80-91
  • Ledermuller, T. And Clarke, N. (2011) Risk assessment for mobile devices. Lecture Notes in Computer Science, Volume 6863 Issue 2011, 210-221
  • Li, F, Clarke, N., Papadaki, M., Dowland, (2011) Misuse Detection for mobile devices using behaviour profiling, International Journal of Cyber Warfare & Terrorism, Volume 1 issue 1, 43-55
  • Scully, T. (2011) The Cyber threat, trophy information and the fortress mentality. Journal of Business Continuity & Emergency Planning, Volume 5 Issue 3, 195-207


  • Aly, Anne.(2010) “Shifting Positions to the Media Discourse on Terrorism: Critical points in Audience Members’ Meaning Making Experiences.” Media International Australia incorporating Culture and Policy.
  • Aly, Anne & Lelia Green (2010) “Fear, Anxiety and the State of Terror.” Accepted for publication in Studies in Conflict and Terrorism
  • Alghafli, K., A. Jones, et al. (2010). "Forensic Analysis of the Windows 7 Registry." Journal of Digital Forensics, Security and Law 5(4): 5-30.
  • Chipperfield, C. and S. Furnell (2010). "From security policy to practice: Sending the right messages." Computer Fraud & Security 2010(3): 13-19.
  • Brand, M., C. Valli, et al. (2010). "Malware Forensics: Discovery of the Intent of Deception." Journal of Digital Forensics, Security and Law 5(4): 31-42
  • Brooks, D. J. (2010). “Security risk management: A psychometric map of expert knowledge structure”. International Journal of Risk Management, 00(00), 1-15. doi: 10.1057/rm.2010.7.
  • Furnell, S. (2010) “Jumping Security Hurdles”. Computer Fraud & Security 2010(6): 10-14.
  • Hutchinson, W. (2010) “New technologies: dissonance, influence and radical behaviours”. Journal of Information Warfare 9(3): 14-25.
  • Jali, M., S. Furnell, et al. (2010). "Assessing image-based authentication techniques in a web-based environment." Information Management & Computer Security 18(1): 43-53.
  • Jones, A. and T. Martin (2010). "Digital forensics and the issues of identity." Information Security Technical Report 15(2): 67-71.
  • Jones, A., C. Valli, et al. (2010). "The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market." Journal of Digital Forensics, Security and Law 5(4): 43-64.
  • Jones, A. (2010) “How do you make information security user friendly?” Information Security Technical Report 14(4): 213-216.
  • Kessler, G. and D. Haggerty (2010). "An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview." Journal of Digital Forensic Practice 3(1): 11-22.
  • Lessard, J. and G. Kessler (2010). "Android Forensics: Simplifying Cell Phone Examinations." Small Scale Digital Device Forensics Journal 4(1): 1-12.
  • Mislan, R., E. Casey, et al. (2010). "The Growing Need for On-Scene Triage of Mobile Devices." Digital Investigation 6(3-4): 112-124.
  • Szewczyk, P. S. (2010). "The ADSL Router Forensics Process." Journal of Network Forensics 2(1): 4-13.
  • Tjhai, G., S. Furnell, et al. (2010). "A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm." Computers & Security 29(6): 712-723.
  • Valli, C. (2010). "Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity." Journal of Digital Forensics, Security and Law 5(2): 35-44.


  • Jones, A., C. Valli, et al. (2009). “The 2007 analysis of information remaining on disks offered for sale on the second hand market.”, International Journal of Liability and Scientific Enquiry 2(1): 53 – 68
  • Jones, A., Dardick, G. S., Davies, G., Sutherland, I. and Valli, C. (2009). “The 2008 analysis of information remaining on disks offered for sale on the second hand market”, Journal of International Commercial Law and Technology (JICLT),4(3).
Skip to top of page