Jill Slay
#105,624
Most Influential Person Now
British-Australian engineer and computer scientist
Jill Slay's AcademicInfluence.com Rankings
Jill Slaycomputer-science Degrees
Computer Science
#5245
World Rank
#5540
Historical Rank
Software Engineering
#325
World Rank
#331
Historical Rank
Artificial Intelligence
#5438
World Rank
#5513
Historical Rank
Database
#8068
World Rank
#8410
Historical Rank
Download Badge
Computer Science Engineering
Jill Slay's Degrees
- PhD Computer Science University of South Australia
- Masters Computer Science University of South Australia
- Bachelors Computer Science University of South Australia
Similar Degrees You Can Earn
Why Is Jill Slay Influential?
(Suggest an Edit or Addition)According to Wikipedia, Jill Slay is a British-Australian engineer and computer scientist. Her work has attracted international attention and she was made a Member of the Order of Australia for "service to the information technology industry through contributions in the areas of forensic computer science, security, critical infrastructure protection, and cyberterrorism."
Jill Slay's Published Works
Published Works
- UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) (2015) (1388)
- Lessons Learned from the Maroochy Water Breach (2007) (636)
- The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set (2016) (604)
- A holistic review of Network Anomaly Detection Systems: A comprehensive survey (2019) (174)
- Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks (2019) (134)
- The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems (2015) (131)
- Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling (2017) (129)
- Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models (2017) (87)
- Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques (2017) (85)
- Validation and verification of computer forensic software tools-Searching Function (2009) (77)
- A hybrid feature selection for network intrusion detection systems: Central points (2017) (73)
- Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD (2014) (66)
- Digital Forensics: Validation and Verification in a Dynamic Work Environment (2007) (50)
- Recovery of Skype Application Activity Data from Physical Memory (2010) (47)
- Anomaly Detection System Using Beta Mixture Models and Outlier Detection (2018) (45)
- Mobile device forensics: a snapshot (2013) (36)
- Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks (2018) (33)
- Enhancement of Forensic Computing Investigations through Memory Forensic Techniques (2009) (28)
- Money laundering and terrorism financing in virtual environments: a feasibility study (2014) (28)
- Information Technology Security and Risk Management (2006) (24)
- iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? (2013) (24)
- Towards a Formalization of Digital Forensics (2009) (23)
- Digital forensics: exploring validation, verification & certification (2005) (22)
- Detecting Money Laundering and Terrorism Financing Activity in Second Life and World of Warcraft (2010) (21)
- Evaluating the performance of a differential evolution algorithm in anomaly detection (2015) (20)
- Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis (2008) (20)
- A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs (2017) (20)
- Voice over IP forensics (2008) (19)
- IS security, trust and culture: a theoretical framework for managing IS security in multicultural settings (2003) (17)
- Validation of forensic computing software utilizing Black Box testing techniques (2006) (17)
- Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics (2008) (16)
- The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems (2009) (16)
- Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process (2007) (16)
- Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings (2002) (16)
- Catalytic effects of extractives from pressure-refined fiber on gel time of urea-formaldehyde resin. (1980) (16)
- Voice over IP: Forensic Computing Implications (2006) (15)
- Data Recovery Function Testing for Digital Forensic Tools (2010) (14)
- Data Recovery from Proprietary Formatted Cctv Hard Disks (2013) (12)
- Scientific underpinnings and background to standards and accreditation in digital forensics (2011) (12)
- Power systems resilience: Definition and taxonomy with a view towards metrics (2021) (12)
- Towards An Adaptive Multimedia Learning Environment (2002) (11)
- Digital Camcorder Forensics (2013) (11)
- Voice Over IP: Privacy and Forensic Implications (2009) (11)
- A New Resilience Taxonomy (2016) (11)
- Google Desktop as a Source of Digital Evidence (2006) (10)
- Personalising the Learning Environment (2003) (10)
- Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective (2012) (10)
- A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools (2010) (10)
- Research perspectives on culturally sensitive science education (2001) (9)
- The Nature of Nature: Chinese Culture and Science Education. (2000) (9)
- A Network Forensic Scheme Using Correntropy-Variation for Attack Detection (2018) (9)
- Flow Aggregator Module for Analysing Network Traffic (2018) (9)
- Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks (2014) (8)
- On Demand Public Key Management for Wireless Ad Hoc Networks (2004) (8)
- Development of an Ontology Based Forensic Search Mechanism: Proof of Concept (2006) (7)
- Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility (2011) (7)
- Forensic Potentials of Solid State Drives (2014) (7)
- Cyber terrorism: A homogenized taxonomy and definition (2020) (7)
- Designing Privacy for You Practical Approach for User-Centric Privacy (2017) (7)
- iPod Forensics: Forensically Sound Examination of an Apple iPod (2007) (7)
- Achieving critical infrastructure protection through the interaction of computer security and network forensics (2010) (7)
- A new approach to developing attack taxonomies for network security - including case studies (2011) (7)
- RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis (2017) (7)
- Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence (2011) (7)
- Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study (2014) (7)
- Securing Wireless Ad Hoc Networks:Towards A Mobile Agent Security Architecture (2003) (7)
- Development of InfoVis Software for Digital Forensics (2012) (6)
- The "Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation (2010) (6)
- A Security Architecture for SCADA Networks (2006) (6)
- Extracting Evidence Related to VoIP Calls (2011) (6)
- Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs (2017) (6)
- Designing Privacy for You : A User Centric Approach For Privacy (2017) (6)
- The Design of Real-Time Adaptive Forensically Sound Secure Critical Infrastructure (2010) (6)
- Culture and conceptualisations of nature : an interpretive analysis of Australian and Chinese perspectives. (2000) (5)
- Adaptive learning environments for CS education: from AMLE to live spaces (2003) (5)
- Developing forensic computing tools and techniques within a holistic framework: an Australian approach (2004) (5)
- Visualizing Information in Digital Forensics (2012) (5)
- Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy (2017) (4)
- Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech (2012) (4)
- A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks (2022) (4)
- Protecting clients from insider attacks on trust accounts (2009) (4)
- Two-Tier Cache-Aided Full-Duplex Hybrid Satellite–Terrestrial Communication Networks (2021) (4)
- An Integrated Tool-Support for Small Team Meetings: Lessons from Observations of Team Meetings in Organisations (2012) (4)
- A Cultural Framework for the Interoperability of C2 Systems (2002) (3)
- Towards A Validation Framework for Forensic Computing Tools in Australia (2005) (3)
- The Role Of Culture In the Development of Global E-Commerce Systems (2002) (3)
- Towards an Adaptive Multimedia Learning Environments: Enhancing the Student Experience (2002) (3)
- What are you Looking for: Identification of Remnant Communication Artefacts in Physical Memory (2010) (3)
- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia (2005) (3)
- Identifying emerging Web-communication patterns between government and citizens (2001) (3)
- Testing Forensic Copy Function of Computer Forensics Investigation Tools (2010) (3)
- Extraction of Electronic Evidence from VoIP: Forensic Analysis of A Virtual Hard Disk Vs RAM (2011) (2)
- First responders actions to cope with volatile digital evidence (2015) (2)
- Applying Filter Clusters to Reduce Search State Space (2005) (2)
- Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment (1998) (2)
- Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach (2015) (2)
- Computer Security Education and Research in Australia (2006) (2)
- Validation and verification of computer forensic software tools d Searching Function (2009) (2)
- Harmonized taxonomies for security and resilience (2016) (2)
- Naturalistic Inquiry in Cross-cultural Research: A Narrative Turn (2007) (2)
- Women in cyber security literature review (2017) (2)
- QoS Issues of Using Probabilistic Non-Repudiation Protocol in Mobile Ad Hoc Network Environment (2006) (2)
- Computer Forensic Function Testing: Media Preparation, Write Protection And Verification (2010) (2)
- Development in Training and Education for Australian Cyber Security (2018) (2)
- Non-Repudiation in Pure Mobile Ad Hoc Network (2005) (2)
- Forensic Computing Training, Certification and Accreditation: An Australian Overview (2007) (2)
- Lessons towards developing an integrated tool-support for small team meetings. (2012) (1)
- SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors (2016) (1)
- Computer Forensics and Culture (2008) (1)
- Voice Over IP and forensics: A review of recent Australian work. Paper presented at the 1st International Conference on Digital Forensics and Investigation (ICDFI), September 21-23, 2012, Beijing, China. (2012) (1)
- DFSat: Deep Federated Learning for Identifying Cyber Threats in IoT-based Satellite Networks (2022) (1)
- Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications (2008) (1)
- Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence (2007) (1)
- Modern Engineering Education in China - Implications for Australian Postgraduate Engineering Education (1999) (1)
- Pathway into a Security Professional: A New Cyber Security and Forensic Computing Curriculum (2012) (1)
- A Formal Model for the Relationship between Culture and Trust within is Security Management (2004) (1)
- On Edge Caching in Satellite — IoT Networks (2021) (1)
- A threat intelligence framework for protecting smart satellite-based healthcare networks (2021) (1)
- Knowledge Gaps in Curricular Guidance for ICS Security (2022) (1)
- New Dawn for Space Security (2022) (1)
- Digital Forensics Institute in Malaysia: The way forward (2014) (1)
- Digital forensics in the Cloud: Research perspectives. Paper presented at the ISC Secure Johannesburg Conference, November 15, 2012. (2012) (0)
- Australasian ( ACIS ) 2006 A Security Architecture for SCADA Networks (2017) (0)
- Cloud Authentication and Forensics (2016) (0)
- Dynamic Hypersphere Embedding Scale Against Adversarial Attacks (2022) (0)
- Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science (2002) (0)
- Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Systems (2021) (0)
- Vertically Integrated Pathway for Infusing Engineering Technicians with Industrial Cybersecurity Competencies (2022) (0)
- An integrated tool-support for small team meetings in organisations. (2012) (0)
- Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT Networks (2023) (0)
- Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial Networks (2021) (0)
- Chapter 15 DATARECOVERY FROM PROPRIETARY- FORMATTED CCTV HARD DISKS (2013) (0)
- DIYexamer : A Web-based Multi-Server Testing System with Dynamic Test Item Acquisition and Discriminability Assessment (2012) (0)
- Googling Forensics (2005) (0)
- An International Technical Standard for Commercial Space System Cybersecurity - A Call to Action (2022) (0)
- A Business Process Engineering Based Approach Towards Incorporating Security in the Design of Global Information Systems (2003) (0)
- Coalition Interoperability Title : A Cultural Framework for the Interoperability of C 2 systems (2007) (0)
- SCADA Systems Cyber Security for Critical Infrastructures (2020) (0)
- Voice Over IP And Forensics : A Review of Recent Australian Work (2012) (0)
- Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool (2005) (0)
- Extracting Evidence Using Google Desktop Search (2008) (0)
- Adaptive context-aware learning environments (2002) (0)
- Detecting and tracking hypersonic glide vehicles: A cybersecurity-engineering analysis of academic literature (2023) (0)
- Doctor of Philosophy: IT Security (2004) (0)
- Message from the WSDF 2011 Workshop Organizers (2011) (0)
- Simulating the Dynamics of Information and Knowledge Operations (0)
- SIEM4GS: Security Information and Event Management for a Virtual Ground Station Testbed (2022) (0)
- An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management (2007) (0)
- Voice Over IP for Rural Telecommunication Provision (2008) (0)
- Augmented reality as a visualisation tool within information visualisation (2002) (0)
- Being, becoming and belonging: Some thoughts on academic disciplinary effects (2011) (0)
This paper list is powered by the following services:
Other Resources About Jill Slay
What Schools Are Affiliated With Jill Slay?
Jill Slay is affiliated with the following schools: