Seguir
Stephen McCombie
Stephen McCombie
NHL Stenden University of Applied Science
Dirección de correo verificada de nhlstenden.com
Título
Citado por
Citado por
Año
Stuxnet: the emergence of a new cyber weapon and its implications
S Collins, S McCombie
Journal of Policing, Intelligence and Counter Terrorism 7 (1), 80-91, 2012
1842012
Characterising and Predicting Cyber Attacks Using the Cyber Attacker Model Profile (CAMP)
P Watters, S McCombie, J Pieprzyk, R Layton
Journal of Money Laundering Control 15 (4), 2012
602012
A preliminary profiling of internet money mules: an Australian perspective
M Aston, S McCombie, B Reardon, P Watters
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
532009
The US 2016 presidential election & Russia’s troll farms
S McCombie, AJ Uhlmann, S Morrison
Intelligence and National Security 35 (1), 95-114, 2020
442020
Cybercrime attribution: An eastern european case study
S McCombie, J Pieprzyk, P Watters
Proceedings of the 7th Australian Digital Forensics Conference, 41-51, 2009
352009
Authorship attribution of irc messages using inverse author frequency
R Layton, S McCombie, P Watters
2012 Third Cybercrime and Trustworthy Computing Workshop, 7-13, 2012
312012
A target-centric intelligence approach to WannaCry 2.0
AB Turner, S McCombie, AJ Uhlmann
Journal of Money Laundering Control 22 (4), 646-665, 2019
302019
Winning the phishing war: A strategy for Australia
S McCombie, J Pieprzyk
2010 Second Cybercrime and Trustworthy Computing Workshop, 79-86, 2010
292010
Forensic characteristics of phishing petty theft or organized crime?
S McCombie, P Watters, A Ng, B Watson
WEBIST 2008-4th International Conference on Web Information Systems and …, 2008
212008
Discerning payment patterns in Bitcoin from ransomware attacks
AB Turner, S McCombie, AJ Uhlmann
Journal of Money Laundering Control 23 (3), 545-589, 2020
202020
Visualization of ATM usage patterns to detect counterfeit cards usage
B Reardon, K Nance, S McCombie
2012 45th Hawaii International Conference on System Sciences, 3081-3088, 2012
192012
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
PA Watters, A Herps, R Layton, S McCombie
2013 Fourth Cybercrime and Trustworthy Computing Workshop, 44-49, 2013
182013
Analysis techniques for illicit bitcoin transactions
AB Turner, S McCombie, AJ Uhlmann
Frontiers in Computer Science 2, 600596, 2020
142020
Trouble in Florida: the Genesis of Phishing attacks on Australian banks
S McCombie
School of Computer and Information Science, Edith Cowan University, Perth …, 2008
112008
Computer forensic: An issue of definitions
S McCombie, M Warren
Australian Computer, Network & Information Forensics Conference (1st: 2003), 1-4, 2003
112003
Follow the money: Revealing risky nodes in a Ransomware-Bitcoin network
A Turner, S McCombie, A Uhlmann
102021
Phishing the long line: transnational cybercrime from Eastern Europe to Australia
SJ McCombie
Macquarie University, 2012
9*2012
A methodology for analyzing the credential marketplace
PA Watters, S McCombie
Journal of Money Laundering Control 14 (1), 32-43, 2011
72011
A profile of an information warfare attack
S McCombie, M Warren
Deakin University, School of Computing and Mathematics, 2000
62000
Threat actor oriented strategy: Knowing your enemy to better defend, detect and respond to cyber-attacks
S McCombie
Journal of the Australian Institute of Professional Intelligence Officers 26 …, 2018
52018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20