Skip to Content

Recent Research

 

Aston , M., McCombie S., Reardon B. & Watters P. (2009).  A Preliminary Profiling of Internet Money Mules: An Australian Perspective.  uic-atc, pp.482-487, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, Australia.

Collins, S., & McCombie, S. (2012). Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence and Counter Terrorism, 7(1), 80-91.

Ho, W.H., Watters, P.A. & Verity, D. (2007). Are younger people more difficult to identify or just a peer-to-peer effect? 12th International Conference on Computer Analysis of Images and Patterns, Vienna, Austria.

Ho, W.H., Watters, P.A. & Verity, D. (2007). Robustness of the new owner-tester approach for face recognition experiments. IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Biometrics Workshop, Minneapolis, USA.

Ho, W.H. & Watters, P.A. (2007). A New Performance Evaluation Method for Face Identification - Regression on Misidentification Risk. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Minneapolis, USA.

He, Y. & Watters, P.A. (2007). On the complexity of compensation handling in WS-BPEL 2.0 for 3rd-party logistics. Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Australia.

McCombie S., Watters, P.A., Watson, B. & Ng A. (2008) Forensic Characteristics of Phishing - Petty Theft or Organized Crime? WEBIST Conference Funchal Portugal 2008

McCombie S. (2008) Trouble in Florida: The Genesis of Phishing attacks on Australian Banks. 6th Australian Digital Forensics Conference Perth, Australia

McCombie, S., J. Pieprzyk, et al. (2009). Cybercrime Attribution: An Eastern European Case Study. 7th Australian Digital Forensics Conference. Perth. Australia

McCombie, S. and J. Pieprzyk (2010). Winning the Phishing War: A Strategy for Australia. Second Cybercrime and Trustworthy Computing Workshop, University of Ballarat.

Pham, T. & Watters, P.A. (2007). The efficiency of periodic rekeying in dynamic group key management. 4th European Conference on Universal Multiservice Networks, Toulouse, France.

Reardon, B., Nance, K., & McCombie, S. (2012). Visualization of ATM Usage Patterns to Detect Counterfeit Cards Usage. 2012 45th Hawaii International Conference on System Sciences, 3081-3088.

Watters, P.A., Martin, F. & Stripf, S. (2007). Visual detection of high capacity natural image steganography: Is a known cover effective? IEEE International Conference on Networking, Sensing and Control, London, UK.

Watters, P. A. and S. McCombie (2011). "A methodology for analyzing the credential marketplace." Journal of Money Laundering Control 14(1): 32-43.

Watters, P., McCombie, S., Pieprzyk, J., & Layton, R. (2012). Characterising and Predicting Cyber Attacks Using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control, 15(4).

Zeng, Z. & Watters, P.A. (2007). A novel face hashing method with feature fusion. 4th European Conference on Universal Multiservice Networks, Toulouse, France.

Zeng, Z. & Watters, P.A. (2007). A face hashing algorithm using mutual information and feature fusion. IEEE International Conference on Networking, Sensing and Control, London, UK.