loading...

Publications

Authors: Type:

  • T. Wu and A. Martin, “Bluetooth low energy used for memory acquisition from smart health care devices,” in 2018 17th ieee international conference on trust, security and privacy in computing and communications/ 12th ieee international conference on big data science and engineering (trustcom/bigdatase), 2018, pp. 1256-1261.
    [Bibtex]
    @inproceedings{twu2018,
    added-at = {2020-08-14T15:37:00.000+0200},
    author = {Wu, T. and Martin, A.},
    biburl = {https://www.bibsonomy.org/bibtex/21a06c28e6663347bd65bcc6c5cb6f0ff/twu1},
    booktitle = {2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)},
    interhash = {793454df3a3019da9f0ede64eac7e83b},
    intrahash = {1a06c28e6663347bd65bcc6c5cb6f0ff},
    keywords = {bluetoothlowenergy smarthealthcare},
    pages = {1256-1261},
    timestamp = {2020-08-14T15:38:25.000+0200},
    title = {Bluetooth Low Energy Used for Memory Acquisition from Smart Health Care Devices},
    year = 2018
    }
  • [DOI] T. Wu and J. Nurse, “Exploring the use of plc debugging tools for digital forensic investigations on scada systems,” Journal of digital forensics, security and law, vol. 10, pp. 79-96, 2016.
    [Bibtex]
    @article{article,
    added-at = {2020-08-14T14:46:56.000+0200},
    author = {Wu, Tina and Nurse, Jason},
    biburl = {https://www.bibsonomy.org/bibtex/2d3ea357dfdb82cbc9221d57dad43d684/twu1},
    doi = {10.15394/jdfsl.2015.1213},
    interhash = {b95f6d7ee0cee84e84b458157d963de2},
    intrahash = {d3ea357dfdb82cbc9221d57dad43d684},
    journal = {Journal of Digital Forensics, Security and Law},
    keywords = {PLC SCADA, forensics},
    month = {01},
    pages = {79-96},
    timestamp = {2020-08-14T14:47:39.000+0200},
    title = {Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems},
    volume = 10,
    year = 2016
    }
  • T. Wu, F. Breitinger, and I. Baggili, “Iot ignorance is digital forensics research bliss: a survey to understand iot forensics definitions, challenges and future research directions,” in Proceedings of the 14th international conference on availability, reliability and security, 2019, p. 1–15.
    [Bibtex]
    @inproceedings{wu2019iot,
    added-at = {2020-08-14T13:05:27.000+0200},
    author = {Wu, Tina and Breitinger, Frank and Baggili, Ibrahim},
    biburl = {https://www.bibsonomy.org/bibtex/2fdbb81c67d6722ccbece160dd8f2ab52/twu1},
    booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security},
    interhash = {1ff3c529d6d2020f70e9b1702856ba1e},
    intrahash = {fdbb81c67d6722ccbece160dd8f2ab52},
    keywords = {IoT challenges, definitions, digital forensic forensics, survey,},
    pages = {1--15},
    timestamp = {2020-08-14T13:06:04.000+0200},
    title = {IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions},
    year = 2019
    }
  • [DOI] T. Wu, F. Breitinger, and S. O’Shaughnessy, “Digital forensic tools: recent advances and enhancing the status quo,” Forensic science international: digital investigation, vol. 34, p. 300999, 2020.
    [Bibtex]
    @article{WU2020300999,
    abstract = {Publications in the digital forensics domain frequently come with tools – a small piece of functional software. These tools are often released to the public for others to reproduce results or use them for their own purposes. However, there has been no study on the tools to understand better what is available and what is missing. For this paper we analyzed almost 800 articles from pertinent venues from 2014 to 2019 to answer the following three questions (1) what tools (i.e., in which domains of digital forensics): have been released; (2) are they still available, maintained, and documented; and (3) are there possibilities to enhance the status quo? We found 62 different tools which we categorized according to digital forensics subfields. Only 33 of these tools were found to be publicly available, the majority of these were not maintained after development. In order to enhance the status quo, one recommendation is a centralized repository specifically for tested tools. This will require tool researchers (developers) to spend more time on code documentation and preferably develop plugins instead of stand-alone tools.},
    added-at = {2020-08-14T12:37:16.000+0200},
    author = {Wu, Tina and Breitinger, Frank and O'Shaughnessy, Stephen},
    biburl = {https://www.bibsonomy.org/bibtex/2fd44828b19e3bb717ac145b1184939ae/twu1},
    doi = {https://doi.org/10.1016/j.fsidi.2020.300999},
    interhash = {03c59628d41e7d79621e075153e765c9},
    intrahash = {fd44828b19e3bb717ac145b1184939ae},
    issn = {2666-2817},
    journal = {Forensic Science International: Digital Investigation},
    keywords = {forensic review, software, source tools,},
    pages = 300999,
    timestamp = {2020-08-14T12:37:16.000+0200},
    title = {Digital forensic tools: Recent advances and enhancing the status quo},
    url = {http://www.sciencedirect.com/science/article/pii/S2666281720301864},
    volume = 34,
    year = 2020
    }