Jill Slay

Prof Jill Slay

SmartSat Chair: Cybersecurity

School of Computer Science and Information Technology

College of Engineering and Information Technology

Available For Media Comment.


Professor Jill Slay is currently the University of South Australia SmartSat Professorial Chair in Cybersecurity and researches in  the SmartSat Australian Co-operative Research Centre (CRC).  She has established an international research reputation in cyber security (particularly Digital Forensics, Cyber Intelligence and Cyberwarfare) and has worked in collaboration with the Australian Federal and State governments and with many industry partners.  
Her current work focuses on the context of satellite cybersecurity and resilience.  She has also been an Affiliate Faculty member with Professor Corey Schou at Idaho State University for nearly twenty years.  She has published  more than 200 outputs in information assurance, critical infrastructure protection, security and forensic computing.  She has completed the supervision of 25 PhDs and many Masters and Honours theses and has been awarded over AUD 5 million in research income. She also  has many years of experience of governance through University Boards and Committees and government collaboration and works closely with the Australian Defence industry and several smaller cyber security start-ups in cyber risk and resilience research, development and training.
Jill was the previous Chair of the Board of ISC2 . Other completed roles have included Chair of the Defence Employment Partnering Network Advisory Committee and a  Director of the Oceania Cyber Security Centre. 
Jill was in 2017-2019 Director of Cyber Resilience Initiatives for the Australian Computer Society (ACS) and led ACS work on the development of Professional Standards in Cyber Security with ISC2 and ISACA.  
Jill was made a Member of the Order of Australia (AM) for service to the information technology industry through contributions in the areas of forensic computer science, security, protection of infrastructure and cyber-terrorism.  She a Fellow of ISC2 and the ACS, both  awarded for her service to the information security industry.

1.      Satellite Cyber Security

2.      Assessing Mission Critical Aspects of Cyber Attack and Defence

3.      Cyber Intrusions, Detection and Forensics

4.      Computer-human interaction  

5.      Cyber security standards and skills

6.       Cyber Dependency and Resilience of Critical Infrastructure  

Year Citation
2024 Al Hawawreh, M., Moustafa, N., & Slay, J. (2024). A threat intelligence framework for protecting smart satellite-based healthcare networks. Neural Computing and Applications, 36(1), 15-35.
DOI
2024 Hassanin, M., Moustafa, N., Razzak, I., Tanveer, M., Ormrod, D., & Slay, J. (2024). Dynamic hypersphere embedding scale against adversarial attacks. IEEE Transactions on Engineering Management, 71, 12475-12486.
DOI
2024 Salim, S., Moustafa, N., Hassanian, M., Ormod, D., & Slay, J. (2024). Deep federated learning-based threat detection model for extreme satellite communications. IEEE Internet of Things Journal, 11(3), 3853-3867.
DOI
2022 Ngo, Q. T., Phan, T. K., Xiang, W., Mahmood, A., & Slay, J. (2022). Two-tier cache-aided full-duplex hybrid satellite--terrestrial communication networks. IEEE Transactions on Aerospace and Electronic Systems, 58(3), 1753-1765.
DOI Scopus27
2022 Koroniotis, N., Moustafa, N., & Slay, J. (2022). A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks. Computers and Electrical Engineering, 99(107745), 1-15.
DOI
2021 Plotnek, J. J., & Slay, J. (2021). Cyber terrorism: a homogenized taxonomy and definition. Computers & Security, 102(article no. 102145), 1-9.
DOI
2021 Plotnek, J. J., & Slay, J. (2021). Power systems resilience: definition and taxonomy with a view towards metrics. International Journal of Critical Infrastructure Protection, 33(100411), 1-9.
DOI
2021 Ngo, Q. T., Phan, K. T., Xiang, W., Mahmood, A., & Slay, J. (2021). On Edge Caching in Satellite - IoT Networks. IEEE Internet of Things Magazine, 4(4), 107-112.
DOI Scopus10
2019 Moustafa, N., Hu, J., & Slay, J. (2019). A holistic review of Network Anomaly Detection Systems: a comprehensive survey. Journal of Network and Computer Applications, 128, 33-55.
DOI
2017 Haider, W., Hu, J., Slay, J., Turnbull, B. P., & Xie, Y. (2017). Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. Journal of network and computer applications, 87, 185-192.
DOI
2016 Thompson, M. A., Ryan, M. J., Slay, J., & McLucas, A. C. (2016). Harmonized taxonomies for security and resilience. Information Security Journal, 25(1-3), 54-67.
DOI
2016 Moustafa, N., & Slay, J. (2016). The evaluation of Network Anomaly Detection Systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal, 25(1-3), 18-31.
DOI
2015 Watt, A. C., & Slay, J. (2015). First responders actions to cope with volatile digital evidence. International Journal of Electronic Security and Digital Forensics, 7(4), 381-399.
DOI
2014 Irwin, A. S. M., Slay, J., Choo, K. K. R., & Lui, L. (2014). Money laundering and terrorism financing in virtual environments: a feasibility study. Journal of money laundering control, 17(1), 50-75.
DOI
2013 Tassone, C., Martini, B., Choo, K. K. R., & Slay, J. (2013). Mobile device forensics: a snapshot. Trends and issues in crime and criminal justice, (460), 1-7.
2013 Irwin, A. S. M., Slay, J., Choo, K. K. R., & Liu, L. (2013). Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective. Journal of money laundering control, 16(1), 6-40.
DOI Scopus12 WoS5
2012 Virallikattur, D. S., Sitnikova, E., & Slay, J. (2012). An integrated tool-support for small team meetings: lessons from observations of team meetings in organisations. International journal of computer applications, 45(7), 1-7.
2012 Virallikattur, D. S., Sitnikova, E., & Slay, J. (2012). Lessons towards developing and integrated tool-support for small team meetings. International journal of information engineering and electronic business, 4(5), 42-49.
DOI
2012 Irwin, D., Dadej, A., & Slay, J. (2012). Extraction of electronic evidence from VoIP: identification and analysis of digital speech. Journal of digital forensics, security and law, 7(3), 55-82.
DOI
2012 Ariffin, A., Slay, J., & Jazri, H. (2012). Digital Forensics Institute in Malaysia: the way forward. Digital Evidence and Electronic Signature Law Review, 9(0), 51-57.
DOI
2011 Beckett, J., & Slay, J. (2011). Scientific underpinnings and background to standards and accreditation in digital forensics. Digital investigation: the international journal of digital forensics & incident response, 8(2), 114-121.
DOI
2011 Slay, J. (2011). Being, becoming and belonging: some thoughts on academic disciplinary effects. Cultural studies of science education, 6(4), 841-843.
DOI
2011 Slay, J., & Simon, M. P. (2011). Investigating modern communication technologies: the effect of internet-based communication technologies on the investigation process. Journal of digital forensics, security and law, 6(4), 35-62.
2010 Guo, Y., & Slay, J. (2010). Testing forensic copy function of computer forensics investigation tools. Journal of digital forensic practice, 3(1), 46-61.
DOI
2010 Guo, Y., & Slay, J. (2010). Computer forensic functions testing: media preparation, write protection and verification. Journal of digital forensics, security and law, 5(2), 5-20.
2009 Slay, J., & Simon, M. P. (2009). Voice over IP: privacy and forensic implications. Journal of digital crime and forensics, 1(1), 89-101.
DOI
2009 Guo, Y., Slay, J., & Beckett, J. (2009). Validation and verification of computer forensic software tools-searching function. Digital investigation, 6, 12-22.
DOI
2009 Mubarak, S., & Slay, J. (2009). Protecting clients from insider attacks on trust accounts. Information security technical report, 14(4), 202-212.
DOI
2008 Pavlic, T., Slay, J., & Turnbull, B. P. (2008). Developing a process model for the forensic extraction of information from desktop search applications. Journal of digital forensics, security and law, 3(1), 35-55.
DOI
2007 Budimir, N., & Slay, J. (2007). Identifiying non-volatile data storage areas : unique notebook indentification information as digital evidence. Journal of Digital Forensics, Security and Law.
2006 Slay, J., & Schulz, F. H. R. (2006). Development of an ontology based forensic search mechanism : proof of concept. Journal of digital forensics, security and law.
2006 Turnbull, B., Blundell, B., & Slay, J. (2006). Google desktop as a source of digital evidence. International journal of digital evidence, 5(1), 1-12.
2006 Slay, J., & Turnbull, B. (2006). Computer security education and research in Australia. IEEE Security & Privacy Magazine, 4(5), 60-63.
DOI
2003 Slay, J. (2003). IS security, trust and culture: a theoretical framework for managing IS security in mulitcultural settings. Campus-Wide Information Systems: The Journal of Technology on Campus, 20(3), 98-104.
DOI
2002 Slay, J. (2002). A cultural framework for the interoperability of C2 systems. Journal of information warfare.
2001 Slay, J. (2001). Research perspectives on culturally sensitive science education. Intercultural Education, 12(2), 173-184.
DOI

Year Citation
2021 Ngo, Q. T., Phan, K. T., Xiang, W., Mahmood, A., & Slay, J. (2021). Two-tier cache-aided full-duplex content delivery in satellite-terrestrial networks. In Event/exhibition information: 10th International Conference on Computational Data and Social Networks, CSoNet 2021, Virtual, 15/11/2021-17/11/2021
Source details - Title: International Conference on Computational Data and Social NetworksCSoNet 2021: Computational Data and Social Networks (Vol. 13116 LNCS, pp. 291-302). Switzerland: Springer.

DOI
2020 Ismail, S., Sitnikova, E., & Slay, J. (2020). SCADA systems cyber security for critical infrastructures: case studies in multiple sectors. In M. Khosrow-Pour (Ed.), Source details - Title: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 446-464). US: IGI Global.
DOI
2014 Ismail, S. B., Sitnikova, E., & Slay, J. (2014). Towards developing SCADA systems security measures for critical infrastructure against cyber-terrorist attacks. In N. Cuppens-Boulahia (Ed.), Event/exhibition information: IFIP International Information Security Conference 2014, Marrakesh, Morocco, 02/06/2014-04/06/2014
Source details - Title: ICT systems Security and privacy Protection (pp. 242-249). US: Springer.

DOI
2011 Guo, Y., & Slay, J. (2011). Data recovery function testing for digital forensic tools. In K. Chow, & S. Shenoi (Eds.), Event/exhibition information: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, 04/01/2010-06/01/2010
Source details - Title: Advances in Digital Forensics VI (pp. 297-311). Germany: Springer.

DOI
2011 Irwin, D., & Slay, J. (2011). Extracting evidence related to VoIP calls. In G. Peterson, & S. Shenoi (Eds.), Event/exhibition information: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, US, 31/01/2011–02/02/2011
Source details - Title: Advances in Digital Forensics VII (pp. 221-228). US: Springer.
2009 Slay, J., & Sitnikova, E. (2009). The development of a generic framework for the forensic analysis of SCADA and process control systems. In M. Sorrell (Ed.), Event/exhibition information: International Conference on Forensics in Telecommunications, Information, and Multimedia 2009, Adelaide, South Australia, 19/01/2009-21/01/2009
Source details - Title: Forensics in telecommunications, information and multimedia (pp. 77-82). Germany: Springer.

DOI
2009 Slay, J., Lin, Y. C., Turnbull, B., Beckett, J., & Lin, P. (2009). Towards a formalization of digital forensics. In G. Peterson (Ed.), Event/exhibition information: IFIP International Conference on Digital Forensics 2009, Orlando, USA, 26/01/2009-28/01/2009
Source details - Title: Advances in Digital Forensics V (pp. 37-47). Germany: Springer.

DOI
2008 Slay, J., & Miller, M. (2008). Lessons learned from the Maroochy Water Breach. In E. Goetz (Ed.), Event/exhibition information: International Conference on Critical Infrastructure Protection, Hanover, USA, 19/03/2007-21/03/2007
Source details - Title: Critical Infrastructure Protection (pp. 73-82). Netherlands: Springer.
2008 Pavlic, T., Slay, J., & Turnbull, B. (2008). Extracting evidence using google desktop search. In Source details - Title: Advances in Digital Forensics IV (pp. 43-50). US: Springer.
DOI
2007 Taylor, J. M., Slay, J., & Kurzel, F. (2007). An ontological approach to learning objects. In Source details - Title: Learning objects : applications, implications, and future directions (pp. 35-61). Santa Rosa, Calif.: Informing Science Press.
2007 Slay, J. (2007). Naturalistic inquiry in cross-cultural research: a narrative turn. In P. Taylor (Ed.), Source details - Title: Contemporary Qualitative Research: Exemplars for Science and Mathematics educators (pp. 93-104). Netherlands: Springer.
DOI
2006 Wilsdon, T. W., & Slay, J. (2006). Voice over IP for Rural Telecommunication Provision. In Source details - Title: Encyclopedia of Developing Regional Communities with Information and Communciation Technology (pp. 723-728). Hershey, PA, USA: Idea Group Publishing.
2006 Wilsdon, T., & Slay, J. (2006). The use of Voice Over IP for rural telecommunication provision. In S. Marshall (Ed.), Source details - Title: Encyclopedia of developing regional communities with information and communication technology (pp. 723-728). Hershey, PA: Idea Group Reference.
DOI
2005 Pudney, P. K., & Slay, J. (2005). An investigation of unauthorised use of wireless networks in Adelaide, South Australia. In Event/exhibition information: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, 04/06/2005 - 06/06/2005
Source details - Title: Information Security and Privacy. ACISP 2005 (pp. 28-39). Germany: Springer-Verlag.

DOI

Year Citation
2024 Falco, G., Boschetti, N., Viswanathan, A., Bailey, B., Slay, J., Bennett, S., & Yahia, O. B. (2024). Minimum requirements for space system cybersecurity-ensuring cyber access to space. In Proceedings - 2024 IEEE 10th International Conference on Space Mission Challenges for Information Technology, SMC-IT 2024 (pp. 78-88). US: IEEE.
DOI
2023 Law, Y. W., Gliponeo, J. J., Singh, D., McGuire, J., Liang, J., Ho, S. Y., & Slay, J. (2023). Detecting and tracking hypersonic glide vehicles: a cybersecurity-engineering analysis of academic literature. In R. L. Curran (Ed.), Proceedings of the 18th International Conference on Cyber Warfare and Security Vol. 18 (pp. 189-198). UK: Academic Conferences International Limited.
DOI WoS3
2023 Uhongora, U., Mulinde, R., Law, Y. W., & Slay, J. (2023). Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems. In European Conference on Information Warfare and Security Eccws Vol. 2023-June (pp. 639-647). UK: Academic Conferences and Publishing International Ltd.
DOI Scopus7
2023 Edwards, A., Law, Y. W., Mulinde, R., & Slay, J. (2023). Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT Networks. In R. L. Wilson, & M. B. Curran (Eds.), PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS Vol. 18 (pp. 67-76). UK: ACAD CONFERENCES LTD.
DOI WoS2
2023 Uhongora, U., Plotnek, J., Mulinde, R., Thinyane, M., & Slay, J. (2023). Analyzing threats to SDN-based space systems using SPARTA framework. In Accelerating Space Commerce, Exploration, and New Discovery Conference, ASCEND 2023 Vol. 1 (pp. 1-9). US: American Institute of Aeronautics and Astronautics.
DOI
2022 Law, Y. W., & Slay, J. (2022). SIEM4GS: Security information and event management for a virtual ground station testbed. In T. Eze, N. Khan, & C. Onwubiko (Eds.), Proceedings of the 21st European Conference on Cyber Warfare and Security Vol. 21 (pp. 150-159). UK: Academic Conferences International Limited.
2022 Plotnek, J. J., & Slay, J. (2022). A new dawn for space security. In Proceedings Of The 17Th International Conference On Cyber Warfare And Security (ICCWS 2022) Vol. 17 (pp. 253-261). UK: Acada Conferences.
DOI
2022 Law, Y. W., & Slay, J. (2022). SIEM4GS: Security Information and Event Management for a Virtual Ground Station Testbed. In European Conference on Information Warfare and Security Eccws Vol. 2022-June (pp. 150-159). Academic Conferences and Publishing International Ltd.
DOI
2021 Ormrod, D., Slay, J., & Ormrod, A. (2021). Cyber-worthiness and cyber-resilience to secure low earth orbit satellites. In J. Lopez, A. Siraj, & K. Perumalla (Eds.), Proceedings of the 16th International Conference on Cyber Warfare and Security (ICCWS 2021) (pp. 257-266). UK: ACI - Academic Conferences International.
DOI
2021 van der Watt, R., & Slay, J. (2021). Modification of the Lockheed Martin Cyber Kill Chain (LMCKC) for cyber security breaches concerning low earth orbit (LEO) satellites. In Proceedings of the 16th International Conference on Cyber Warfare and Security (ICCWS 2021) (pp. 473-485). UK: Academic Conferences International.
DOI
2018 Moustafa, N., Creech, G., & Slay, J. (2018). Anomaly detection system using beta mixture models and outlier detection. In Advances in Intelligent Systems and Computing Vol. 710 (pp. 125-135). Switzerland: Springer.
DOI
2018 Moustafa, N., Creech, G., & Slay, J. (2018). Flow aggregator module for analysing network traffic. In Advances in Intelligent Systems and Computing Vol. 710 (pp. 19-29). Singapore: Springer.
DOI
2018 Koroniotis, N., Moustafa, N., Sitnikova, E., & Slay, J. (2018). Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In J. Hu (Ed.), 9th International Conference on Mobile Networks and Management, MONAMI 2017 (pp. 30-44). US: Springer.
DOI
2018 Moustafa, N., & Slay, J. (2018). A network forensic scheme using correntropy-variation for attack detection. In IFIP International Conference on Digital Forensics: Advances in Digital Forensics XIV (pp. 225-239). US: Springer.
DOI
2017 Senarath, A., Arachchilage, N. A. G., & Slay, J. (2017). Designing privacy for you: a practical approach for user-centric privacy. In T. Tryfonas (Ed.), 5th International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2017 Vol. 10292 (pp. 739-752). US: Springer.
DOI
2017 Wijayarathna, C., Arachchilage, N. A. G., & Slay, J. (2017). A generic cognitive dimensions questionnaire to evaluate the usability of security APIs. In T. Tryfonas (Ed.), 5th International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2017 Vol. 10292 (pp. 160-173). US: Springer.
DOI
2015 Elsayed, S., Sarker, R., & Slay, J. (2015). Evaluating the performance of a differential evolution algorithm in anomaly detection. In 2015 IEEE Congress on Evolutionary Computation, CEC 2015 - Proceedings (pp. 2490-2497). US: IEEE.
DOI
2015 Moustafa, N., & Slay, J. (2015). The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015 (pp. 25-31). US: IEEE.
DOI
2015 Moustafa, N., & Slay, J. (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings (pp. 1-6). US: IEEE.
DOI
2015 Shah, Z., Mahmood, A. N., & Slay, J. (2015). Forensic potentials of solid state drives. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST Vol. 153 (pp. 113-126). US: Springer.
DOI
2015 Ismail, S., Sitnikova, E., & Slay, J. (2015). SCADA systems cyber security for critical infrastructures: case studies in the transport sector. In J. Zaaiman, & L. Leenen (Eds.), Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015 (pp. 425-433). UK: Academic Conferences International Limited.
2015 Ismail, S., Sitnikova, E., & Slay, J. (2015). Studying SCADA organisations information security goals: an integrated system theory approach. In Pacific Asia Conference on Information Systems, PACIS 2015 - Proceedings (pp. 1-14). US: Association for Information Systems.
2015 Moustafa, N., & Slay, J. (2015). Creating novel features to anomaly network detection using DARPA-2009 data set. In N. Abouzakhar (Ed.), Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS-2015) (pp. 204-212). US: Academic Conferences & Publishing International.
2015 Moustafa, N., & Slay, J. (2015). A hybrid feature selection for network intrusion detection systems: central points. In B. Hutchinson (Ed.), Australian Information Warfare and Security Conference (pp. 5-13). Australia: Security Research Institute, Edith Cowan University.
DOI
2014 Ismail, S., Sitnikova, E., & Slay, J. (2014). Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: a pilot study. In 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD14) (pp. 1000-1006). US: IEEE Press.
DOI
2014 Xie, M., Hu, J., & Slay, J. (2014). Evaluating host-based anomaly detection systems: application of the one-class SVM algorithm to ADFA-LD. In 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD (pp. 978-982). US: IEEE.
DOI Scopus70
2013 Ariffin, A., Slay, J., & Choo, K. K. (2013). Data recovery from proprietary-formatted CCTV hard disks. In G. Peterson, & S. Shenoi (Eds.), Advances in digital forensics IX (pp. 213-223). US: Springer.
DOI
2013 Ariffin, A., Choo, K. K. R., & Slay, J. (2013). Digital camcorder forensics. In C. Thomborson, & U. Parampalli (Eds.), AISC '13 Proceedings of the Eleventh Australasian Information Security Conference (pp. 39-47). Australia: Australian Computer Society.
2013 Ariffin, A., D'Orazio, C. J., Choo, K. K., & Slay, J. (2013). iOS forensics: how can we recover deleted image files with timestamp in a forensically sound manner?. In Proceedings: 2013 International Conference on Availability, Reliability and Security: ARES 2013 (pp. 375-382). US: IEEE Press.
DOI
2012 Osborne, G., Turnbull, B., & Slay, J. (2012). Development of info vis software for digital forensics. In Proceedings : 2012 IEEE 36th International Conference on Computer Software and Applications Workshops (pp. 213-217). US: IEEE.
DOI
2012 Sitnikova, E., & Slay, J. (2012). Pathway into a security professional: a new cyber security and forensic computing curriculum. In 2012 Proceedings of the Conference on Digital Forensics, Security & Law (pp. 193-203). US: Association of Digital Forensics, Security and Law.
2012 Osborne, G., Thinyane, H., & Slay, J. (2012). Visualizing information in digital forensics. In G. Peterson, & S. Shenoi (Eds.), Advances in digital forensics VIII (pp. 35-47). Germany: Springer.
DOI
2011 Simon, M. P., & Slay, J. (2011). Recovery of pidgin chat communication artefacts from physical memory: a pilot test to determine feasibility. In Proceedings of the sixth international conference on availability, reliability and security ARES 2011 (pp. 183-188). US: IEEE.
DOI
2011 Osborne, G., & Slay, J. (2011). Digital forensics infovis: an implementation of a process for visualisation of digital evidence. In Proceedings of the Sixth International Conference on Availability, Reliability and Security ARES 2011 (pp. 196-201). US: IEEE.
DOI
2011 Hunt, R., & Slay, J. (2011). A new approach to developing attack taxonomies for network security - including case studies. In Proceedings of the 17th IEEE International Conference on Networks (pp. 281-286). Singapore: IEEE.
DOI
2010 Simon, M., & Slay, J. (2010). Recovery of Skype application activity data from physical memory. In Proceedings of the Fifth International Conference on Availability, Reliability and Security ARES 2010 (pp. 283-288). US: IEEE.
DOI
2010 Guo, Y., & Slay, J. (2010). A function oriented methodology to validate and verify forensic copy function of digital forensic tools. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (pp. 665-670). US: IEEE.
DOI
2010 Hunt, R., & Slay, J. (2010). The design of real-time adaptive forensically sound secure critical infrastructure. In Proceedings of the 4th international conference on network and system security (pp. 328-333). US: IEEE.
DOI
2010 Hunt, R., & Slay, J. (2010). Achieving critical infrastructure protection through the interaction of computer security and network forensics. In Proceedings of the 8th annual conference on privacy, security and trust (pp. 23-30). US: IEEE.
DOI
2010 Simon, M., & Slay, J. (2010). What are you looking for: identification of remnant communication artefacts in physical memory!. In C. Valli (Ed.), Proceedings of the 2010 international cyber resilience conference. Australia: Edith Cowan University.
2010 Osborne, G., Turnbull, B., & Slay, J. (2010). The 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics information visualisation. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (pp. 629-634). US: IEEE.
DOI
2009 Simon, M., & Slay, J. (2009). Enhancement of forensic computing investigations through memory forensic techniques. In Proceedings of the International Conference on Availability, Reliability and Security ARES 2009 (pp. 995-1000). US: IEEE.
DOI
2009 Sitnikova, E., & Slay, J. (2009). Enhancing industrial control systems cyber-security capabilities: strategic plans, prevention and response. In 2009 Automation & Communication Technologies in Power Conference (pp. 1-7). Australia: IDC Technologies.
2009 Slay, J., Sitnikova, E., Campbell, A. P., Daniels, W. M., & May, R. (2009). Process control system security and forensics: a risk management simulation. In E. Leigh (Ed.), SIMTECT 2009: Simulation Concepts Capability and Technology (pp. 349-353). Australia: Simulation Industry Association Of Australia.
2008 Slay, J., & Sitnikova, E. (2008). Developing SCADA systems security course within a systems engineering program. In Proceedings of the 12th Colloquium for Information systems security education (CISSE) (pp. 101-108). US: CISSE.
2008 Broadway, J., Turnbull, B., & Slay, J. (2008). Improving the analysis of lawfully intercepted network packet data captured for forensic analysis. In Third international conference on availability, security and reliability ARES 08 (pp. 1361-1368). US: IEEE.
DOI
2008 Lin, Y. C., Slay, J., & Lin, I. L. (2008). Computer forensics and culture. In IEEE International Conference on Intelligence and Security Informatics, ISI 2008 Workshops: PAISI, PACCF, and SOCO 2008 Vol. 5075 (pp. 288-297). US: Springer.
DOI
2008 Turnbull, B., & Slay, J. (2008). Wi-Fi network signals as a source of digital evidence: wireless network forensics. In S. Jakoubi, S. Tjoa, & E. R. Weippl (Eds.), Third international conference on availability, security and reliability proceedings (ARES 08) (pp. 1355-1360). US: IEEE.
DOI
2008 Slay, J., & Simon, M. (2008). Voice over IP forensics. In M. Sorell, & L. White (Eds.), e-forensics: 1st international conference on forensic applications and techniques in telecommunications, information and multimedia (pp. 1-6). US: ACM.
DOI
2007 Lin, Y. C., Slay, J., & Lin, P. (2007). A study on the necessity of integrating non-repudiation into MANET : from computer forensic perspective. In Cyberspace 2007 : Cyber Security, Cyber Crime and Cyber Law. Taiwan: National Library Publisher.
2007 Turnbull, B. P., & Slay, J. (2007). Wireless forensic analysis tools for use in the electronic evidence collection process. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 267a). USA: IEEE Computer Society.
DOI
2007 Simon, M. P., & Slay, J. (2007). Forensic computing training, certification and accreditation: an Australian overview. In L. Futcher, & R. Dodge (Eds.), Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA (pp. 109-112). US: Springer,.
DOI
2007 Radenovic, V., & Slay, J. (2007). An investigation into the suitability of unidirectional networks for use in e-Commerce Security. In R. Remenyi, & D. D. (Eds.), Proceedings of the 6th European Conference on Information Warfare and Security. Reading, UK: Academic Conference International.
2007 Morrison, J. B., & Slay, J. (2007). Does knowledge management theory support the achievment of knowledge superiority in defence?. In Simulation : Improving capability and competitiveness. Queensland: Simulation Industry Association of Australia.
2007 Beckett, J. J., & Slay, J. (2007). Digital forensics : validation and verification in a dynamic work environment. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 266a). USA: IEEE Computer Society.
DOI
2007 Slay, J., & Przibilla, A. T. (2007). iPod forensics : forensically sound examination of an Apple iPod. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 267c). USA: IEEE Computer Society.
DOI
2006 Lin, Y., & Slay, J. (2006). QoS Issues of Using Probabilistic Non-Repudiation Protocol in Mobile Ad Hoc Network Environment. In 4th Australian Information Security Management Conference. Perth.
2006 Wilsdon, T. W., & Slay, J. (2006). Forensic Computing Tool Testing utilizing Black Box Techniques. In 4th Australian Digital Forensics Conference. Edith Cowan University.
2006 Beckett, J. J., Slay, J., & Turnbull, B. P. (2006). Forensic computing: developing specialist expertise within the CS curriculum. In Proceedings of the 10th Colloquium for Information Systems Security Education. Florida: The Printing House Inc.
2006 Simon, M. P., & Slay, J. (2006). Voice over IP : forensic computing implications. In Proceedings of the 4th Australian digital forensics conference. Western Australia: Edith Cowan University.
2006 Slay, J., & Miller, M. B. (2006). A Security Architecture for SCADA Networks. In ACIS 2006 Proceedings. Australia: Australiasian Association for Information Systems.
2006 Slay, J., & Turnbull, B. P. (2006). The need for a technical approach to digital forensic evidence collection for wireless technologies. In Proceedings of the 2006 IEEE workshop on information assurance (pp. 124-132). United States: IEEE.
DOI
2006 Mubarak, S., & Slay, J. (2006). An explorative study on information security of trust accounts within law firms in South Australia : implications for IT security management. In P. Pichappah, & P. Pit (Eds.), Proceedings : First IEEE International Conference on Digital Information Management (pp. 55-62). United States: IEEE.
DOI
2006 Lin, Y. C., & Slay, J. (2006). All-or-nothing solution to the problem in the utilization of probabilistic non-repudiation protocol in MANETs. In Proceedings of the 2006 Conference on Information Management and Practices. Taiwan: NTCB.
2006 Wilsdon, T. W., & Slay, J. (2006). Validation of forensic computing software utilizing black box testing techniques. In Proceedings of the 4th Australian Digital Forensics Conference. Western Australia: Edith Cowan University.
2005 Blundell, B. D., Huang, D., Slay, J., Turnbull, B. P., & Wilsdon, T. W. (2005). Development of a zero-skills forensic laptop registration and identification tool. In European Conference of Information Warfare Glamorgan.
2005 Slay, J., Dong, X., Blundell, B., Turnbull, B. P., & Wilsdon, T. W. (2005). Development of a 'zero-skills' forensic laptop registration and identification tool. In Proceedings of the European Conference on Information Warfare. University of Glamorgan, UK: Academic Conferences.
2005 Turnbull, B. P., Blundell, B. D., & Slay, J. (2005). Googling Forensics- an analysis of the Google Desktop Search. In 3rd Australian Network, Information and Computer Forensics Conference. Perth Australia.
2005 Slay, J. (2005). Developing the cross-disciplinary nature of information assurance in the undergraduate curriculum. In Proceedings of the 9th Colloquium for Information Systems Security Education. Georgia: Georgia Institute of Technology.
2005 Lin, Y. C., & Slay, J. (2005). Non-repudiation in pure mobile ad hoc network. In Proceedings of the 3rd Australian Information Security Management Conference. Western Australia: Edith Cowan University.
2005 Wilsdon, T. W., & Slay, J. (2005). Digital forensics: Exploring validation, verification and certification. In Proceedings of the first international workshop on systematic approaches to digital forensic engineering (pp. 48-55). USA: IEEE.
DOI
2005 Slay, J., & Turnbull, B. P. (2005). The 802.11 technology gap - case studies in crime. In Tencon 2005 - 2005 IEEE region 10 proceeding (pp. 1-7). USA: IEEE.
DOI
2005 Slay, J., & Lock, P. (2005). Developing an undergraduate IT security stream: industry certification and the development of graduate qualities. In Success Through Information Security Knowledge: Proceedings of the IFIP TC11 WG 11.8. Russia: Moscow Engineering Physics Institute.
2005 Wilsdon, T. W., & Slay, J. (2005). Towards a validation framework for forensic computing tools in Australia. In Proceedings of the 4th European Conference on Information Warfare and Security. UK: Academic Conferences.
2005 Turnbull, B. P., Blundell, B., & Slay, J. (2005). Googling forensics. In Proceedings of the 3rd Australian Computer Network and Information Forensics Conference. W Australia, online: http://scissec.scis.ecu.edu.au/wordpress/conference_proceedings/2005/forensics/: Edith Cowan University.
2005 Slay, J., & Jorgensen, K. (2005). Applying filter clusters to reduce search state space. In Advances in digital forensics : IFIP International Conference on Digital Forensics, National Center for Forensic Science Vol. 194 (pp. 295-301). US: Springer.
DOI
2004 Li, X., & Slay, J. (2004). Securing wireless ad hoc networks: towards agent security architecture. In Proceedings of the Fifth Australian Information Warfare and Security Conference: From Information Warfare to Information Operations (pp. 1-5). Western Australia: Edith Cowan University.
2004 Slay, J., & Turnbull, B. P. (2004). The uses and limitations of unidirectional network bridges in a secure electronic commerce environment. In Proceedings of the 4th International Network Conference. UK: University of Plymouth.
2004 Slay, J., Hannan, M. B., Broucek, V., & Turner, P. (2004). Developing forensic computing tools and techniques within a holistic framework: an Australian approach. In Proceedings from the 5th IEEE SMC (systems, man and cybernetics) information assurance workshop (pp. 394-400). Piscataway, NJ, USA: IEEE.
DOI
2004 Wilsdon, T. W., & Slay, J. (2004). A review of the security and performance issues in the use of voice over IP for rural telecommunication provision. In EICAR 2004 Conference: Best Paper Proceedings. France: EICAR (Ecole Internationale de Creation Audiovisuelle et de Realisation).
2004 Kuusisto, T., Slay, J., & Kuusisto, R. (2004). An information security culture approach to knowledge security. In H. Hutchinson, & W. William (Eds.), Proceedings of 5th Australian Information Warfare and Security Conference. Australia: Edith Cowan University.
2004 Slay, J., & Quirchmayr, G. (2004). A formal model for the relationship between culture and trust within IS security management. In 2nd Australian Information Security Management Conference: Securing the Future. Western Australia: Edith Cowan University.
2004 Slay, J. (2004). Embedding industry standards within the undergraduate IT security curriculum : an Australian implementation. In Proceedings from the eighth colloquium for information systems security education : June 7-10, 2004, West Point, New York. USA: CISSE.
2004 Li, X., Gordon, S. D., & Slay, J. (2004). On demand public key management for wireless ad hoc networks. In Australian Telecommunication Networks & Applications Conference (ATNAC) 2004. Australia: ATNAC 2004.
2004 Slay, J., & Drymalik, C. P. (2004). An investigation of the effect of work place culture on the security of user passwords. In The 3rd European Conference of Information Warfare and Security Proceedings. UK: Academic Conferences International.
2003 Quirchmayr, G., Slay, J., Koronios, A. P., & Darzanos, K. (2003). A business process engineering based approach towards incorporating security in the design of global information systems. In Proceedings of the Seventh Pacific Asia Conference on Information Systems. Australia.
2003 Kurzel, F., Slay, J., & Hagenus, K. (2003). Personalising the learning environment. In 2003 Informing Science and Information Technology Education. USA: Informing Science Institute.
2003 Turnbull, B. P., & Slay, J. (2003). Separated networks and unidirectional network bridges in a secure electronic commerce environment. In Proceedings of the 4th Australian Information Warfare and IT Security Conference (pp. 341-346). Australia: University of South Australia.
2003 Darzanos, K., Wahlstrom, K. A., Slay, J., Mills, J. E., & Ayre, M. (2003). Increasing the participation of female students in IT education: a University of South Australia case study. In S. Spencer (Ed.), AusWIT2003 Participation, Progress and Potential: Proceedings of the 2003 Australian Women in IT Conference. Australia: University of Tasmania.
2003 Kurzel, F., & Slay, J. (2003). Towards a personalised learning environment. In AUSWEB2003. Lismore, Australia: Southern Cross University.
2003 Kurzel, F., & Slay, J. (2003). The development of a personalised learning environment. In Information Communication Technologies in Education. http://www.ineag.gr/icicte/papers2003/toc.htm: National and Kapodistrian University of Athens.
2003 Slay, J., Quirchmayr, G., Kurzel, F., & Hagenus, K. (2003). Adaptive learning environments for CS education - from AMLE to live spaces. In Proceedings of the Fifth Australasian Computing Education Conference. Australia: Australian Computer Society Inc.
2003 Turnbull, B. P., Nicholson, D. J., & Slay, J. (2003). Wireless networking security - a practical summary of 802.11b in Adelaide, Australia. In Proceedings of the 4th Australian Information Warfare and IT Security Conference (pp. 347-355). Australia: University of South Australia.
2003 Wilsdon, T. W., Drymalik, C. P., & Slay, J. (2003). The vulnerabilities of 3G wireless systems with respect to proposed Australian implementations: a literary review. In Proceedings of the 4th Australian Information Warfare and IT Security Conference (pp. 379-390). Australia: University of South Australia.
2003 Slay, J. (2003). Modern information warfare with an historical Chinese face: the case of Falun Gong. In Proceedings of the 2nd European Conference on Information Warfare. na: Academic Conferences Limited.
2002 Kurzel, F., & Slay, J. (2002). Towards an adaptive multimedia learning environment: An Australian solution to cross-cultural offshore delivery issues. In Proceedings of the Third International Network Conference. UK: University of Plymouth, Network Research Group.
2002 Slay, J. (2002). IS security, trust and culture: a theoretical framework for managing IS security in multicultural settings. In Proceedings of the 3rd International Network Conference. UK: University of Plymouth, Network Research Group.
2002 Kurzel, F., Slay, J., & Chau, Y. (2002). Towards an adaptive multimedia learning environment. In E. Cohen (Ed.), Information Science and IT Education Conference. http://ecommerce.lebow.drexel.edu/eli/2002Proceedings/toc.htm: Informing Science.
2002 Slay, H., & Slay, J. (2002). Augmented reality as a visualisation tool within information visualisation. In P. Kotze, L. Venter, & J. Barrow (Eds.), Proceedings of SAICSIT 2002 (pp. 252). South Africa: SAICSIT.
2002 Kurzel, F., Slay, J., & Chau, Y. (2002). Towards an adaptive multimedia learning environment: Enhancing the student experience. In P. Barker, & S. Rebelsky (Eds.), World Conference of Educational Multimedia, Hypermedia and Telecommunications. USA: AACE.
2002 Nafalski, A., Gol, O., Slay, J., & McDermott, K. J. (2002). Innovation in information and Communcation Technology Education at University of South Australia. In International Conferences on: ICT in Higher Education for the New Economy.
2002 Kurzel, F., Slay, J., & Chau, Y. (2002). Toward an Effective Online Learning Environment: An Adaptive Multimedia Solution. In Proceedings of Ausweb 2002. na: na.
2001 Quirchmayr, G., & Slay, J. (2001). Identifying emerging web-communication patterns between government and citizens. In 12th International workshop on database and expert systems applications (pp. 419-422). Piscataway, NJ, United States: IEEE Computer Society.
DOI
2001 Slay, J., & Burke, M. (2001). A world view analysis of the effect of culture within C2. In Proceedings: 6th International Command and Control Research and Technology Symposium. Annapolis, MD: Command and Control Research Program (CCRP).
2001 Slay, J., & Burke, M. (2001). Simulating the dynamics of information and knowledge operations. In Proceedings: 6th International Command and Control Research and Technology Symposium. www.dodccrp.org/6thICCRTS/cd/index.htm.
2001 Quirchmayr, G., & Slay, J. (2001). A BPR-based architecture for changing corporate approaches to security. In Proceedings of the 5th Australian Security Research Symposium. Perth: Edith Cowan University.
2001 Slay, J. (2001). Culture and sensemaking in information warfare. In W. Hutchinson (Ed.), Survival in the e-conomy. Perth: Edith Cowan University.
2001 Li, K., Vipahasna, P., & Slay, J. (2001). The Integration of Adaptive Techniques into an Educational Hypermedia System. In Proceedings of ICCE2001. N/A: N/A.
2000 Slay, J., & Li, K. W. (2000). Implementing Modern Approaches to Teacher Computer Science: A Cross-Cultural Perspective. In S. Young, J. Greer, H. Maurer, & Y. Chee (Eds.), Learning Societies in the New Millennium: Creativity, Caring and Commitments. Taipei, Taiwan: National Tsing Hua Uniersity, Taiwan.
2000 Slay, J. (2000). Students' Conceptualisations of Nature: A Chinese and Australian Cross-Cultural Comparison. In D. Yang (Ed.), Improving Classroom Research Through International Collaboration. Perth, WA: National key Centre for SSM, CUT, Perth, Australia.
2000 Warren, J. R., Slay, J., & Li, K. W. (2000). An authoring shell with intelligent reuse. In S. Young, J. Greer, H. Maurer, & Y. Chee (Eds.), Learning Societies in the New Millennium: Creativity, Caring and Commitments. Taipei, Taiwan: National Tsing Hua University, Taiwan.
2000 Slay, J. (2000). Implementing modern approaches to teaching computer science: a life long learning perspective. In D. Benzie, & D. Passey (Eds.), Proceedings of Conference on Educational Uses of Information and Communication Technologies. Beijing, China: Publishing House of Electronics Industry,.
1998 Slay, J. (1998). Using the WWW to create an effective cross cultural learning environment. In Teleteaching '98: Distnace learning, Training and Education, Proceedings II: proceedings of the XV IFIP Wor[l]d computer congress 31 August - 3 September 1998. Vienna, Austria.
  • IDTC - Quantum Technologies - Dehinde Molade, SA Dept of Innovation and Skills (formerly DSD), 25/12/2023 - 03/06/2027

  • Validation of a Space Cyber Security Framework using the Buccaneer Main Mission (BMM) as an Exemplar system, SmartSat CRC, 01/10/2025 - 01/10/2026

  • Smartsat P2-37 Cyber Jeopardy and Response (CY-JAR), SmartSat CRC, 06/12/2021 - 02/08/2023

  • SmartSat 2.14: Development of an Evil Digital Twin for LEO small satellite constellations, SmartSat CRC, 04/01/2021 - 01/07/2021


Connect With Me

External Profiles

Other Links