Stuxnet: the emergence of a new cyber weapon and its implications S Collins, S McCombie Journal of Policing, Intelligence and Counter Terrorism 7 (1), 80-91, 2012 | 211 | 2012 |
The US 2016 presidential election & Russia’s troll farms S McCombie, AJ Uhlmann, S Morrison Intelligence and National Security 35 (1), 95-114, 2020 | 62 | 2020 |
Characterising and Predicting Cyber Attacks Using the Cyber Attacker Model Profile (CAMP) P Watters, S McCombie, J Pieprzyk, R Layton Journal of Money Laundering Control 15 (4), 2012 | 62 | 2012 |
A preliminary profiling of internet money mules: an Australian perspective M Aston, S McCombie, B Reardon, P Watters 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009 | 52 | 2009 |
Cybercrime attribution: An eastern european case study S McCombie, J Pieprzyk, P Watters 7th Australian Digital Forensics Conference, 41-51, 2009 | 34 | 2009 |
A target-centric intelligence approach to WannaCry 2.0 AB Turner, S McCombie, AJ Uhlmann Journal of Money Laundering Control 22 (4), 646-665, 2019 | 33 | 2019 |
Authorship attribution of irc messages using inverse author frequency R Layton, S McCombie, P Watters 2012 Third Cybercrime and Trustworthy Computing Workshop, 7-13, 2012 | 33 | 2012 |
Winning the phishing war: A strategy for Australia S McCombie, J Pieprzyk 2010 Second Cybercrime and Trustworthy Computing Workshop, 79-86, 2010 | 32 | 2010 |
Discerning payment patterns in Bitcoin from ransomware attacks AB Turner, S McCombie, AJ Uhlmann Journal of Money Laundering Control 23 (3), 545-589, 2020 | 25 | 2020 |
Analysis techniques for illicit bitcoin transactions AB Turner, S McCombie, AJ Uhlmann Frontiers in Computer Science 2, 600596, 2020 | 21 | 2020 |
Forensic characteristics of phishing petty theft or organized crime? S McCombie, P Watters, A Ng, B Watson WEBIST 2008-4th International Conference on Web Information Systems and …, 2008 | 21 | 2008 |
Visualization of ATM usage patterns to detect counterfeit cards usage B Reardon, K Nance, S McCombie 2012 45th Hawaii International Conference on System Sciences, 3081-3088, 2012 | 19 | 2012 |
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime? PA Watters, A Herps, R Layton, S McCombie 2013 Fourth Cybercrime and Trustworthy Computing Workshop, 44-49, 2013 | 17 | 2013 |
Follow the money: Revealing risky nodes in a Ransomware-Bitcoin network A Turner, S McCombie, A Uhlmann | 13 | 2021 |
Trouble in Florida: the Genesis of Phishing attacks on Australian banks S McCombie School of Computer and Information Science, Edith Cowan University, Perth …, 2008 | 12 | 2008 |
Computer forensic: An issue of definitions S McCombie, M Warren Australian Computer, Network & Information Forensics Conference (1st: 2003), 1-4, 2003 | 12 | 2003 |
Phishing the long line: transnational cybercrime from Eastern Europe to Australia SJ McCombie Macquarie University, 2012 | 9 | 2012 |
Threat actor oriented strategy: Knowing your enemy to better defend, detect and respond to cyber-attacks S McCombie Journal of the Australian Institute of Professional Intelligence Officers 26 …, 2018 | 7 | 2018 |
A methodology for analyzing the credential marketplace PA Watters, S McCombie Journal of Money Laundering Control 14 (1), 32-43, 2011 | 7 | 2011 |
A profile of an information warfare attack S McCombie, M Warren Deakin University, School of Computing and Mathematics, 2000 | 6 | 2000 |