Items where Author is "Schreuders, ZC"
Up a level |
Schreuders, ZC and Cockcroft, T and Butterfield, E and Elliott, J and Soobhany, AR and Shan-A-Khuda, M (2020) Needs Assessment of Cybercrime and Digital Evidence in a UK Police Force. International Journal of Cyber Criminology, 14 (1). pp. 316-340. ISSN 0974-2891 DOI: https://doi.org/10.5281/zenodo.3757271
Schreuders, ZC and Shaw, T and Mac Muireadhaigh, A and Staniforth, P (2018) Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt. In: 2018 USENIX Workshop on Advances in Security Education, 13 August 2018 - 13 August 2018, Baltimore, MD, USA.
Duncan, R and Schreuders, ZC (2018) Security Implications of Running Windows Software on a Linux System Using Wine. Journal of Computer Virology and Hacking Techniques. ISSN 2274-2042 DOI: https://doi.org/10.1007/s11416-018-0319-9
Butterfield, EM and Dixon, MB and Miller, S and Schreuders, ZC (2018) Automated Digital Forensics. (Unpublished)
Schreuders, ZC (2018) CARI Project Postdoctoral Recruitment - Role, Interview Questions, and Information. CSI Centre Leeds Beckett University. (Unpublished)
Shan-A-Khuda, M and Schreuders, ZC (2018) Characteristics of Victims of Cybercrime. (Unpublished)
Soobhany, AR and Sheikh Akbari, A and Schreuders, ZC (2018) Image Linkage Application: User Guide. Manual. CSI Centre Leeds Beckett University. (Unpublished)
Schreuders, ZC and Cockcroft, TW and Butterfield, EM and Elliott, JR and Soobhany, AR and Shan-A-Khuda, M (2018) Needs Assessment of Cybercrime and Digital Evidence in a UK Police Force. (Unpublished)
Cockcroft, TW and Trevorrow, PA and Shan-A-Khuda, M and Schreuders, ZC (2018) Police Cybercrime Training: Perceptions, Pedagogy and Policy (Working Paper). (Unpublished)
Lambourne, AD and Elliott, JR and Miller, S and Collins, L and Schreuders, ZC (2018) Software Pilot and User Guide EWT: Chat Log Grooming Detection. Manual. CSI Centre Leeds Beckett University. (Unpublished)
Schreuders, ZC and Shaw, T and Shan-A-Khuda, M and Ravichandran, G and Keighley, J and Ordean, M (2017) Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events. USENIX.
Soobhany, AR and Sheikh Akbari, A and Schreuders, ZC (2017) Reinforced source camera identification using non-decimated wavelet transform. In: IET International Conference on Biomedical Image and Signal Processing, 13 May 2017 - 14 May 2017, Wuhan, China.
Soobhany, AR and Sheikh Akbari, A and Schreuders, ZC (2017) Source Camera Identification using Non-decimated Wavelet Transform. Communications in Computer and Information Science, 630. pp. 125-133. ISSN 1865-0929 DOI: https://doi.org/10.1007/978-3-319-51064-4_11
Schreuders, ZC and Smith, V and Butterfield, EM and Miller, S and Cockcroft, TW and Horvath, D and Trevorrow, PA and Elliott, JR and Lambourne, AD and Dixon, MB and Sheikh Akbari, A and Halmshaw, LD (2017) CARI Project Showcase Event. In: CARI Project Showcase Event: Tackling Cyber Crime and Improving Police Response Showcase, Headingley, UK. (Unpublished)
Schreuders, ZC and Cockcroft, TW and Butterfield, EM and Elliott, JR and Shan-A-Khuda, M (2017) Cybercrime Policing: Needs Analysis and Building a Research Culture. In: College of Policing PKF Event, Coventry, UK. (Unpublished)
Schreuders, ZC and Smith, V (2017) Police Knowledge Fund Showcase: CARI Project. In: Police Knowledge Fund Showcase, Coventry, UK.
Schreuders, ZC and Butterfield, EM (2016) Gamification for Teaching and Learning Computer Security in Higher Education. In: 2016 USENIX Workshop on Advances in Security Education (ASE 16), August 9th 2016, Austin, TX, USA.
Schreuders, ZC and Ardern, L (2015) Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment. In: The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015), 11 June 2015, Liverpool.
Butterfield, EM and Schreuders, ZC (2015) Student Led Data Recovery Services: Providing Digital Forensics students with relevant work experience. In: The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015), 11 June 2015, Liverpool.
Schreuders, ZC and Butterfield, EM and Staniforth, P (2015) An open cloud-based virtual lab environment for computer security education: A pilot study evaluation of oVirt. In: The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015), Liverpool.
Schreuders, ZC and Payne, C and McGill, T (2013) The functionality-based application confinement model. International Journal of Information Security, 12 (5). 393 - 422. ISSN 1615-5262 DOI: https://doi.org/10.1007/s10207-013-0199-4
Schreuders, ZC and McGill, T and Payne, C (2011) Empowering end users to confine their own applications: The results of a usability study comparing SELinux, AppArmor, and FBAC-LSM. ACM Transactions on Information and System Security, 14 (2). ISSN 1094-9224 DOI: https://doi.org/10.1145/2019599.2019604
Dixon, MB and Schreuders, ZC and Soobhany, AR and Trevorrow, PA and Miller, S and Collins, L DigiVisor Mobile App: Frontline Officer Awareness Development and Decision Support. (Unpublished)
Horvath, D and Wren, A and Collins, L and Trevorrow, P and Schreuders, ZC An Evidence-based Evaluation of the Role of the Digital Media Investigator Within West Yorkshire Police. (Unpublished)