• 109 Citations
  • 6 h-Index
20002021

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

2021

Denial and deception in the digital age: novel trends in an ancient art

Uhlmann, A. J., McCombie, S. & Watters, P., 2021, (Accepted/In press) Springer, Springer Nature. 200 p.

Research output: Book/ReportBook

2020

Discerning payment patterns in Bitcoin from Ransomware attacks

Turner, A., McCombie, S. & Uhlmann, A. J., 2020, (Accepted/In press) In : Journal of Money Laundering Control.

Research output: Contribution to journalArticle

The US 2016 presidential election & Russia's troll farms

McCombie, S., Uhlmann, A. J. & Morrison, S., 2020, In : Intelligence and National Security. 35, 1, p. 95-114 20 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

A target-centric intelligence approach to WannaCry 2.0

Turner, A. B., McCombie, S. & Uhlmann, A. J., 7 Oct 2019, In : Journal of Money Laundering Control. 22, 4, p. 646-665 20 p.

Research output: Contribution to journalArticle

2018
2015

Welcome message

Brown, S., Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2015, Proceedings: Fifth Cybercrime and Trustworthy Computing Conference: CTC 2014. Piscataway, USA: Institute of Electrical and Electronics Engineers (IEEE), p. vi 1 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscript/introduction

2014

ICANN or ICANT: is WHOIS an enabler of cybercrime?

Watters, P. A., Herps, A., Layton, R. & McCombie, S., 2014, Proceedings - 4th Cybercrime and Trustworthy Computing Workshop, CTC 2013. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 44-49 6 p. 6754640

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)
2013

Authorship attribution of IRC messages using inverse author frequency

Layton, R., McCombie, S. & Watters, P., 2013, Proceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 7-13 7 p. 6498422

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

16 Citations (Scopus)

Welcome message: CTC 2012

Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2013, In : Proceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012. 3, p. vii-vii 1 p., 6498418.

Research output: Contribution to journalEditorial

Welcome message from the CTC Steering Committee

Brown, S., Layton, R., McCombie, S., Pieprzyk, J. & Watters, P. A., 2013, CTC 2013: Fourth Cybercrime and Trustworthy Computing Workshop. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. vi-vi 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2012

Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)

Watters, P. A., McCombie, S., Layton, R. & Pieprzyk, J., 2012, In : Journal of Money Laundering Control. 15, 4, p. 430-441 12 p.

Research output: Contribution to journalArticle

27 Citations (Scopus)

Russia, Ukraine and global cybercrime: the Australian perspective

McCombie, S. & Pieprzyk, J., 2012, Issues in cybercrime, security and digital forensics. Weir, G. R. S. & Al-Nemrat, A. (eds.). University of Strathclyde, p. 197-210 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Stuxnet: the emergence of a new cyber weapon and its implications

Collins, S. & McCombie, S., 2012, In : Journal of Policing, Intelligence and Counter Terrorism. 7, 1, p. 80-91 12 p.

Research output: Contribution to journalArticle

2011

A Methodology for analyzing the credential marketplace

Watters, P. A. & McCombie, S., 2011, In : Journal of Money Laundering Control. 14, 1, p. 32-43 12 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Visualization of ATM usage patterns to detect counterfeit cards usage

Reardon, B., Nance, K. & McCombie, S., 2011, Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45. Sprague, R. H. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 3081-3088 8 p. 6149198

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

5 Citations (Scopus)
2010

Australia

Baar, M., Droogan, J., Jayasekara, S., Langdale, J., McCombie, S., Mitchell, R. & Wall, M., 2010, Asian transnational security challenges: emerging trends, regional visions. Ziemke-Dickens, C. & Droogan, J. (eds.). Sydney: The Council for Asian Transnational Threat Research (CATR) and PICT, p. 151-166 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Russian and Ukrainian cybercrime in Australia

McCombie, S. J., 2010.

Research output: Contribution to conferenceAbstract

Winning the phishing war: A strategy for Australia

McCombie, S. & Pieprzyk, J., 2010, Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 79-86 8 p. 5615076

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
13 Citations (Scopus)
44 Downloads (Pure)
2009

A preliminary profiling of internet money mules: an Australian perspective

Aston, M., McCombie, S., Reardon, B. & Watters, P., 2009, Symposia and workshops on ubiquitous, autonomic and trusted computing in conjunction with the UIC2009 and ATC 2009 conferences: Brisbane, Australia, 7-9 July 2009. Hsu, R. & Denko, M. (eds.). Piscataway, N.J: Institute of Electrical and Electronics Engineers (IEEE), p. 482-487 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
14 Citations (Scopus)
68 Downloads (Pure)

Cybercrime attribution: an Eastern European case study

McCombie, S., Pieprzyk, J. & Watters, P., 2009, Proceedings of the 7th Australian Digital Forensics Conference. Valli, C. (ed.). Perth, Australia: secAU - Security Research Centre, Edith Cowan University, p. 41-51 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
8 Citations (Scopus)
7 Downloads (Pure)
2008

Forensic characteristics of phishing petty theft or organized crime?

McCombie, S., Watters, P., Ng, A. & Watson, B., 2008, WEBIST 2008 - 4th International Conference on Web Information Systems and Technologies, Proceedings. Cordeiro, J., Filipe, J. & Hammoudi, S. (eds.). Heidelberg: Springer, Springer Nature, Vol. 1. p. 149-157 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)

Trouble in Florida: The genesis of phishing attacks on Australian banks

McCombie, S., 2008, Proceedings of the 6th Australian Digital Forensics Conference. Valli, C. & Woodward, A. (eds.). Perth, WA: secAU - Security Research Centre, Edith Cowan University, p. 113-128 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)
2003

Computer forensic: an issue of definitions

McCombie, S. & Warren, M., 2003, p. 1-4. 4 p.

Research output: Contribution to conferencePaper

2000

A profile of an information warfare attack

McCombie, S. & Warren, M., 2000, Geelong, Victoria: Deakin University, School of Computing and Mathematics. 12 p. (Technical reports. Computing series (Deakin University. School of Computing and Mathematics); vol. TR C00/08)

Research output: Book/ReportOther report