Angela Irwin | Macquarie University (original) (raw)

Papers by Angela Irwin

Research paper thumbnail of Modelling of Money Laundering and Terrorism Financing Typologies

Journal of Money Laundering Control, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Future of Technology in Customer Identification & Relationship Risk

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Future of Technology in Customer Identification & Relationship Risk

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Money laundering and terrorism financing: a feasibility study

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An analysis of money laundering and terrorism financing typologies

Journal of Money Laundering Control, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective

Journal of Money Laundering Control, 2013

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Modelling of money laundering and terrorism financing typologies

Journal of Money Laundering Control, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Money laundering and terrorism financing in virtual environments: a feasibility study

Journal of Money Laundering Control, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting Money Laundering and Terrorism Financing Activity in Second Life and World of Warcraft

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Forensic methods for detection of deniable encryption in mobile networks

Conventional security mechanisms providing confidentiality, integrity and authentication are faci... more Conventional security mechanisms providing confidentiality, integrity and authentication are facing new challenges in modern wired and wireless networks. Deniable encryption allows encrypted data to be decrypted to different sensible plaintexts, depending on the key used or otherwise makes it impossible to prove the existence of the real message without the proper encryption key. This allows the sender to have plausible deniability if compelled to give up their encryption key. Deniable file systems allow for the creation of an encrypted volume on a hard disk and a second, hidden deniable file system created inside with access by a second password. The objective of this research is to establish whether or not evidence of a hidden volume can be found in deniable encryption tools using conventional forensic analysis. A testbed is developed using open source deniable encryption software and forensics tools with the objective of proving or disproving this claim.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Vehicular ad hoc networks (VANETS): status, results, and challenges

Telecommunication Systems

Recent advances in hardware, software, and communication technologies are enabling the design and... more Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that are being deployed in various environments. One such network that has received a lot of interest in the last couple of years is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, standardization, and development because it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. Recent research efforts have placed a strong emphasis on novel VANET design architectures and implementations. A lot of VANET research work have focused on specific areas including routing, broadcasting, Quality of Service (QoS), and security. We survey some of the recent research results in these areas. We present a review of wireless access standards for VANETs, and describe some of the recent VANET trials and deployments in the US, Japan, and the European Union. In addition, we also briefly present some of the simulators currently available to VANET researchers for VANET simulations and we assess their benefits and limitations. Finally, we outline some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and widespead adoption of scalable, reliable, robust, and secure VANET architectures, protocols, technologies, and services.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Modelling of Money Laundering and Terrorism Financing Typologies

Journal of Money Laundering Control, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Future of Technology in Customer Identification & Relationship Risk

Bookmarks Related papers MentionsView impact

Research paper thumbnail of The Future of Technology in Customer Identification & Relationship Risk

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Money laundering and terrorism financing: a feasibility study

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An analysis of money laundering and terrorism financing typologies

Journal of Money Laundering Control, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Are the financial transactions conducted inside virtual environments truly anonymous?: An experimental research from an Australian perspective

Journal of Money Laundering Control, 2013

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Modelling of money laundering and terrorism financing typologies

Journal of Money Laundering Control, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Money laundering and terrorism financing in virtual environments: a feasibility study

Journal of Money Laundering Control, 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting Money Laundering and Terrorism Financing Activity in Second Life and World of Warcraft

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Forensic methods for detection of deniable encryption in mobile networks

Conventional security mechanisms providing confidentiality, integrity and authentication are faci... more Conventional security mechanisms providing confidentiality, integrity and authentication are facing new challenges in modern wired and wireless networks. Deniable encryption allows encrypted data to be decrypted to different sensible plaintexts, depending on the key used or otherwise makes it impossible to prove the existence of the real message without the proper encryption key. This allows the sender to have plausible deniability if compelled to give up their encryption key. Deniable file systems allow for the creation of an encrypted volume on a hard disk and a second, hidden deniable file system created inside with access by a second password. The objective of this research is to establish whether or not evidence of a hidden volume can be found in deniable encryption tools using conventional forensic analysis. A testbed is developed using open source deniable encryption software and forensics tools with the objective of proving or disproving this claim.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Vehicular ad hoc networks (VANETS): status, results, and challenges

Telecommunication Systems

Recent advances in hardware, software, and communication technologies are enabling the design and... more Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that are being deployed in various environments. One such network that has received a lot of interest in the last couple of years is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, standardization, and development because it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. Recent research efforts have placed a strong emphasis on novel VANET design architectures and implementations. A lot of VANET research work have focused on specific areas including routing, broadcasting, Quality of Service (QoS), and security. We survey some of the recent research results in these areas. We present a review of wireless access standards for VANETs, and describe some of the recent VANET trials and deployments in the US, Japan, and the European Union. In addition, we also briefly present some of the simulators currently available to VANET researchers for VANET simulations and we assess their benefits and limitations. Finally, we outline some of the VANET research challenges that still need to be addressed to enable the ubiquitous deployment and widespead adoption of scalable, reliable, robust, and secure VANET architectures, protocols, technologies, and services.

Bookmarks Related papers MentionsView impact