Email: t (dot) martin (at) mmu (dot) ac (dot) uk
Security is no something that can be solved for us, or something that can be bought. We constantly need to make security decisions. As technology becomes more important in our lives, the consequences of making the wrong decisions are becoming more severe. We need to explore the risks that surround us and how we can navigate them safely.
While one may be correct in saying "There is no such thing as 100% secure!", one is not necessarily being helpful.
I emphasise the practical aspects of security. I make good use of labs, typically employing a variety of virtual machines. I also encourage the development of programming skills to automate simple tasks and explore systems in greater detail than normally possible.
Practicing attacks is an illustrative exercise in preparing suitable defences (not to mention how much fun hacking can be!)
TA. Martin, A. Jones, M. AlZaabi (2017). The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE. Journal of Digital Forensics, Security and Law. 11(4),
M. Alzaabi, K. Taha, TA. Martin (2015). CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications. IEEE Transactions on Information Forensics and Security. 10(10), pp.2196-2211.
M. Zaabi, K. Taha, TA. Martin (2015). The Use of Ontologies in Forensic Analysis of Smartphone Content. The Journal of Digital Forensics, Security and Law.
T. Martin, L. O’Toole, A. Jones On the Reliability of Cryptopometry. International Journal of Digital Crime and Forensics. 5(1), pp.27-38.
M. Alzaabi, C-Y. Yeun, TA. Martin (2011). Ensuring Anonymity for LBSs in Smartphone Environment. Journal of Information Processing Systems. 7(1), pp.121-136.
KA. Alghafli, A. Jones, TA. Martin (2010). Forensic Analysis of the Windows 7 Registry. Journal of Digital Forensics, Security and Law.
A. Jones, T. Martin (2010). Digital forensics and the issues of identity. Information Security Technical Report. 15(2), pp.67-71.
TA. Martin, C. Durbin, M. Pawlewski, D. Parish (2010). A Pseudonymous Peer-2-Peer Review System for Child Protection On-line. Journal of International Commercial Law and Technology.
T. Martin, KM. Martin, P. Wild (2009). Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. Designs, Codes and Cryptography. 51(3), pp.315-334.
TA. Martin (2013). Cryptography for the Forensics Investigator. In: Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global,
K. Alghafli, TA. Martin (2017). Identification and recovery of video fragments for forensics file carving. In: Internet Technology and Secured Transactions (ICITST), 2016 11th International Conference. Barcelona, 5/12/2017.
Y. Alsalami, C. Yeun, TA. Martin, M. Khonji (2017). Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST). Barcelona, Spain, 5/12/2016.
A. Albelooshi, K. Salah, TA. Martin, E. Damiani (2015). Securing Cryptographic Keys in the IaaS Cloud Model. Cyprus,
K. Almarashda, A. Dawood, TA. Martin, M. Al-Mualla, H. Bhaskar (2015). An Optimized Selective Encryption for Video Confidentiality. Niagara Falls, Canada,
Y. AlSalami, TA. Martin, C. Yeun (2015). Linear and Differential Properties of Randomly Generated DES-Like Substitution Boxes. pp.517-524.
K. Alghafli, A. Jones, TA. Martin (2014). Investigating and Measuring Capabilities of the Forensics File Carving Techniques. pp.329-336.
E. Awadhi, K. Salah, TA. Martin (2013). Assessing the Security of the Cloud Provider Environment. In: 2013 7th IEEE GCC Conference and Exhibition (GCC). 17/11/2013.
M. Alzaabi, A. Jones, TA. Martin (2013). An Ontology-based Forensic Analysis Tool.
A. Jones, TA. Martin (2012). The 2012 Analysis of Information Remaining on Computer Hard Disks offered for Sale on the Second Hand Market in the UAE.
B. AlBelooshi, K. Salah, TA. Martin, A. Bentiba (2012). Assessing Overhead Cost Associated with Encrypting Swap File.
K. Almarshada, Y. Alsalami, K. Salah, TA. Martin (2011). On the Security of Inclusion or Omission of MixColumns in AES Cipher.
KA. Alghafli, A. Jones, TA. Martin (2011). Guidelines for the digital forensic processing of Smartphones.
TA. Martin, A. Jones (2011). An Evaluation of Data Erasing Tools.
TA. Martin (2011). Undecryptable Symmetric Encryption.
A. Jones, TA. Martin (2010). Making Information Security Acceptable to the User.
TA. Martin, C. Durbin, M. Pawlewski, D. Parish (2009). Future vision of identity. In: International Journal of Liability and Scientific Enquiry. pp.86-86.