Personal information

Verified email addresses

Verified email domains

Activities

Employment (2)

NHL University of Applied Sciences: Leeuwarden, NL

2021-09-01 to present | Professor
Employment
Source: Self-asserted source
Stephen McCombie

Macquarie University: Sydney, New South Wales, AU

2021-06-01
Employment
Source: check_circle
Macquarie University

Education and qualifications (2)

Macquarie University: Sydney, New South Wales, AU

2021-06-01
Education
Source: check_circle
Macquarie University

Macquarie University: Sydney, New South Wales, AU

2021-06-01
Education
Source: check_circle
Macquarie University

Funding (2)

Defence Against Phishing Attacks

2007-07-01 to 2012-12-31 | Grant
Australian Research Council (Canberra, AU)
GRANT_NUMBER: LP0776267
Source: Self-asserted source
Stephen McCombie via DimensionsWizard

Defence Against Phishing Attacks

2007-01-01 to 2010-12-31 | Grant
Australian Research Council (Canberra, AU)
GRANT_NUMBER: grant.LP0776267
Source: Self-asserted source
Stephen McCombie via DimensionsWizard

Works (38)

An Open-Source Database of Cyberattacks on the Maritime Transportation System

2024-10-25 | Preprint
Contributors: Jeroen Pijpker; Stephen McCombie; Saul Johnson; Rob Loves; Georgios Michail Makrakis
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Russian Active Measures in the 2016 US Presidential Election

Routledge Handbook of the Influence Industry
2024-08-19 | Book chapter
Part of ISBN: 9781003256878
Contributors: Allon J. Uhlmann; Stephen McCombie
Source: Self-asserted source
Stephen McCombie

A Ship Honeynet to Gather Cyber Threat Intelligence for the Maritime Sector

2023 IEEE 48th Conference on Local Computer Networks (LCN)
2023-10-02 | Conference paper
Contributors: Jeroen Pijpker; Stephen James McCombie
Source: Self-asserted source
Stephen McCombie

Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression

IEEE Security & Privacy
2022 | Journal article
Part of ISSN: 1540-7993
Part of ISSN: 1558-4046
Contributors: Stephen McCombie
Source: Self-asserted source
Stephen McCombie

A Ship Honeynet Project to Collect Data on Cyber Threats to the Maritime Sector

CYBER 2022, The Seventh International Conference on Cyber-Technologies and Cyber-Systems
2022-11 | Conference paper
Contributors: Stephen McCombie; Jeroen Pijpker
Source: Self-asserted source
Stephen McCombie

Follow the money

Proceedings of the 54th Hawaii International Conference on System Sciences | 2021
2021-01-05 | Conference paper | Author
SOURCE-WORK-ID:

c0c2adb7-f023-4e86-a84d-81251266913a

Part of ISBN: 9780998133140
Contributors: Adam Turner; Stephen McCombie; Allon J. Uhlmann
Source: check_circle
Macquarie University

Modern espionage

2020-12-07 | Interactive resource | Author
SOURCE-WORK-ID:

c6489e9d-c40b-46ea-b224-f8967f56bfed

Contributors: Stephen McCombie; Allon J. Uhlmann
Source: check_circle
Macquarie University

Analysis techniques for illicit Bitcoin transactions

Frontiers in Computer Science
2020-11-30 | Journal article | Author
SOURCE-WORK-ID:

f8ab7c2d-24a9-405e-baaa-96d35ab6c3dc

WOSUID:

000705961300001

EID:

2-s2.0-85117816999

Contributors: Adam Turner; Stephen McCombie; Allon J. Uhlmann
Source: check_circle
Macquarie University

Please explain

2020-07-07 | Magazine article | Author
SOURCE-WORK-ID:

2ff5fcb3-d51b-4f89-8ed5-69d2adc6c191

Contributors: Stephen McCombie; Kate Cox
Source: check_circle
Macquarie University

Discerning payment patterns in Bitcoin from ransomware attacks

Journal of Money Laundering Control
2020-07-05 | Journal article | Author
SOURCE-WORK-ID:

c0b9ba18-9bd0-46e3-9bfc-f24268b8cacb

EID:

2-s2.0-85087623922

EID:

2-s2.0-85087623922

WOSUID:

000547939600001

Contributors: Adam Turner; Stephen McCombie; Allon J. Uhlmann
Source: check_circle
Macquarie University

The Russian gambit and the US intelligence community

Library Trends
2020-04 | Journal article | Author
SOURCE-WORK-ID:

7a90152a-b9c7-4623-9a5c-0b6df5537768

EID:

2-s2.0-85093920613

EID:

2-s2.0-85093920613

WOSUID:

000593446600008

Contributors: Allon J. Uhlmann; Stephen McCombie
Source: check_circle
Macquarie University

The US 2016 presidential election & Russia’s troll farms

Intelligence and National Security
2020-01-02 | Journal article
Contributors: Stephen McCombie; Allon J. Uhlmann; Sarah Morrison
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

The elusive field of cyber intelligence

Journal of the Australian Institute of Professional Intelligence Officers
2019 | Journal article | Author
SOURCE-WORK-ID:

a5f13fe2-6e3d-41e7-9698-ec4ca0128e84

Contributors: Stephen McCombie; James D. Ramsay; Allon J. Uhlmann
Source: check_circle
Macquarie University

What is the Dark Net and how does it work?

2019-11-29 | Interactive resource | Author
SOURCE-WORK-ID:

5c82fcd1-fef6-4d39-83d7-733f7f3cbda9

Contributors: Stephen McCombie; Vanessa Walker
Source: check_circle
Macquarie University

A target-centric intelligence approach to WannaCry 2.0

Journal of Money Laundering Control
2019-10-07 | Journal article | Author
SOURCE-WORK-ID:

2dad9f62-7147-48c0-940a-5b07aae94d32

EID:

2-s2.0-85075049705

EID:

2-s2.0-85075049705

WOSUID:

000496309200005

Contributors: Adam Turner; Stephen McCombie; Allon J. Uhlmann
Source: check_circle
Macquarie University

Cybercrime moonlighting

2019-08-21 | Magazine article | Author
SOURCE-WORK-ID:

ae9430f5-e26e-41e2-8083-125e12261d13

Contributors: Stephen McCombie; Allon J. Uhlmann
Source: check_circle
Macquarie University

Cyber attack on the Australian parliament and the lessons learned

2019-03-04 | Magazine article | Author
SOURCE-WORK-ID:

230efe08-8070-4acc-8927-33bc3ad08287

Contributors: christophe doche; Stephen McCombie; Tahiry Rabehaja
Source: check_circle
Macquarie University

Threat actor oriented strategy

Journal of the Australian Institute of Professional Intelligence Officers
2018 | Journal article | Author
SOURCE-WORK-ID:

af18a12f-6db7-4bae-9d13-33130f43e564

Contributors: Stephen McCombie
Source: check_circle
Macquarie University

Welcome message

Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014
2015 | Conference paper
EID:

2-s2.0-84929180243

Contributors: Brown, S.; Layton, R.; McCombie, S.; Pieprzyk, J.; Watters, P.A.
Source: Self-asserted source
Stephen McCombie via Scopus - Elsevier
grade
Preferred source (of 2)‎

ICANN or ICANT

Proceedings - 4th Cybercrime and Trustworthy Computing Workshop, CTC 2013
2014 | Conference paper | Author
SOURCE-WORK-ID:

b860db75-faa8-43e8-8e98-e9cd1628997c

EID:

2-s2.0-84898043254

WOSUID:

000349789400007

Contributors: Paul Watters; Aaron Herps; Robert Layton; Stephen McCombie
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Authorship attribution of IRC messages using inverse author frequency

Proceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012
2013 | Conference paper | Author
SOURCE-WORK-ID:

394c5b61-b939-4306-89f9-25f81a90d415

WOSUID:

000319994300002

EID:

2-s2.0-84877306607

Part of ISBN: 9780769549408
Part of ISBN: 9781467364607
Contributors: Robert Layton; Stephen McCombie; Paul Watters
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Welcome message

Proceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012
2013 | Other | Author
SOURCE-WORK-ID:

3fa671b5-970c-45a6-8a8c-6ce3bfdc7c1a

EID:

2-s2.0-84877304719

Contributors: Robert Layton; Stephen McCombie; Josef Pieprzyk; Paul A. Watters
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Welcome message from the CTC Steering Committee

CTC 2013
2013 | Conference paper | Author
SOURCE-WORK-ID:

01cfd8b2-3d13-4659-b32c-c432a2790112

EID:

2-s2.0-84898037884

Part of ISBN: 9781479930753
Contributors: Simon Brown; Robert Layton; Stephen McCombie; Josef Pieprzyk; Paul A. Watters
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP)

Journal of Money Laundering Control
2012 | Journal article | Author
SOURCE-WORK-ID:

0900be70-11c9-4ba2-872c-b7b9a52890f7

WOSUID:

000212769800006

EID:

2-s2.0-84871371404

Contributors: Paul Watters; Stephen McCombie; Robert Layton; Josef Pieprzyk
Source: check_circle
Macquarie University

Russia, Ukraine and global cybercrime

Issues in cybercrime, security and digital forensics
2012 | Book chapter | Author
SOURCE-WORK-ID:

b47221bc-df75-48ac-8653-a75329ef818d

Part of ISBN: 9780947649852
Contributors: Stephen McCombie; Josef Pieprzyk
Source: check_circle
Macquarie University

Stuxnet

Journal of Policing, Intelligence and Counter Terrorism
2012 | Journal article | Author
SOURCE-WORK-ID:

9872a1cb-578b-41f7-a584-578736e4759b

Contributors: Sean Collins; Stephen McCombie
Source: check_circle
Macquarie University

A Methodology for analyzing the credential marketplace

Journal of Money Laundering Control
2011 | Journal article | Author
SOURCE-WORK-ID:

332a94ec-b543-44fd-9879-afb4d2533a87

WOSUID:

000212761000004

EID:

2-s2.0-84870552990

Contributors: Paul A. Watters; Stephen McCombie
Source: check_circle
Macquarie University

Visualization of ATM usage patterns to detect counterfeit cards usage

Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45
2011 | Conference paper | Author
SOURCE-WORK-ID:

279dc750-374c-44d4-884d-53f871698684

EID:

2-s2.0-84857983169

Part of ISBN: 9780769545257
Contributors: Ben Reardon; Kara Nance; Stephen McCombie
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Australia

Asian transnational security challenges
2010 | Book chapter | Author
SOURCE-WORK-ID:

91dd4e19-d71f-4a40-9d34-615f6d44699b

Part of ISBN: 9781741383645
Contributors: Milton Baar; Julian Droogan; Shanaka Jayasekara; John Langdale; Stephen McCombie; Rebecca Vogel; Mark Wall
Source: check_circle
Macquarie University

Russian and Ukrainian cybercrime in Australia

International Serious and Organised Crime Conference 2010, Melbourne, 1/01/10
2010 | Conference abstract | Author
SOURCE-WORK-ID:

30ddc1e9-22c4-423d-a25f-7289a359c602

Contributors: Stephen McCombie
Source: check_circle
Macquarie University

Winning the phishing war

Proceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010
2010 | Conference paper | Author
SOURCE-WORK-ID:

5c5c93af-67fc-4d42-8953-e4c3c3a27f65

EID:

2-s2.0-78649836899

Part of ISBN: 9780769541860
Contributors: Stephen McCombie; Josef Pieprzyk
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

The rise of computer forensics

2010-01 | Magazine article | Author
SOURCE-WORK-ID:

e29b343a-6450-48fa-83e7-74937371d3e8

Contributors: Stephen McCombie
Source: check_circle
Macquarie University

A preliminary profiling of internet money mules

Symposia and workshops on ubiquitous, autonomic and trusted computing in conjunction with the UIC2009 and ATC 2009 conferences
2009 | Conference paper | Author
SOURCE-WORK-ID:

c3e56f3a-6ad8-476c-80d1-02e12f4cd7c3

EID:

2-s2.0-72849132152

Part of ISBN: 9780769537375
Contributors: Manny Aston; Stephen McCombie; Ben Reardon; Paul Watters
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Cybercrime attribution

Proceedings of the 7th Australian Digital Forensics Conference
2009 | Conference paper | Author
SOURCE-WORK-ID:

c22ff682-f248-4955-8666-4b13ae246e71

EID:

2-s2.0-78649883253

Part of ISBN: 9780729806817
Contributors: Stephen McCombie; Josef Pieprzyk; Paul Watters
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Forensic characteristics of phishing petty theft or organized crime?

WEBIST 2008 - 4th International Conference on Web Information Systems and Technologies, Proceedings
2008 | Conference paper | Author
SOURCE-WORK-ID:

df3bfa2f-d92f-4c74-ad2f-016ea5be2c3b

EID:

2-s2.0-58049158943

WOSUID:

000259260900022

Part of ISBN: 9783642013447
Part of ISBN: 9789898111265
Contributors: Stephen McCombie; Paul Watters; Alex Ng; Brett Watson
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Trouble in Florida

Proceedings of the 6th Australian Digital Forensics Conference
2008 | Conference paper | Author
SOURCE-WORK-ID:

e4a8a7af-6483-470f-88ea-e8da08da24f7

EID:

2-s2.0-84867721511

Part of ISBN: 9780729806664
Contributors: Stephen McCombie
Source: check_circle
Macquarie University
grade
Preferred source (of 2)‎

Computer forensic

Forensic Computing - Evidence on the move from Desktops to Networks
2003 | Conference paper | Author
SOURCE-WORK-ID:

71079cf9-b6cf-452a-b119-1544a8934665

Contributors: Stephen McCombie; M. Warren
Source: check_circle
Macquarie University

A profile of an information warfare attack

Technical reports. Computing series (Deakin University. School of Computing and Mathematics)
2000 | Report | Author
SOURCE-WORK-ID:

c669cbad-394f-43a4-b99e-eb18f82c7543

Contributors: Stephen McCombie; Matthew Warren
Source: check_circle
Macquarie University