Australian Information Security Management Conference

Australian Information Security Management Conference

 

Follow

Submissions from 2018

PDF

Bringing defensive artificial intelligence capabilities to mobile devices, Kevin Chong and Ahmed Ibrahim

PDF

Mitigating man-in-the-middle attacks on mobile devices by blocking insecure http traffic without using vpn, Kevin Chong, Muhammad Imran Malik, and Peter Hannay

PDF

The impact of personality traits on user’s susceptibility to social engineering attacks, Brian Cusack and Kemi Adedokun

PDF

Vulnerability analysis: protecting information in the IoT, Brian Cusack and Feiqiu Zhuang

PDF

An investigation into a denial of service attack on an ethereum network, Richard Greene and Michael N. Johnstone

PDF

The relevance of a good internal control system in a computerised accounting information system, Raymond Lutui and Tau’aho ‘Ahokovi

PDF

Mobile device wardriving tools’ comparison: Nuku’alofa as case study, Raymond Lutui, ‘Osai Tete’imoana, and George Maeakafa

PDF

XMPP architecture and security challenges in an IoT ecosystem, Muhammad Imran Malik, Ian Noel McAteer, Peter Hannay, Syed Naeem Firdous, and Zubair Baig

PDF

Security vulnerabilities in android applications, Crischell Montealegre, Charles Rubia Njuguna, Muhammad Imran Malik, Peter Hannay, and Ian Noel McAteer

PDF

Detection techniques in operational technology infrastructure, Glenn Murray, Matthew Peacock, Priya Rabadia, and Paresh Kerai

Submissions from 2017

PDF

Intelligent feature selection for detecting http/2 denial of service attacks, Erwin Adi and Zubair Baig

PDF

Core elements in information security accountability in the cloud, Zahir Al-Rashdi, Martin Dick, and Ian Storey

PDF

Literature-based analysis of the influences of the new forces on ISMS: A conceptual framework, Zahir Al-Rashdi, Martin Dick, and Ian Storey

PDF

A critical analysis of security vulnerabilities and countermeasures in a smart ship system, Dennis Bothur, Guanglou Zheng, and Craig Valli

PDF

Assessment of security vulnerabilities in wearable devices, Brian Cusack, Bryce Antony, Gerard Ward, and Shaunak Mody

PDF

Neurosecurity for brainware devices, Brian Cusack, Kaushik Sundararajan, and Reza Khaleghparast

PDF

Evaluating IP surveillance camera vulnerabilities, Brian Cusack and Zhuang Tian

PDF

Financial fraud risk management and corporate governance, Raymond Lutui and Tau'aho 'Ahokovi

PDF

Tonga’s organisational vulnerability to social engineering, Raymond Lutui and Viliami Fe’aomoeata

PDF

Security readiness evaluation framework for Tonga e-government initiatives, Raymond Lutui, Semisi Hopoi, and Siaosi Maeakafa

PDF

A comparison of 2D and 3D Delaunay triangulations for fingerprint authentication, Marcelo Jose Macedo, Wencheng Yang, Guanglou Zheng, and Michael N. Johnstone

PDF

Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things, Ian Noel McAteer, Muhammad Imran Malik, Zubair Baig, and Peter Hannay

PDF

The 2017 homograph browser attack mitigation survey, Tyson McElroy, Peter Hannay, and Greg Baatard

PDF

The convergence of IT and OT in critical infrastructure, Glenn Murray, Michael N. Johnstone, and Craig Valli

PDF

Deceptive security based on authentication profiling, Andrew Nicholson, Helge Janicke, Andrew Jones, and Adeeb Alnajaar

PDF

A Sri Lankan hacking case study, Ishan Senarathna and Matthew Warren

PDF

The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)

PDF

A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016, Samuel Griffith Wakeling, Peter Hannay, and Zubair Baig

PDF

An investigation into some security issues in the DDS messaging protocol, Thomas White, Michael N. Johnstone, and Matthew Peacock

Submissions from 2016

PDF

A survey of social media users privacy settings & information disclosure, Mashael Aljohani, Alastair Nisbet, and Kelly Blincoe

PDF

An investigation of potential wireless security issues in traffic lights, Brian Bettany, Michael N. Johnstone, and Matthew Peacock

PDF

Celestial sources for random number generation, Erin Chapman, Jerina Grewar, and Tim Natusch

PDF

Using graphic methods to challenge cryptographic performance, Brian Cusack and Erin Chapman

PDF

A privacy gap around the internet of things for open-source projects, Brian Cusack and Reza Khaleghparast

PDF

Future of Australia’s ETP: Script exchange, script vault or secure mobile alternative, Kyaw Kyaw Htat, Patricia A. H. Williams, and Vincent McCauley

PDF

The Proceedings of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Mike Johnstone

PDF

An analysis of chosen alarm code pin numbers & their weakness against a modified brute force attack, Alastair Nisbet and Maria Kim

PDF

Understanding and combatting terrorist networks: Coupling social media mining with social network analysis, Benn Van Den Ende

PDF

Accelerating NTRUEncrypt for in-browser cryptography utilising graphical processing units and WebGL, Dajne Win, Seth Hall, and Alastair Nisbet

PDF

A hybrid behaviour recognition and intrusion detection method for mobile devices, Ashley Woodiss-Field

Submissions from 2015

PDF

Urdu text steganography: Utilizing isolated letters, Aliya Tabassum Abbasi, Nuzhat Naqvi, Aihab Khan, and Basheer Ahmad

PDF

Towards dynamic adaption of user's organisational information security behaviour, Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke

PDF

Using passive and active enumeration methods to improve IPv6 host enumeration search algorithms, Clinton Carpene

PDF

Loyalty cards and the problem of CAPTCHA: 2nd tier security and usability issues for senior citizens, David M. Cook, Apoorv Kumar, and Charwina Unmar-Satiah

PDF

Evaluating policy layer security controls for value realisation in secure systems, Brian Cusack and Maher Al-Khazrajy

PDF

Innovating additional Layer 2 security requirements for a protected stack, Brian Cusack and Raymond Lutui

PDF

Evaluating single sign on security failure in cloud services, Brian Cusack and Eghbal Zadeh

PDF

Ransomware: Emergence of the cyber-extortion menace, Nikolai Hampton and Zubair A. Baig

PDF

A survey and method for analysing SoHo router firmware currency, Nikolai Hampton and Patryk Szewczyk

PDF

Timing attack detection on BACnet via a machine learning approach, Michael N. Johnstone, Matthew Peacock, and J I. den Hartog

PDF

Behavior-based anomaly detection on big data, Hyunjoo Kim, Jonghyun Kim, Ikkyun Kim, and Tai-myung Chung

PDF

The challeges in implementing security in spontaneous ad hoc networks, Alastair Nisbet

PDF

Selection of penetration testing methodologies: A comparison and evaluation, Aleatha Shanley and Michael N. Johnstone

Submissions from 2014

PDF

Attribute-based encryption with encryption and decryption outsourcing, Muhammad Asim, Milan Petkovic, and Tanya Ignatenko

PDF

Securing the internet of things infrastructure – Standards and techniques, Zubair A. Baig

PDF

A survey of IPV6 address usage in the public domain name system, Clinton R. Carpene and Andrew Woodward

PDF

Securing identity information with image watermarks, Brian Cusack and Reza Khaleghparas

PDF

Evaluating the security vulenerabilities of the IP6to4 tunnelling mechanism, Brian Cusack and Raymond Lutui

PDF

Authentication and authorisation in entrusted unions, Ayed F. Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, and John Zic

PDF

Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk Szewczyk

PDF

The application of an agile approach to it security risk management for SMES, Damien Hutchinson, Chris Armitt, and Dean Edwards-Lear

PDF

Mitigating man-in-the-middle attacks on smartphones – a discussion of SSL pinning and DNSSec, Veelasha Moonsamy and Lynn Batten

PDF

The impact of social constructivism on ERP systems security: A critical social review, Kennedy Njenga

PDF

An analysis of security issues in building automation systems, Matthew Peacock and Michael N. Johnstone

PDF

12th Australian Information Security Management Conference, 2014, Edith Cowan University: Conference details, Security Research Institute, Edith Cowan University

PDF

Cache-timing attack against aes crypto system - countermeasures review, Yaseen H. Taha, Settana M. Abdulh, Naila A. Sadalla, and Huwaida Elshoush

Submissions from 2013

PDF

Determining What Characteristics Constitute a Darknet, Symon Aked, Christopher Bolan, and Murray Brand

PDF

A Conceptual Model For Federated Authentication in the Cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel

PDF

A Comparison of Information Security Curricula in China and the USA, Huaying Chen, Sean B. Maynard, and Atif Ahmad

PDF

The Effectiveness of Internet Activity Erasure Tools to Protect Privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber

PDF

Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms, Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, and Mike Johnstone

PDF

Automated Detection of Vehicles with Machine Learning, Michael N. Johnstone and Andrew Woodward

PDF

Privacy and Legal Issues in Cloud Computing - The SMME Position in South Africa, Mathias Mujinga

PDF

Information Security Management: Factors that Influence Security Investments in SMES, Zhi Xian Ng, Atif Ahmad, and Sean B. Maynard

PDF

A 2013 Study of Wireless Network Security in New Zealand: Are We There Yet?, Alastair Nisbet

PDF

A Simulation-Based Study of Server Location Selection Rules in Manets Utilising Threshold Cryptography, Alastair Nisbet

PDF

Usability and Security Support Offered Through ADSL Router User Manuals, Patryk Szewczyk

Submissions from 2012

PDF

An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2, Symon Aked, Christopher Bolan, and Murray Brand

PDF

A proposed formula for comparing kill password effectiveness in single password RFID systems, Christopher Bolan

PDF

Exposing Potential Privacy Issues with IPv6 Address Construction, Clinton Carpene and Andrew Woodward

PDF

HARMs: Hierarchical Attack Representation Models for Network Security Analysis, Jin Hong and Dong-Seong Kim

PDF

The Mobile Execution Environment: A Secure and Non-Intrusive Approach to Implement a Bring You Own Device Policy for Laptops, Peter James and Don Griffiths

PDF

Does the Android Permission System Provide Adequate Information Privacy Protection for End-Users of Mobile Apps?, Michael Lane

PDF

Web-Based Risk Analysis for Home Users, R. T. Magaya and N. L. Clarke

PDF

An Information Security Awareness Capability Model (ISACM), Robert Poepjes and Michael Lane

PDF

Implementing a Secure Academic Grid System - A Malaysian Case, Mohd Samsu Sajat, Suhaidi Hassan, Adi Affandi Ahmad, Ali Yusny Daud, and Amran Ahmad

PDF

A survey of computer and network security support from computer retailers to consumers in Australia, Patryk Szewczyk

PDF

Experimenting with Anomaly Detection by Mining Large-Scale Information Networks, A. Taleb-Bendiab

PDF

Human-Readable Real-Time Classifications of Malicious Executables, Anselm Teh and Arran Stewart

PDF

Territorial behavior and the economics of Botnets, Craig S. Wright

Submissions from 2011

PDF

Implementation of ISO 27001 in Saudi Arabia – obstacles, motivations, outcomes, and lessons learned, Belal AbuSaad, Fahad A. Saeed, Khaled Alghathbar, and Bilal Khan

PDF

An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked

PDF

Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk

PDF

A risk index model for security incident prioritisation, Nor Badrul Anuar, Steven Furnell, Maria Papadaki, and Nathan Clarke

PDF

Understanding the management of information security controls in practice, Daniel Bachlechner, Ronald Maier, Frank Innerhofer-Oberperfler, and Lukas Demetz

PDF

Seeing the full picture: the case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp

PDF

A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan

PDF

Seniors language paradigms: 21st century jargon and the impact on computer security and financial transactions for senior citizens, David M. Cook, Patryk Szewczyk, and Krishnun Sansurooah

PDF

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

PDF

Human-related information security problems faced by British companies in economically rising countries, Suchinthi Fernando and Tatsuo Asai