Australian Information Security Management Conference

Australian Information Security Management Conference

 

Follow

Submissions from 2013

PDF

Determining What Characteristics Constitute a Darknet, Symon Aked, Christopher Bolan, and Murray Brand

PDF

A Conceptual Model For Federated Authentication in the Cloud , Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel

PDF

A Comparison of Information Security Curricula in China and the USA, Huaying Chen, Sean B. Maynard, and Atif Ahmad

PDF

The Effectiveness of Internet Activity Erasure Tools to Protect Privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber

PDF

Exchanging Demands: Weaknesses in SSL Implemenations for Mobile Platforms, Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, and Mike Johnstone

PDF

Automated Detection of Vehicles with Machine Learning, Michael N. Johnstone and Andrew Woodward

PDF

Privacy and Legal Issues in Cloud Computing - The SMME Position in South Africa, Mathias Mujinga

PDF

Information Security Management: Factors that Influence Security Investments in SMES, Zhi Xian Ng, Atif Ahmad, and Sean B. Maynard

PDF

A 2013 Study of Wireless Network Security in New Zealand: Are We There Yet?, Alastair Nisbet

PDF

A Simulation-Based Study of Server Location Selection Rules in Manets Utilising Threshold Cryptography, Alastair Nisbet

PDF

Usability and Security Support Offered Through ADSL Router User Manuals, Patryk Szewczyk

Submissions from 2012

PDF

An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2, Symon Aked, Christopher Bolan, and Murray Brand

PDF

A Proposed Formula for Comparing Kill Password Effectiveness in Single Password RFID Systems, Christopher Bolan

PDF

Exposing Potential Privacy Issues with IPv6 Address Construction, Clinton Carpene and Andrew Woodward

PDF

HARMs: Hierarchical Attack Representation Models for Network Security Analysis, Jin Hong and Dong-Seong Kim

PDF

The Mobile Execution Environment: A Secure and Non-Intrusive Approach to Implement a Bring You Own Device Policy for Laptops, Peter James and Don Griffiths

PDF

Does the Android Permission System Provide Adequate Information Privacy Protection for End-Users of Mobile Apps?, Michael Lane

PDF

Web-Based Risk Analysis for Home Users, R. T. Magaya and N. L. Clarke

PDF

An Information Security Awareness Capability Model (ISACM), Robert Poepjes and Michael Lane

PDF

Implementing a Secure Academic Grid System - A Malaysian Case, Mohd Samsu Sajat, Suhaidi Hassan, Adi Affandi Ahmad, Ali Yusny Daud, and Amran Ahmad

PDF

A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia, Patryk Szewczyk

PDF

Experimenting with Anomaly Detection by Mining Large-Scale Information Networks, A. Taleb-Bendiab

PDF

Human-Readable Real-Time Classifications of Malicious Executables, Anselm Teh and Arran Stewart

PDF

Territorial Behavior and the Economics of Botnets, Craig S. Wright

Submissions from 2011

PDF

Implementation of ISO 27001 in Saudi Arabia – obstacles, motivations, outcomes, and lessons learned, Belal AbuSaad, Fahad A. Saeed, Khaled Alghathbar, and Bilal Khan

PDF

An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked

PDF

Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryck Szewczyk

PDF

A risk index model for security incident prioritisation, Nor Badrul Anuar, Steven Furnell, Maria Papadaki, and Nathan Clarke

PDF

Understanding the management of information security controls in practice , Daniel Bachlechner, Ronald Maier, Frank Innerhofer-Oberperfler, and Lukas Demetz

PDF

Seeing the full picture: the case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp

PDF

A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan

PDF

Seniors language paradigms: 21st century jargon and the impact on computer security and financial transactions for senior citizens, David M. Cook, Patryck Szewczyk, and Krishnun Sansurooah

PDF

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

PDF

Human-related information security problems faced by British companies in economically rising countries, Suchinthi Fernando and Tatsuo Asai

PDF

Evaluation of users’ perspective on VOIP’s security vulnerabilities, Alireza Heravi and Sameera Mubarak

PDF

A preliminary investigation of distributed and cooperative user authentication, C G. Hocking, S M. Furnell, N L. Clarke, and P L. Reynolds

PDF

An agile IT security model for project risk assessment, Damien Hutchinson, Heath Maddern, and Jason Wells

PDF

A longitudinal study of wi-fi access point security in the Perth central business district , Emil Jacobson and Andrew Woodward

PDF

Are existing security models suitable for teleworking?, Peter James

PDF

Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone

PDF

Security aspects of sensor-based defence systems, Michael N. Johnstone

PDF

Privacy-preserving PKI design based on group signature, Sokjoon Lee, Hyeok Chan Kwon, and Dong-il Seo

PDF

Australian primary care health check: who is accountable for information security?, Rachel J. Mahncke and Patricia A H Williams

PDF

An empirical study of challenges in managing the security in cloud computing, Bupesh Mansukhani and Tanveer A. Zia

PDF

Stakeholders in security policy development, S B. Maynard, A B. Ruighaver, and A Ahmad

PDF

Trusted interoperability and the patient safety issues of parasitic health care software, Vincent B. McCauley and Patricia A H Williams

PDF

Cloud computing concerns in developing economies, Mathias Mujinga and Baldreck Chipangura

PDF

Analysis of BGP security vulnerabilities, Muhammad Mujtaba and Priyadarsi Nanda

PDF

An exploratory study of ERM perception in Oman and proposing a maturity model for risk optimization , Arun N. Shivashankarappa, D Ramalingam, Leonid Smalov, and N Anbazhagan

PDF

Experimental study of DNS performance, Ananya Tripathi, Farhat Khan, and Akhilesh Sisodia

PDF

Out-of-band wormhole attack detection in MANETS, Sana ul Haq and Faisal B. Hussain

PDF

Attack vectors against social networking systems: the Facebook example, Matthew Warren, Shona Leitch, and Ian Rosewall

PDF

Help or hindrance: the practicality of applying security standards in healthcare, Patricia A H Williams

PDF

Using checklists to make better best, Craig S. Wright and Tanveer A. Zia

PDF

Efficient and expressive fully secure attribute-based signature in the standard model , Piyi Yang, Tanveer A. Zia, Zhenfu Cao, and Xiaolei Dong

PDF

Source code embedded (SCEM) security framework, Tanveer A. Zia and Aftab Rizvi

Submissions from 2010

PDF

Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map, Erwin Adi and Irene Salomo

PDF

Yet Another Symbian Vulnerability Update, Nizam Uddin Bhuiyan

PDF

Mahalanobis Distance Map Approach for Anomaly Detection, Aruna Jamdagnil, Zhiyuan Tan, Priyadarsi Nanda, Xiangjian He, and Ren Ping Liu

PDF

Threat Modelling with Stride and UML, Michael N. Johnstone

PDF

A Proposed Policy-Based Management Architecture for Wireless Clients Operating in a Heterogeneous Mobile Environment, Mayank Keshariya and Ray Hunt

PDF

Micro-Blogging in the Workplace, Chia Yao Lee and Matthew Warren

PDF

A Novel Design and Implementation of Dos-Resistant Authentication and Seamless Handoff Scheme for Enterprise WLANs, Isaac Lee and Ray Hunt

PDF

An Information Security Governance Framework for Australian Primary Care Health Providers, Donald C. McDermid, Rachel J. Mahncke, and Patricia A H Williams

PDF

Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok, Shanton Chang, and Atif Ahmad

PDF

Anomaly Detection over User Profiles for Intrusion Detection, Grant Pannell and Helen Ashman

PDF

The Complexity of Security Studies in NFC Payment System, Marc Pasquet and Sylvie Gerbaix

PDF

Development and Evaluation of a Secure Web Gateway Using Existing ICAP Open Source Tools, Michael Pearce and Ray Hunt

PDF

Information Security Disclosure: A Victorian Case Study, Ian Rosewall and Matthew Warren

PDF

Organisational Learning and Incident Response: Promoting Effective Learning Through The Incident Response Process, Piya Shedden, Atif Ahmad, and A B. Ruighaver

PDF

Information Security Risk Assessment: Towards a Business Practice Perspective, Piya Shedden, Wally Smith, and Atif Ahmad

PDF

Security Information Supplied by Australian Internet Service Providers, Patryk Szewczyk

PDF

The Economics of Developing Security Embedded Software, Craig S. Wright and Tanveer A. Zia

PDF

New Approaches to Mitigation of Malicious Traffic in VoIP Networks, Tobi Wulff and Ray Hunt

PDF

An Analytical Study of It Security Governance and its Adoption on Australian Organisations, Tanveer A. Zia

Submissions from 2009

PDF

Proposed Framework for Understanding Information Security Culture and Practices in the Saudi Context, Mohammed Alnatheer and Karen Nelson

PDF

Development of a Critical Factors Model for the Knowledge Economy in Saudi Arabia, Fahad A. Alothman and Peter Busch

PDF

Spoofing Attack Against an EPC Class One RFID System, Christopher Bolan

PDF

Electronic-Supply Chain Information Security: A Framework for Information, Alizera Bolhari

PDF

Assessment of Internationalised Domain Name Homograph Attack Mitigation, Peter Hannay and Christopher Bolan

PDF

Security Requirements Engineering-The Reluctant Oxymoron, Michael N. Johnstone

PDF

Security Issues Challenging Facebook, S Leitch and M Warren

PDF

Exploring the Relationship between Organizational Culture and Information Security Culture, Joo S. Lim, Shanton Chang, Sean Maynard, and Atif Ahmad

PDF

Method for Securing Online Community Service: A Study of Selected Western Australian Councils, Sunsern Limwiriyakul

PDF

Measuring Information Security Governance Within General Medical Practice, Rachel J. Mahncke, Donald C. McDermid, and Patricia A. Williams

PDF

Challenges in Improving Information Security Practice in Australian General, Donald C. McDermid, Rachel J. Mahncke, and Patricia A. Williams

PDF

Case Study on an Investigation of Information Security Management among Law Firms, Sameera Mubarak and Elena Sitnikova

PDF

Playing Safe: A Prototype Game For Raising Awareness of Social Engineering, Michael Newbould and Stephen Furnell

PDF

2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk

PDF

Information Security Disclosure: A Case Study, I Rosewall and M J. Warren

PDF

Strong Authentication for Web Services using Smartcards, D S. Stienne, Nathan Clarke, and Paul Reynolds

PDF

Improving an organisations existing information technology policy to increase security, Shane Talbot and Andrew Woodward

PDF

Review of Browser Extensions, a Man-in-the-Browser Phishing Techniques Targeting Bank Customers, Nattakant Utakrit

PDF

What Does Security Culture Look Like For Small Organizations?, Patricia A. Williams

Submissions from 2008

PDF

Information security governance and Boards of directors: Are they compatible?, Endre Bihari

PDF

RFID Communications - Who is listening?, Christopher Bolan

PDF

Deployment of Keystroke Analysis on a Smartphone, A Buchoux and N L. Clarke

PDF

Framework for Anomaly Detection in OKL4-Linux Based Smartphones, Geh W. Chow and Andy Jones

PDF

Evaluating the usability impacts of security interface adjustments in Word 2007, M Helala, S M. Furnell, and M Papadaki

PDF

Secure Portable Execution Environments: A Review of Available Technologies, Peter James