Follow

Submissions from 2009

Improving an Organisations Existing Information Technology Policy to Increase Security, Shane Talbot and Andrew Woodward

Automatic detection of child pornography: A research in progress, Glen Thompson

Education and Training, Craig Valli

Laboratory Location, Craig Valli

Management of Evidence Storage, Craig Valli

Management of the Collection of Evidence, Craig Valli

Quality Assurance, Craig Valli

PDF

SCADA Forensics with Snort IDS, Craig Valli

Scoping the Requirement for the Laboratory, Craig Valli

Selecting the Staff, Craig Valli

The future of Digital Forensics and Its Role in Criminal Investigations, Craig Valli

Link

The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies, Craig Valli

Understanding the role of the Digital Forensic Laboratory Manager, Craig Valli

PDF

Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli

PDF

SCADA Security - Slowly Circling a Disaster Area, Craig Valli and Andrew Woodward

Link

Capturing Culture in Medical Information Security Research, Patricia Williams

What does security culture look like for small organizations?, Patricia Williams

Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?, Andrew Woodward

When You Can't See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks, Andrew Woodward and Brett Turner

Submissions from 2008

Link

iPhone Forensics Methodology and Tools, Haitham Al-Hajri and Krishnun Sansurooah

An overview of Mobile Embedded Memory and Forensics Methodology, Mesfer Al-Hajri

iPhone Forensics Methodology and Tools, Mesfer Al-Hajri and Krishnun Sansurooah

Organisational Security: A Propositional Study to Map Expert Knowledge, Adel Alruwaii and David Brooks

Psychometric Risk Perception: Why Some Individuals Elect not to Act on Risks? , Jaber Alsuhaimi and David Brooks

Digital Forensics and the Legal System: A Dilemma of our Times., James Tetteh Ami-Narh and Patricia Williams

Freedom Fighters or Terrorists by another Name?, William Bailey and Adam Mcgill

Survey and Future Trends of Efficient Cryptographic Function Implementations on GPGPUs, Adrian Boeing

Protecting Critical Infrastructure with Games Technology, Adrian Boeing, Martin Masek, and William Bailey

A Review of the Electronic Product Code Standards for RFID Technology, Christopher Bolan

RFID Communications - Who is Listening?, Christopher Bolan

Defining the science of private security through knowledge categorisation, David Brooks

Public Street CCTV: A Psychometric Study of Social Risk, David Brooks

Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke

A Framework for Anomaly Detection in OKL4-Linux Based Smartphones, G Chow and Andrew Jones

Evaluation a critical point on the path to intelligence, Jeffrey Corkill

Professional Intelligence Judgement Artistry, Jeffrey Corkill

Australia's Oil Refining Industry - Importance, Threats and Emergency Response, Amanda East and William Bailey

Malware Analysis Framework from Static to Dynamic Analysis, Fadi El-moussa and Andrew Jones

Aviation Infrastructure Protection: Threats Contingency Plans and the Importance of Networks, Melvyn Griffiths and William Bailey

Forensic Acquisition and Analysis of the TomTom One Satellite Navigation Unit, Peter Hannay

Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims. , Peter Hannay and Andrew Woodward

Evaluating the Usability Impacts of Security Interface Adjustments in Word 2007, M Helala, Steven Furnell, and M Papadaki

Media, Government and Manipulation: The Cases of the Two Gulf Wars, William Hutchinson

Propaganda Dilemmas for Environmental Security, William Hutchinson

The Ethics of Information Operations, William Hutchinson

Catching the Malicious Insider, Andrew Jones

Dealing with the Malicious Insider, Andrew Jones and Carl Colwill

PDF

The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland

PDF

Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland

Modern Society as Risk Society: Implications of Modernity on Private Security, David Jurcic

Security Metrics - A Critical Analysis of Current Methods, Manwinder Kaur and Andrew Jones

A New Definition of Piracy in South East Asia Required?, Paul Kevans and William Bailey

The Use of Red Teaming in The Corporate Environment: A Study of Security Management, Vulnerabilities and Defence, G Lane and David Brooks

Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward

Email �Message-IDs� Helpful for Forensic Analysis?, Satheesaan Pasupatheswaran

Subverting National Internet Censors: An Investigation into Existing Tools and Techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

Industrial Espionage from Residual Data: Risks and Countermeasures, Ian Sutherland and Andrew Jones

Nuclear Radiation: Properties, Characteristics, And Radiological Dispersal Devices., Geoffrey Swan

Malware, Viruses and Log Visualisation, Iain Swanson

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams

Link

Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand

The Impact Of U3 Devices On Forensic Analysis., Ravi Tank and Patricia Williams

Network security isnt all fun and games: an analysis of information transmitted whilst playing Team Fortress 2, Brett Turner and Andrew Woodward

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation, Brett Turner and Andrew Woodward

Link

The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand

PDF

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Craig Valli and Andrew Jones

Link

The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues, Craig Valli and Andrew Woodward

Link

A Practical Application of CMM to Medical Security Capability, Patricia Williams

Link

Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams

Link

How Addressing Implementation Issues Can Assist in Medical Information Security Governance. , Patricia Williams

Link

In a "trusting" environment, everyone is responsible for information security, Patricia Williams

Link

Is There an Ideal Forensic Process?, Patricia Williams

Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew

Link

Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli

What Artefacts do Current BitTorrent Clients Leave Behind? , Andrew Woodward

Forensic implications of using the firewire memory exploit with Microsoft Windows XP, Andrew Woodward and Peter Hannay

Link

Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis. , Andrew Woodward and Craig Valli

Submissions from 2007

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams

Identifying Criteria which Influence the Effectiveness of Public Profiles in Online Learning Environments, Gregory Baatard

Teaching PHP with Security in Mind, Gregory Baatard

A Single Channel Attack on 915MHz Radio Frequency Identification Systems, Christopher Bolan

KILL Features of RFID Tags in a Medical Environment: Boon or Burden?, Christopher Bolan

Radio Frequency Identification: a review of low cost tag security proposals, Christopher Bolan

Advanced User Authentication for Mobile Devices, NL Clarke and Steven Furnell

Authenticating mobile phone users using keystroke analysis, NL Clarke and Steven Furnell

An Assessment of Website Password Practices, Steven Furnell

Making Security Usable: Are Things Improving?, Steven Furnell

Assessing the Security Perceptions of Personal Internet Users, Steven Furnell, P Bryant, and AD Phippen

Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Susan Kennedy

Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James

A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept, Peter Hannay, Andrew Woodward, and Nicholas Cope

Network Security - Is IP Telephony helping the cause?, Paul Hansen and Andrew Woodward

How safe is Azeroth, or are MMORPGs a security risk?, An Hilven and Andrew Woodward

Securing VoIP - a framework to mitigate or manage risks, Peter James and Andrew Woodward

A framework for the management of information security risks, Andrew Jones

Anti-Forensics and the Digital Forensics Investigator, Gary Kessler

Experiences and Methodologies Teaching Hands-On Cyberforensics Skills Online, Gary Kessler

User Perception of the Security & Privacy Concerns of RFID Technology, F Li, N Clarke, and Christopher Bolan

Link

The issues in securing electronic health information in transit, Rachel Mahncke and Patricia Williams