Follow

Submissions from 2012

PDF

Accountable-eHealth Systems: the Next Step Forward for Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, and Tony Sahama

PDF

Legal Issues Related to Accountable-eHealth Systems in Australia, Randike Gajanayake, Bill Lane, Tony Iannella, and Tony Sahama

PDF

Assessing the accessibility of E-learning, Morten Goodwin, Iain Sutherland, Frode Roarson, and Tom Drange

PDF

Cloud security: A case study in telemedicine, Michael Johnstone

PDF

On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks, Michael Johnstone and Jeremy Jarvis

Towards Effective Algorithms for Intelligent Defense Systems, Michael Johnstone and Andrew Woodward

Link

The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Andrew Jones, Thomas Martin, and Mohammed Alzaabi

Link

Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

PDF

A Holistic Approach to eHealth Security in Australia: Developing a National eHealth Sercurity and Access Framework (NESAF), Yvette Lejins and John Leitch

PDF

Developing Governance Capability to Improve Information Security Resilience in Healthcare, Rachel Mahncke and Patricia Williams

Link

Multimodal behavioural biometric authentication for mobile devices, Hataichanok Saevanee, Nathan Clarke, and Steven Furnell

Link

Multi-modal behavioural biometric authentication for mobile devices, H Saevanee, Nathan Clarke, and Steven Furnell

PDF

An Overview of Cloud Computing Challenges and Its Security Concerns, Krishnun Sansurooah

Link

Towards an organizational culture framework for information security practices, Joo Soon Lim, Shanton Chang, Atif Ahmad, and Sean Maynard

Link

Protective Emblems in Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth

PDF

An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users, Patryk Szewczyk

Link

A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia, Patryk Szewczyk

Link

The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

Link

SSH -- Somewhat Secure Host, Craig Valli

Link

Eavesdropping on the Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, and Christopher Holme

High temperature dry sliding friction and wear behavior of aluminum matrix composites (Al3Zr+α-Al2O3)/Al, Heguo Zhu, Cuicui Jar, Jinzhu Song, Jun Zhao, Jianliang Li, and Zonghan Xie

Submissions from 2009

Link

Securing the next generation: enhancing e-safety awareness among young people, Shirley Atkinson, Steven Furnell, and Andy Phippen

Link

Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward

Link

Smartpot: Creating a 1st generation smartphone honeypot, Michael Freeman and Andrew Woodward

Link

Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson

Link

From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson

Link

Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson

Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams

Link

Cyber influence, William Hutchinson

Link

The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and G Dabibi

Link

The 2008 analysis of information remaining on disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland, and Gareth Davies

Link

Application of latent moderated structuring (LMS) to rank the effects of intervening variables on teh IT and firm performance relationship, Abbas Keramati, Glenn Dardick, Navid Majir, and Behdad Banan

Link

Measuring information security governance within general medical practice, Rachel Mahncke, Donald McDermid, and Patricia Williams

Link

Challenges in improving information security practice in Australian general practice, Donald Mcdermid, Rachel Mahncke, and Patricia Williams

Link

The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk

Link

ADSL Router Forensics: Methods of Acquisition, Patryk Szewczyk

Link

ADSL Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk

Link

Assessing the Online Security Awareness of Australian Internet Users, Patryk Szewczyk and Steven Furnell

Link

Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective , Patryk Szewczyk and Craig Valli

Link

Automatic detection of child pornography: A research in progress, Glen Thompson

Education and Training, Craig Valli

Laboratory Location, Craig Valli

Management of Evidence Storage, Craig Valli

Management of the Collection of Evidence, Craig Valli

Quality Assurance, Craig Valli

PDF

SCADA Forensics with Snort IDS, Craig Valli

Scoping the Requirement for the Laboratory, Craig Valli

Selecting the Staff, Craig Valli

The future of Digital Forensics and Its Role in Criminal Investigations, Craig Valli

Link

The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies, Craig Valli

Understanding the role of the Digital Forensic Laboratory Manager, Craig Valli

PDF

Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli

PDF

SCADA Security - Slowly Circling a Disaster Area, Craig Valli and Andrew Woodward

Link

Capturing Culture in Medical Information Security Research, Patricia Williams

Link

What does security culture look like for small organizations?, Patricia Williams

Link

When you can't see the forest for the domains: why a two forest model should be used to achieve logical segregation between SCADA and corporate networks, Andrew Woodward and Brett Turner

Submissions from 2008

Link

iPhone Forensics Methodology and Tools, Haitham Al-Hajri and Krishnun Sansurooah

Link

Digital Forensics and the Legal System: A Dilemma of our Times., James Tetteh Ami-Narh and Patricia Williams

Link

Survey and future trends of efficient cryptographic function implementations on GPGPUs, Adrian Boeing

Link

Protecting critical infrastructure with games technology, Adrian Boeing, Martin Masek, and William Bailey

Link

Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke

Link

Evaluation a critical point on the path to intelligence, Jeffrey Corkill

Link

Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson

PDF

The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland

PDF

Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland

Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward

Link

Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran

Link

Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

Link

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams

Link

Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand

Link

The Impact Of U3 Devices On Forensic Analysis., Ravi Tank and Patricia Williams

Link

Network security isn't all fun and games: an analysis of information transmitted whilst playing Team Fortress 2, Brett Turner and Andrew Woodward

Link

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation, Brett Turner and Andrew Woodward

Link

The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand

PDF

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Craig Valli and Andrew Jones

Link

The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues, Craig Valli and Andrew Woodward

Link

A Practical Application of CMM to Medical Security Capability, Patricia Williams

Link

Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams

Link

How Addressing Implementation Issues Can Assist in Medical Information Security Governance. , Patricia Williams

Link

In a "trusting" environment, everyone is responsible for information security, Patricia Williams

Link

Is There an Ideal Forensic Process?, Patricia Williams

Link

Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew

Link

Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli

Link

Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis. , Andrew Woodward and Craig Valli

Submissions from 2007

Link

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

Link

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams

Link

Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Susan Kennedy

Link

A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept, Peter Hannay, Andrew Woodward, and Nicholas Cope

Link

Network Security - Is IP Telephony helping the cause?, Paul Hansen and Andrew Woodward

Link

How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward

Link

Securing VoIP - a framework to mitigate or manage risks, Peter James and Andrew Woodward

Link

The issues in securing electronic health information in transit, Rachel Mahncke and Patricia Williams

Link

An overview and examination of digital PDA devices under forensics toolkits., Krishnun Sansurooah

Link

ADSL Router Forensics Part 1: An Introduction to a New Source of Electronic Evidence, Patryk Szewczyk

Link

An Examination of the Asus WL-HDD 2.5 as a Nepenthes Malware Collector, Patryk Szewczyk

PDF

IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems, Craig Valli

Link

Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward

Link

An Overview of ADSL Homed Nepenthes Honeypots In Western Australia., Craig Valli and Aaron Wooten

Link

A holistic perspective on models for medical information security, Patricia Williams

Link

Medical data security: Are you informed or afraid?, Patricia Williams