Follow

Submissions from 2007

Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry, Danny Ng and Andrew Woodward

A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head, PM Rodwell, Steven Furnell, and PL Reynolds

An approach in identifying and tracing back spoofed IP packets to their sources, Krishnun Sansurooah

An overview and examination of digital PDA devices under forensics toolkits., Krishnun Sansurooah

Link

ADSL Router Forensics Part 1: An Introduction to a New Source of Electronic Evidence, Patryk Szewczyk

Link

An Examination of the Asus WL-HDD 2.5 as a Nepenthes Malware Collector, Patryk Szewczyk

A New Taxonomy for Comparing Intrusion Detection Systems, CJ Tucker, Steven Furnell, BV Ghita, and PJ Brooke

PDF

IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems, Craig Valli

Link

Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward

Link

An Overview of ADSL Homed Nepenthes Honeypots In Western Australia., Craig Valli and Aaron Wooten

Link

A holistic perspective on models for medical information security, Patricia Williams

Link

Medical data security: Are you informed or afraid?, Patricia Williams

Medical insecurity: when one size does not fit all, Patricia Williams

Link

Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice, Andrew Woodward and Patricia Williams

PDF

Profiling Through a Digital Mobile Device, Lee Fueng Yap and Andrew Jones

Submissions from 2006

Do No Harm: The Use of RFID Tags in a Medical Environment, Christopher Bolan

Strategies for the Blocking of RFID Tags, Christopher Bolan

The Lazarus Effect: Resurrecting Killed RFID Tag, Christopher Bolan

Mapping the consensual knowledge of security risk management experts, David Brooks

A Composite User Authentication Architecture for Mobile Devices, Nathan Clarke and Steven Furnell

Does your wireless LAN have criminal intent?, Michael Crowley and Andrew Woodward

Security-Relevant Semantic Patterns of BPEL in Cross-Organisational Business Processes, Klaus Fischer, Udo Bleimann, Woldemar Fuhrmann, and Steven Furnell

Assessing the usability of WLAN security for SOHO users, Bogdan Ghita and Steven Furnell

A Methodology for the Examination of the Effectivness of Secure Erasure Tools Running on Windows XP - Research in Progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward

Link

The implementation of E-mail content management in a large corporation, Keir Hansen and Craig Valli

PDF

Honeypots: How do you know when you're inside one?, Simon Innes and Craig Valli

A Global Review of Information Remaining on Disks Disposed of by Organisations, Andrew Jones

PDF

The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland, and Paula Thomas

Evaluation of end-user application security from a usability perspective, Dimitris Katsabas, Steven Furnell, and Paul Dowland

Risks and Responsibilities in Establishing a Wireless Network for an Educational Institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward

Risk and Restitution: Assessing how users establish online trust, Hazel Lacohee, Andy Phippen, and Steven Furnell

Secure transmission of shared electronic health records, Rachel Mahncke and Patricia Williams

A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 - 'systems installed in a client's premises', Robert Mclaughlin and David Brooks

PDF

A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli

Achieving Automated Intrusion Response: A Prototype Implementation, Maria Papadaki and Steven Furnell

Designing and explaining programs with a literate pseudocode, Geoffrey Roy

An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah

Taxonomy of computer forensics methodologies and procedures for digital evidence seizure., Krishnun Sansurooah

A Digital forensic practitioner's guide to giving evidence in a court of law, Shayne Sherman

Link

Individuals Perceptions of Wireless Security in the Home Environment, Patryk Szewczyk

Link

Personal Firewalls - Testing Robustness, Patryk Szewczyk and Craig Valli

Tags at War: A Review of the United States Department of Defence RFID Tag Data Standard, Nadezda Urosevic and Christopher Bolan

Tags at war: A review of the United States Department of Defence RFID tag data standard, Uros Urosevic and Christopher Bolan

PDF

A Preliminary Investigation into Malware Propagation on Australian ISP Networks using the mwcollect Malware Collector daemon, Craig Valli

PDF

Establishing a vendor neutral skills based framework for digital forensics curriculum development and competence assessment, Craig Valli

PDF

SQL Injection - Threats to Medical Systems: The Issues and Countermeasures, Craig Valli

Use of bootable Linux CDs for the delivery of educational course content, Craig Valli

Telemedicine and the digital door doctor, Darren Webb and Patricia Williams

Apprasing information security rituals in primary care medical practice, Patricia Williams

Making research real: Is action research a suitable methodology for medical information security, Patricia Williams

Security immunization using basic countermeasures, Patricia Williams

The role of standards in medical information security: an opportunity for improvement, Patricia Williams

Link

Primary care information security: a case study for practical assistance, Patricia Williams and Rachel Mahncke

Link

Shared Electronic Health Records: A changing landscape for security in medical practice, Patricia Williams and Rachel Mahncke

BitLocker - the end of digital forensics?, Andrew Woodward

Data Security and wireless networks - mutually exclusive?, Andrew Woodward

LIARS: Laptop Inspector and Recovery System, Andrew Woodward

Submissions from 2005

RFID-Evaluation of Tag Security Schemes, Christopher Bolan

The Growth of 802.11b and 802.11g Networks in the Perth CBD, Western Australia, Christopher Bolan

The introduction of RFID Security into computer security courses, Christopher Bolan

Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks

Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell

User Authentication for Mobile Devices: A Composite Approach, Nathan Clarke and Steven Furnell

A protection profiles approach to risk analysis for small and medium enterprises, Vassilis Dimopoulos and Steven Furnell

A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments, Klaus Fischer, Udo Bleimann, Woldemar Fuhrmann, and Steven Furnell

TCP performance estimation using neural networks modelling, Bogdan Ghita, Steven Furnell, Benn Lines, and Emmanuel Ifeachor

Using Human Computer Interaction principles to promote usable security, Dimitris Katsabas, Steven Furnell, and Paul Dowland

A computer network laboratory based on the concept of virtual machines, Wojciech Kuczborski

Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset, Julien Lecomte, Nathan Clarke, and Steven Furnell

PDF

After Conversation - A Forensic ICQ Logfile Extraction Tool, Kim Morfitt and Craig Valli

Effects of Steganography In The Business World: How Mobile Devices Can Make A Difference, Danny Ng

HTTP-aware Anonymisation of Packet Traces, Eric Salama, Bogdan Ghita, and Steven Furnell

Link

Securing PDAs in the healthcare environment, Emiko Terado and Patricia Williams

PDF

Honeypot Technologies and Their Applicability as an Internal Countermeasure, Craig Valli

PDF

Integrating Open Source Protections into SCADA Networks, Craig Valli

PDF

A UK and Australian Study of Hard Disk Disposal, Craig Valli and Andrew Jones

PDF

An Investigation into the Efficiency of Forensic Erasure Tools for Hard Disk Mechanisms, Craig Valli and Paul Patak

PDF

An Investigation into Long Range Detection of Passive UHF RFID Tags, Craig Valli, Andrew Woodward, Ken Wild, and Reino Karvinen

Link

Awareness invoking positive change: Reflections on lecturing practice in Computer and Information Science, Patricia Williams

Information security awareness of medical practitioners, Patricia Williams

Link

Physician secure thyself, Patricia Williams

Link

The underestimation of threats to patients data in clinical practice, Patricia Williams

Where are the policies for PDA usage in the Australian healthcare environment?, Patricia Williams

Link

Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson

A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke

Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke

Link

The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke

Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward

Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations, Andrew Woodward

The effectiveness of commercial erasure programs on BitTorrent activity, Andrew Woodward

WPA/WPA2: Placebo or Panacea?, Andrew Woodward

Submissions from 2003

PDF

Security management education online, Peter J. Hosie, Clifton L. Smith, and Joseph Luca

A new minor in network administration and design, Wojciech Kuczborski

High-Radix Arithmetic Systems on Signed Digit Number Representation and Residue Number System, Wojciech Kuczborski

The significance of virtual computer networks in distance education, Wojciech Kuczborski

Socialism in Mozambique? The 'Mozambican Revolution' in Critical Perspective, David Robinson

PDF

Honeyd - A OS Fingerprinting Artifice, Craig Valli

PDF

Industry Certification: Challenges for the conduct of University security based courses, Craig Valli

PDF

An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta

PDF

A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli