Follow

Submissions from 2009

Link

Understanding the role of the Digital Forensic Laboratory Manager, Craig Valli

PDF

Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli

PDF

SCADA Security - Slowly Circling a Disaster Area, Craig Valli and Andrew Woodward

Link

Capturing Culture in Medical Information Security Research, Patricia Williams

Link

What does security culture look like for small organizations?, Patricia Williams

Link

When you can't see the forest for the domains: why a two forest model should be used to achieve logical segregation between SCADA and corporate networks, Andrew Woodward and Brett Turner

Submissions from 2008

Link

iPhone Forensics Methodology and Tools, Haitham Al-Hajri and Krishnun Sansurooah

Organisational security: A propositional study to map expert knowledge, Adel Alruwaii and David Brooks

Psychometric risk perception: Why some individuals elect not to act on risks?, Jaber Alsuhaimi and David Brooks

Link

Digital Forensics and the Legal System: A Dilemma of our Times., James Tetteh Ami-Narh and Patricia Williams

Link

Survey and future trends of efficient cryptographic function implementations on GPGPUs, Adrian Boeing

Link

Protecting critical infrastructure with games technology, Adrian Boeing, Martin Masek, and William Bailey

Public street CCTV: a psychometric study of social risk, David Brooks

Link

Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke

Link

Evaluation a critical point on the path to intelligence, Jeffrey Corkill

Australia's oil refining industry - Importance, threats and emergency response, Amanda East and William Bailey

Link

Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson

PDF

The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland

PDF

Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland

Link

Catching the Malicious Insider, Andy Jones

Link

Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward

Link

Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran

Link

Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

Link

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams

Link

Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand

Link

The Impact Of U3 Devices On Forensic Analysis., Ravi Tank and Patricia Williams

Link

Network security isn't all fun and games: an analysis of information transmitted whilst playing Team Fortress 2, Brett Turner and Andrew Woodward

Link

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation, Brett Turner and Andrew Woodward

Link

The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand

PDF

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Craig Valli and Andrew Jones

Link

The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues, Craig Valli and Andrew Woodward

Link

A Practical Application of CMM to Medical Security Capability, Patricia Williams

Link

Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams

Link

How Addressing Implementation Issues Can Assist in Medical Information Security Governance., Patricia Williams

Link

In a "trusting" environment, everyone is responsible for information security, Patricia Williams

Link

Is There an Ideal Forensic Process?, Patricia Williams

Link

Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew

Link

Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli

Link

Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis., Andrew Woodward and Craig Valli

Submissions from 2007

Link

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

Link

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams

Link

Radio Frequency Identification: a review of low cost tag security proposals, Christopher Bolan

Link

Advanced User Authentication for Mobile Devices, NL Clarke and Steven Furnell

Link

Authenticating mobile phone users using keystroke analysis, NL Clarke and Steven Furnell

Link

An Assessment of Website Password Practices, Steven Furnell

Link

Making Security Usable: Are Things Improving?, Steven Furnell

Link

Assessing the Security Perceptions of Personal Internet Users, Steven Furnell, P Bryant, and AD Phippen

Link

Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Susan Kennedy

Link

A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept, Peter Hannay, Andrew Woodward, and Nicholas Cope

Link

Network Security - Is IP Telephony helping the cause?, Paul Hansen and Andrew Woodward

Link

How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward

Link

Securing VoIP - a framework to mitigate or manage risks, Peter James and Andrew Woodward

Link

A framework for the management of information security risks, Andrew Jones

Link

The issues in securing electronic health information in transit, Rachel Mahncke and Patricia Williams

Link

A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head, PM Rodwell, Steven Furnell, and PL Reynolds

Link

An overview and examination of digital PDA devices under forensics toolkits., Krishnun Sansurooah

Link

ADSL Router Forensics Part 1: An Introduction to a New Source of Electronic Evidence, Patryk Szewczyk

Link

An Examination of the Asus WL-HDD 2.5 as a Nepenthes Malware Collector, Patryk Szewczyk

Link

A New Taxonomy for Comparing Intrusion Detection Systems, CJ Tucker, Steven Furnell, BV Ghita, and PJ Brooke

PDF

IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems, Craig Valli

Link

Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward

Link

An Overview of ADSL Homed Nepenthes Honeypots In Western Australia., Craig Valli and Aaron Wooten

Link

A holistic perspective on models for medical information security, Patricia Williams

Link

Medical data security: Are you informed or afraid?, Patricia Williams

Link

Medical insecurity: when one size does not fit all, Patricia Williams

Link

Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice, Andrew Woodward and Patricia Williams

PDF

Profiling Through a Digital Mobile Device, Lee Fueng Yap and Andrew Jones

Submissions from 2006

Link

The Lazarus Effect: Resurrecting Killed RFID Tag, Christopher Bolan

Link

Mapping the consensual knowledge of security risk management experts, David Brooks

Link

A Composite User Authentication Architecture for Mobile Devices, Nathan Clarke and Steven Furnell

Link

A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward

Link

The implementation of E-mail content management in a large corporation, Keir Hansen and Craig Valli

PDF

Honeypots: How do you know when you're inside one?, Simon Innes and Craig Valli

PDF

The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland, and Paula Thomas

Link

Risk and Restitution: Assessing how users establish online trust, Hazel Lacohee, Andy Phippen, and Steven Furnell

Link

Secure transmission of shared electronic health records, Rachel Mahncke and Patricia Williams

Link

A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 - 'systems installed in a client's premises', Robert Mclaughlin and David J. Brooks

PDF

A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli

Link

Achieving Automated Intrusion Response: A Prototype Implementation, Maria Papadaki and Steven Furnell

Link

Designing and explaining programs with a literate pseudocode, Geoffrey Roy

Link

Personal Firewalls - Testing Robustness, Patryk Szewczyk and Craig Valli

Link

Tags at war: A review of the United States Department of Defence RFID tag data standard, Nadezda Urosevic and Christopher Bolan

PDF

A Preliminary Investigation into Malware Propagation on Australian ISP Networks using the mwcollect Malware Collector daemon, Craig Valli

PDF

Establishing a vendor neutral skills based framework for digital forensics curriculum development and competence assessment, Craig Valli

PDF

SQL Injection - Threats to Medical Systems: The Issues and Countermeasures, Craig Valli

Use of bootable Linux CDs for the delivery of educational course content, Craig Valli

Link

Telemedicine and the digital door doctor, Darren Webb and Patricia Williams

Link

Apprasing information security rituals in primary care medical practice, Patricia Williams

Link

Making research real: Is action research a suitable methodology for medical information security, Patricia Williams

Link

Security immunization using basic countermeasures, Patricia Williams

Link

The role of standards in medical information security: an opportunity for improvement, Patricia Williams

Link

Primary care information security: a case study for practical assistance, Patricia Williams and Rachel Mahncke

Link

Shared Electronic Health Records: A changing landscape for security in medical practice, Patricia Williams and Rachel Mahncke

Link

LIARS: Laptop Inspector and Recovery System, Andrew Woodward

Submissions from 2005

Link

Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks

Link

Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell

Link

A computer network laboratory based on the concept of virtual machines, Wojciech Kuczborski

PDF

After Conversation - A Forensic ICQ Logfile Extraction Tool, Kim Morfitt and Craig Valli

Link

Individuals Perceptions of Wireless Security in the Home Environment, Patryk Szewczyk

Link

Securing PDAs in the healthcare environment, Emiko Terado and Patricia Williams