secAU Conferences

Proceedings of The 1st International Cyber Resilience Conference


23rd & 24th August, 2010, The Duxton Hotel, Perth, Western Australia

Published by

SECAU - Security Research Centre
Edith Cowan University
Perth, Western Australia

Edited by
Professor Craig Valli
secau - Security Research Centre
Edith Cowan University
Perth, Western Australia

Copyright 2010, All Rights Reserved
ISBN 978-0-7298-0690-9

  1. Malware Detection Based on Structural and Behavioural Features of API Calls
    Mamoun Alazab, Robert Layton, Sitalakshmi Venkataraman, Paul Watters
    Pages 1-10
  2. Group-Based Social Network Characterisation Of Hidden Terrorist Networks
    Belinda A. Chiera
    Pages11-21
  3. Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance with High-Impact Returns
    David M. Cook
    Pages 22-30
  4. The Use of Governance to Identify Cyber Threats Through Social Media
    David M. Cook
    Pages 31-40
  5. Detecting Money Laundering and Terrorism Financing Activity in Second Life and World of Warcraft
    Angela S M Irwin and Jill Slay
    Pages 41-51
  6. Making Information Security Acceptable to the User
    Andrew Jones and Thomas Martin
    Pages 51-57
  7. Tracing VNC And RDP Protocol Artefacts on Windows Mobile and Windows Smartphone for Forensic Purpose
    Paresh Kerai
    58-68
  8. Security Analysis of Session Initiation Protocol - A Methodology Based on Coloured Petri Nets
    Lin Liu
    Pages 69-77
  9. Magneto-Optical Visualisation for High-Resolution Forensic Data Recovery Using Advanced Thin Film Nano-Materials
    M. Nur-E-Alam, Mikhail Vasiliev, Kamal Alameh and Craig Valli
    Pages 78-82
  10. What are you Looking for: Identification of Remnant Communication Artefacts in Physical Memory
    Matthew Simon and Jill Slay
    Pages 83-89
  11. Developing Robust VoIP Router Honeypots Using Device Fingerprints
    Craig Valli and Mohammed Al - Lawati
    Pages 90 - 96
  12. Object Discrimination Using a Multi-Wavelength Photonic Sensor
    Kavitha Venkataraayan, Sreten Askraba, Kamal E. Alameh and Clifton L. Smith
    Pages 97 - 104
  13. Is Cyber Resilience in Medical Practice Security Achievable?
    Patricia A. H. Williams
    Pages 105 - 111
  14. Small Business - A Cyber Resilience Vulnerability
    Patricia A. H. Williams and Rachel Mahncke
    Pages 112 - 117
  15. Which Organisational Model Meets Best Practice Criterion for Critical Infrastructure Providers: An Examination of The Australian Perspective Based on Case Studies
    Andrew Woodward and Craig Valli
    Pages 118-125
  16. Penetration Testing and Vulnerability Assessments: A Professional Approach
    Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt and Andrew J.C. Blyth
    Pages 126-132

EndNote Library of Proceedings - Download Here
Complete Proceedings (PDF) - Download Here