Australian Information Security Management Conference
Submissions from 2018
Bringing defensive artificial intelligence capabilities to mobile devices, Kevin Chong and Ahmed Ibrahim
Mitigating man-in-the-middle attacks on mobile devices by blocking insecure http traffic without using vpn, Kevin Chong, Muhammad Imran Malik, and Peter Hannay
The impact of personality traits on user’s susceptibility to social engineering attacks, Brian Cusack and Kemi Adedokun
Vulnerability analysis: protecting information in the IoT, Brian Cusack and Feiqiu Zhuang
An investigation into a denial of service attack on an ethereum network, Richard Greene and Michael N. Johnstone
The relevance of a good internal control system in a computerised accounting information system, Raymond Lutui and Tau’aho ‘Ahokovi
Mobile device wardriving tools’ comparison: Nuku’alofa as case study, Raymond Lutui, ‘Osai Tete’imoana, and George Maeakafa
XMPP architecture and security challenges in an IoT ecosystem, Muhammad Imran Malik, Ian Noel McAteer, Peter Hannay, Syed Naeem Firdous, and Zubair Baig
Security vulnerabilities in android applications, Crischell Montealegre, Charles Rubia Njuguna, Muhammad Imran Malik, Peter Hannay, and Ian Noel McAteer
Detection techniques in operational technology infrastructure, Glenn Murray, Matthew Peacock, Priya Rabadia, and Paresh Kerai
Submissions from 2017
Intelligent feature selection for detecting http/2 denial of service attacks, Erwin Adi and Zubair Baig
Core elements in information security accountability in the cloud, Zahir Al-Rashdi, Martin Dick, and Ian Storey
Literature-based analysis of the influences of the new forces on ISMS: A conceptual framework, Zahir Al-Rashdi, Martin Dick, and Ian Storey
A critical analysis of security vulnerabilities and countermeasures in a smart ship system, Dennis Bothur, Guanglou Zheng, and Craig Valli
Assessment of security vulnerabilities in wearable devices, Brian Cusack, Bryce Antony, Gerard Ward, and Shaunak Mody
Neurosecurity for brainware devices, Brian Cusack, Kaushik Sundararajan, and Reza Khaleghparast
Evaluating IP surveillance camera vulnerabilities, Brian Cusack and Zhuang Tian
Financial fraud risk management and corporate governance, Raymond Lutui and Tau'aho 'Ahokovi
Tonga’s organisational vulnerability to social engineering, Raymond Lutui and Viliami Fe’aomoeata
Security readiness evaluation framework for Tonga e-government initiatives, Raymond Lutui, Semisi Hopoi, and Siaosi Maeakafa
A comparison of 2D and 3D Delaunay triangulations for fingerprint authentication, Marcelo Jose Macedo, Wencheng Yang, Guanglou Zheng, and Michael N. Johnstone
Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things, Ian Noel McAteer, Muhammad Imran Malik, Zubair Baig, and Peter Hannay
The 2017 homograph browser attack mitigation survey, Tyson McElroy, Peter Hannay, and Greg Baatard
The convergence of IT and OT in critical infrastructure, Glenn Murray, Michael N. Johnstone, and Craig Valli
Deceptive security based on authentication profiling, Andrew Nicholson, Helge Janicke, Andrew Jones, and Adeeb Alnajaar
A Sri Lankan hacking case study, Ishan Senarathna and Matthew Warren
The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)
A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016, Samuel Griffith Wakeling, Peter Hannay, and Zubair Baig
An investigation into some security issues in the DDS messaging protocol, Thomas White, Michael N. Johnstone, and Matthew Peacock
Submissions from 2016
A survey of social media users privacy settings & information disclosure, Mashael Aljohani, Alastair Nisbet, and Kelly Blincoe
An investigation of potential wireless security issues in traffic lights, Brian Bettany, Michael N. Johnstone, and Matthew Peacock
Celestial sources for random number generation, Erin Chapman, Jerina Grewar, and Tim Natusch
Using graphic methods to challenge cryptographic performance, Brian Cusack and Erin Chapman
A privacy gap around the internet of things for open-source projects, Brian Cusack and Reza Khaleghparast
Future of Australia’s ETP: Script exchange, script vault or secure mobile alternative, Kyaw Kyaw Htat, Patricia A. H. Williams, and Vincent McCauley
The Proceedings of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Mike Johnstone
An analysis of chosen alarm code pin numbers & their weakness against a modified brute force attack, Alastair Nisbet and Maria Kim
Understanding and combatting terrorist networks: Coupling social media mining with social network analysis, Benn Van Den Ende
Accelerating NTRUEncrypt for in-browser cryptography utilising graphical processing units and WebGL, Dajne Win, Seth Hall, and Alastair Nisbet
A hybrid behaviour recognition and intrusion detection method for mobile devices, Ashley Woodiss-Field
Submissions from 2015
Urdu text steganography: Utilizing isolated letters, Aliya Tabassum Abbasi, Nuzhat Naqvi, Aihab Khan, and Basheer Ahmad
Towards dynamic adaption of user's organisational information security behaviour, Mutlaq Alotaibi, Steven Furnell, and Nathan Clarke
Using passive and active enumeration methods to improve IPv6 host enumeration search algorithms, Clinton Carpene
Loyalty cards and the problem of CAPTCHA: 2nd tier security and usability issues for senior citizens, David M. Cook, Apoorv Kumar, and Charwina Unmar-Satiah
Evaluating policy layer security controls for value realisation in secure systems, Brian Cusack and Maher Al-Khazrajy
Innovating additional Layer 2 security requirements for a protected stack, Brian Cusack and Raymond Lutui
Evaluating single sign on security failure in cloud services, Brian Cusack and Eghbal Zadeh
Ransomware: Emergence of the cyber-extortion menace, Nikolai Hampton and Zubair A. Baig
A survey and method for analysing SoHo router firmware currency, Nikolai Hampton and Patryk Szewczyk
Timing attack detection on BACnet via a machine learning approach, Michael N. Johnstone, Matthew Peacock, and J I. den Hartog
Behavior-based anomaly detection on big data, Hyunjoo Kim, Jonghyun Kim, Ikkyun Kim, and Tai-myung Chung
The challeges in implementing security in spontaneous ad hoc networks, Alastair Nisbet
Selection of penetration testing methodologies: A comparison and evaluation, Aleatha Shanley and Michael N. Johnstone
Submissions from 2014
Attribute-based encryption with encryption and decryption outsourcing, Muhammad Asim, Milan Petkovic, and Tanya Ignatenko
Securing the internet of things infrastructure – Standards and techniques, Zubair A. Baig
A survey of IPV6 address usage in the public domain name system, Clinton R. Carpene and Andrew Woodward
Securing identity information with image watermarks, Brian Cusack and Reza Khaleghparas
Evaluating the security vulenerabilities of the IP6to4 tunnelling mechanism, Brian Cusack and Raymond Lutui
Authentication and authorisation in entrusted unions, Ayed F. Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, and John Zic
Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk Szewczyk
The application of an agile approach to it security risk management for SMES, Damien Hutchinson, Chris Armitt, and Dean Edwards-Lear
Mitigating man-in-the-middle attacks on smartphones – a discussion of SSL pinning and DNSSec, Veelasha Moonsamy and Lynn Batten
The impact of social constructivism on ERP systems security: A critical social review, Kennedy Njenga
An analysis of security issues in building automation systems, Matthew Peacock and Michael N. Johnstone
12th Australian Information Security Management Conference, 2014, Edith Cowan University: Conference details, Security Research Institute, Edith Cowan University
Cache-timing attack against aes crypto system - countermeasures review, Yaseen H. Taha, Settana M. Abdulh, Naila A. Sadalla, and Huwaida Elshoush
Submissions from 2013
Determining What Characteristics Constitute a Darknet, Symon Aked, Christopher Bolan, and Murray Brand
A Conceptual Model For Federated Authentication in the Cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel
A Comparison of Information Security Curricula in China and the USA, Huaying Chen, Sean B. Maynard, and Atif Ahmad
The Effectiveness of Internet Activity Erasure Tools to Protect Privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber
Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms, Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, and Mike Johnstone
Automated Detection of Vehicles with Machine Learning, Michael N. Johnstone and Andrew Woodward
Privacy and Legal Issues in Cloud Computing - The SMME Position in South Africa, Mathias Mujinga
Information Security Management: Factors that Influence Security Investments in SMES, Zhi Xian Ng, Atif Ahmad, and Sean B. Maynard
A 2013 Study of Wireless Network Security in New Zealand: Are We There Yet?, Alastair Nisbet
A Simulation-Based Study of Server Location Selection Rules in Manets Utilising Threshold Cryptography, Alastair Nisbet
Usability and Security Support Offered Through ADSL Router User Manuals, Patryk Szewczyk
Submissions from 2012
An Investigation into the Wi-Fi Protected Setup PIN of the Linksys WRT160N v2, Symon Aked, Christopher Bolan, and Murray Brand
A proposed formula for comparing kill password effectiveness in single password RFID systems, Christopher Bolan
Exposing Potential Privacy Issues with IPv6 Address Construction, Clinton Carpene and Andrew Woodward
HARMs: Hierarchical Attack Representation Models for Network Security Analysis, Jin Hong and Dong-Seong Kim
The Mobile Execution Environment: A Secure and Non-Intrusive Approach to Implement a Bring You Own Device Policy for Laptops, Peter James and Don Griffiths
Does the Android Permission System Provide Adequate Information Privacy Protection for End-Users of Mobile Apps?, Michael Lane
Web-Based Risk Analysis for Home Users, R. T. Magaya and N. L. Clarke
An Information Security Awareness Capability Model (ISACM), Robert Poepjes and Michael Lane
Implementing a Secure Academic Grid System - A Malaysian Case, Mohd Samsu Sajat, Suhaidi Hassan, Adi Affandi Ahmad, Ali Yusny Daud, and Amran Ahmad
A survey of computer and network security support from computer retailers to consumers in Australia, Patryk Szewczyk
Experimenting with Anomaly Detection by Mining Large-Scale Information Networks, A. Taleb-Bendiab
Human-Readable Real-Time Classifications of Malicious Executables, Anselm Teh and Arran Stewart
Territorial behavior and the economics of Botnets, Craig S. Wright
Submissions from 2011
Implementation of ISO 27001 in Saudi Arabia – obstacles, motivations, outcomes, and lessons learned, Belal AbuSaad, Fahad A. Saeed, Khaled Alghathbar, and Bilal Khan
An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked
Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk
A risk index model for security incident prioritisation, Nor Badrul Anuar, Steven Furnell, Maria Papadaki, and Nathan Clarke
Understanding the management of information security controls in practice, Daniel Bachlechner, Ronald Maier, Frank Innerhofer-Oberperfler, and Lukas Demetz
Seeing the full picture: the case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp
A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan
Seniors language paradigms: 21st century jargon and the impact on computer security and financial transactions for senior citizens, David M. Cook, Patryk Szewczyk, and Krishnun Sansurooah
User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan
Human-related information security problems faced by British companies in economically rising countries, Suchinthi Fernando and Tatsuo Asai