Follow

Submissions from 2014

Link

I remember Richelieu: Is anything secure anymore?, Michael G. Crowley and Michael N. Johnstone

Link

Identifying bugs in digital forensic tools, B Cusack and A Homewood

Link

Acquisition of evidence from network intrusion detection systems, Brian Cusack and Muteb Alqahtani

Link

Steganographic checks in digital forensic investigation: A social networking case, Brian Cusack and Aimie Chee

Link

Including network routers in forensic investigation, Brian Cusack and Raymond Lutui

Link

Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk

Link

The impace of custom ROM backups on android external storage erasure, Haydon P. Hope and Peter Hannay

PDF

Windows surface RT tablet forensics, Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Andy Jones

Link

A user-oriented network forensic analyser: the design of a high-level protocol analyser, D Joy, Fudong Li, Nathan Clarke, and Steven Furnell

Link

Active authentication for mobile devices utilising behaviour profiling, F Li, Nathan Clarke, M Papadaki, and P Dowland

PDF

Performance evaluation of a technology independent security gateway for Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, and Is-Mkwawa Mkwawa

Link

An evaluation of behavioural profiling on mobile devices, Fudong Li, Ross Wheeler, and Nathan Clarke

PDF

Integrating soil and plant tissue tests and using an artificial intelligence method for data modelling is likely to improve decisions for in-season nitrogen management, Andreas Neuhaus, Leisa Armstrong, Jinsong Leng, Dean Diepeveen, and Geoff Anderson

Link

An analysis of security issues in building automation systems, Matthew D. Peacock and Michael N. Johnstone

Link

Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts, Priya N. Rabadia and Craig Valli

PDF

Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business, Craig Valli, Ian C. Martinus, and Michael N. Johnstone

PDF

Why penetration testing is a limited use choice for sound cyber security practice, Craig Valli, Andrew J. Woodward, Peter Hannay, and Michael N. Johnstone

Link

A situation awareness model for information security risk management, Jeb Webb, Atif Ahmad, Sean Maynard, and Graeme Shanks

Expert Evidence in Australia: A More Transparent Path Post-Dasreef, Nigel Wilson

Submissions from 2013

Link

A response selection model for intrusion response systems: Response Strategy Model (RSM), Nor Badrul Anuar, Maria Papadaki, Steven Furnell, and Nathan Clarke

Link

Breaking the theft-chain-cycle: Property marking as a defensive tool, William J. Bailey and David J. Brooks

Link

Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders, Gabrielle Blanquart and David M. Cook

Link

Defying the logic, forgetting the facts: the new European proposal for data protection in the police sector, Joseph A. Cannataci

PDF

E-Invigilator: A biometric-based supervision system for e-Assessments, Nathan L. Clarke, P Dowland, and Steven M. Furnell

The contemporary Australian intelligence domain, Jeffrey Corkill and Alan Davies

PDF

Security, control and deviance: Mapping the security domain and why it matters, Jeffrey D. Corkill and Michael P. Coole

Link

Australian Democracy in the War on Terror, Michael G. Crowley

Link

The effectiveness of internet activity erasure tools to protect privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber

Link

The contemporary Australian intelligence domain: A multi dimension examination, Alan Davies and Jeffrey Corkill

Link

An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception, Christie Fuller, David Biros, Judee Burgoon, and Jay Nunamaker

Link

Getting past passwords, Steven Furnell

Link

Security education: The challenge beyond the classroom, Steven Furnell

Link

Still on the hook: the persistent problem of phishing, Steven Furnell

Link

Essential lessons still not learned? Examining the password practices of end-users and service providers, Steven Furnell and Nina Bar

Link

Geo Forensics: Classes of locational data sources for embedded devices, Peter Hannay

Link

Exchanging demands: Weaknesses in SSL implementations for mobile platforms, Peter Hannay, Clinton R. Carpene, Craig Valli, Andrew J. Woodward, and Michael N. Johnstone

Link

Co-operative user identity verification using an Authentication Aura, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L. Reynolds

Link

Embedding Secure Programming in the Curriculum: Some Lessons Learned, Michael N. Johnstone

Link

Security aspects of military sensor-based defence systems, Michael N. Johnstone and Robert Thompson

Link

Automated detection of vehicles with machine learning, Michael N. Johnstone and Andrew J. Woodward

Link

Paradigms for cybersecurity education in a Homeland Security Program, Gary C. Kessler and James Ramsay

Link

Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

Phishing Detection: A Literature Survey, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

Physical security barrier selection: A decision support analysis, Agnieszka Kiszelewska and Michael Coole

Link

A technology independent security gateway for real-time multimedia communication, Fudong LI, Nathan Clarke, and Steven Furnell

Link

A technology independent security gateway for future Emergency Telecommunication Systems (ETS), Fudong Li, Nathan Clarke, Steven Furnell, Jose Oscar Fajardo, Fidel Liberal, and Mamadou Sidibe

Link

Active Authentication for Mobile Devices Utilising Behavioural Profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

An exploratory study of the lived experience of being an intelligence analyst, Sharon Moss, Jeffrey Corkill, and Eyal Gringart

Link

Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone

Link

Manipulation of hard drive firmware to conceal entire partitions, Huw Read, Konstantino Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, and Andrew Blyth

Link

Usability and security support offered through ADSL router user manuals, Patryk S. Szewczyk

Link

Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk S. Szewczyk, Nikki Robins, and Krishnun Sansurooah

Link

Patterns and patter - An investigation into SSH activity using Kippo Honeypots, Craig Valli, Priya N. Rabadia, and Andrew J. Woodward

Link

The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille Abdul Rahman, and David M. Cook

PDF

A conceptual framework for secure use of mobile health, Patricia A. Williams and Anthony Maeder

Submissions from 2012

Link

Forensics Data Acquisition Methods for Mobile Phones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin

Link

A revised UTAUT model to investigate E -health acceptance of health professionals in Africa, James Tetteh Ami -Narh and Patricia Williams

Link

Smart-Frame: a Flexible, Scalable, and Secure Information Management Framework for Smart Grids, Joonsang Baek, Quang Vu, Andrew Jones, Sameera Al Mulla, and Chan Yeob Yeun

Link

Layered analysis of security ceremonies, Gianpaolo Bella and Elizabeth Coles-Kemp

Link

Australia: recent developments in space situational awareness, Brett Biddington

Link

Australia's Place in Space: Historical Constraints and Future Opportunities, Brett Biddington

Link

Securing Space: Will Code of Conduct Discussions Help? A Perspective from Australia, Brett Biddington

Link

The Regulation of Space and Cyberspace: One coin, Two sides, Brett Biddington

PDF

Mobile Device Management for Personally Controlled Electronic Health Records: Effective Selection of Evaluation Criteria, Murray Brand and Patricia Williams

Link

Exposing potential privacy issues with IPV6 address construction, Clinton Carpene and Andrew Woodward

PDF

The international effort: building the bridge for Translational Medicine: Report of the 1st International Conference of Translational Medicine (ICTM), Xiaoming Chen, Roland Andersson, William CS Cho, David Christiani, Richard Coico, Jeffery Drazen, Markus Ege, Thomas Fehniger, Hongwei Gao, Kunlin Jin, Michael N. Liebman, Elena Lopez, Giuseppe Marraro, Gyorgy Marko-Varga, Francesco M. Marincola, Laurentiu M. Popescu, Claudio Spada, Aamir Shahzad, Ena Wang, Wei Wang, Xiangdong Wang, Yong-Xiao Wang, Jinglin Xia, and Jia Qu

Link

A novel security architecture for a space-data DTN, Nathan Clarke, Vasilis Katos, Sofia-Anna Menesidou, Bogdan Ghita, and Steven Furnell

PDF

Security Specialists are from Mars; Healthcare Practitioners are from Venus: The Case for a Community-of-Practice Approach to Security Architectures for Healthcare, Elizabeth Coles-Kemp and Patricia Williams

Link

Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language, Michael Coole, Jeffrey Corkill, and Andrew Woodward

Link

Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems, Michael Coole, Andrew Woodward, and Craig Valli

PDF

Building patient trust in electronic health records, Helen Cripps and Craig Standing

PDF

Accountable-eHealth Systems: the Next Step Forward for Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, and Tony Sahama

PDF

Legal Issues Related to Accountable-eHealth Systems in Australia, Randike Gajanayake, Bill Lane, Tony Iannella, and Tony Sahama

PDF

Assessing the accessibility of E-learning, Morten Goodwin, Iain Sutherland, Frode Roarson, and Tom Drange

PDF

Commitment and the 1% Motorcycle Club: threats to the brotherhood, Kira J. Harris

PDF

Cloud security: A case study in telemedicine, Michael Johnstone

PDF

On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks, Michael Johnstone and Jeremy Jarvis

Link

Towards Effective Algorithms for Intelligent Defense Systems, Michael Johnstone and Andrew Woodward

Link

The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Andrew Jones, Thomas Martin, and Mohammed Alzaabi

PDF

A Holistic Approach to eHealth Security in Australia: Developing a National eHealth Sercurity and Access Framework (NESAF), Yvette Lejins and John Leitch

PDF

Developing Governance Capability to Improve Information Security Resilience in Healthcare, Rachel Mahncke and Patricia Williams

Link

Multimodal behavioural biometric authentication for mobile devices, Hataichanok Saevanee, Nathan Clarke, and Steven Furnell

PDF

An Overview of Cloud Computing Challenges and Its Security Concerns, Krishnun Sansurooah

Link

Towards an organizational culture framework for information security practices, Joo Soon Lim, Shanton Chang, Atif Ahmad, and Sean Maynard

Link

Protective Emblems in Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth

PDF

An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users, Patryk Szewczyk

Link

A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia, Patryk Szewczyk

Link

The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

Link

Managing the Mapuche: Security and Identity collisions in Chile, Robyn Torok

Link

SSH -- Somewhat Secure Host, Craig Valli

Link

Eavesdropping on the Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, and Christopher Holme

Link

High temperature dry sliding friction and wear behavior of aluminum matrix composites (Al3Zr+α-Al2O3)/Al, Heguo Zhu, Cuicui Jar, Jinzhu Song, Jun Zhao, Jianliang Li, and Zonghan Xie

Submissions from 2009

Link

Media hegemony, activism and identity: Muslim women re-presenting Muslim women, Anne Aly

Link

The terrorists' audience: A model of internet radicalisation, Anne Aly

Link

An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness, Anne Aly, Anne Pedersen, Lisa Hartley, and Craig McGarty

Link

Risk culture influences in internet safety and security, S Atkinson, S M. Furnell, and A.D. Phippen

Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks

Link

Freegate: A defence against the pending censorship of Australia?, C Bolan and P Hannay

Link

A spoofing attack against an EPC class one RFID system, Christopher Bolan

Link

From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke