Follow

Submissions from 2016

Link

Activity recognition using wearable computing, Neamah Al-Naffakh, Nathan Clarke, Paul Dowland, and Fudong Li

Link

A comprehensive evaluation of feature selection for gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li

Link

A Novel Taxonomy for Mobile Applications Data, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

Transparent authentication systems for mobile device security: A review, Saud Alotaibi, Steven Furnell, and Nathan Clarke

Link

A forensic acquisition and analysis system for IaaS: Architectural model and experiment, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

Link

Leveraging biometrics for insider misuse identification, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven Furnell

Link

A review of graphical authentication utilising a keypad input method, H. Alsaiari, M. Papadaki, P.S. Dowland, and Steven Furnell

PDF

Controlled access to cloud resources for mitigating economic denial of sustainability (EDoS) attacks, Zubair A. Baig, Sadiq M. Sait, and Farid Binbeshr

Link

On 802.11 access point locatability and named entity recognition in service set identifiers, Maxim Chernyshev, Craig Valli, and Peter Hannay

Link

Information security and practice: The user's perspective, Nathan Clarke, Fudong Li, Steven Furnell, Ingo Stengel, and Giorgio Ganis

Link

Protecting corporate intellectual property: Legal and technical approaches, Michael G. Crowley and Michael N. Johnstone

Link

Vulnerability management: Not a patch on where we should be?, Steve Furnell

Link

Identifying users by network traffic metadata, Alotibi Gaseb, Nathan Clarke, Fudong Li, and Steven Furnell

Link

Timestamp analysis for quality validation of network forensic data, Nikolai Hampton and Zubair A. Baig

Link

Information security and digital forensics in the world of cyber physical systems, Andrew Jones, Stilianos Vidalis, and Nasser Abouzakhar

Link

The 2016 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE, Thomas Anthony Martin, Andy Jones, and Mohammed Alzaabi

PDF

An automated approach for digital forensic analysis of heterogeneous big data, Hussam Mohammed, Nathan Clarke, and Fudong Li

Link

A comparison study of wireless network security in several Australasian cities and suburbs, Alastair Nisbet and Andrew Woodward

PDF

Going online on behalf of others: An investigation of ‘proxy’ internet consumers, Neil Selwyn, Nicola Johnson, Selena Nemorin, and Elizabeth Knight

Link

Awareness, behaviour and culture: The ABC in cultivating security compliance, Emad Sherif, Steven Furnell, and Nathan Clarke

Link

Extracting intelligence from digital forensic artefacts, Stilianos Vidalis, Olga Angelopoulou, and Andy Jones

Submissions from 2015

Link

Security, privacy and usability – a survey of users’ perceptions and attitudes, Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christopher Reich

Link

A survey of continuous and transparent multibiometric authentication systems, A. Al Abdulwahid, Nathan Clarke, I. Stengel, and Steven Furnell

Link

The value of metadata in digital forensics, Fahad Alanazi and Andrew Jones

A fine-grained analysis of user activity on mobile applications: The sensitivity level perception, Saud Alotaibi, Steve Furnell, and Nathan Clarke

Link

Behavioral‐based feature abstraction from network traffic, Gaseb Alotibi, Fudong Li, Nathan Clarke, and Steven Furnell

Link

A new Frontier in war: Cyber Warfare in Estonia, Thomas Armistead and Leigh Armistead

Link

802.11 Tracking and surveillance - A forensic perspective, M. Chernyshev, C. Valli, and P. Hannay

Link

Deception in the cyber-world, William Hutchinson

Link

E-invigilation of e-assessments, S. S. Ketab, N. L. Clarke, and P. S. Haskell-Dowland

Link

An extensible platform for the forensic analysis of social media data, Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, and George Oikonomou

Link

An identification of variables influencing the establishment of information security culture, Emad Sherif, Steven Furnell, and Nathan Clarke

Link

Applying the ACPO guidelines to building automation systems, Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, and Mikhailia Burgess

Link

Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok

Link

Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok

Link

An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams

Submissions from 2014

Link

Protecting organizational competitive advantage: A knowledge leakage perspective, Atif Ahmad, Rachelle Bosua, and Rens Scheepers

Link

Teaching information security management: reflections and experiences, Atif Ahmad and Sean Maynard

Link

A conceptual model for federated authentication in the cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel

Link

A forensically-enabled IAAS cloud computing architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christopher Reich

Link

Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic

Link

Securing the internet of things infrastructure – Standards and techniques, Zubair A. Baig

Link

Security of internet protocol cameras - A case example, William Campbell

Link

A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward

Link

Locational wireless and social media-based surveillance, Maxim Chernyshev

Link

Verification of primitive Sub-Ghz RF replay attack techniques based on visual signal analysis, Maxim Chernyshev

Link

The zombies strike back: Towards client-side BeEF detection, Maxim Chernyshev and Peter Hannay

PDF

Changing Places: The Need to Alter the Start Point for Information Security Design, Elizabeth Coles-Kemp and Patricia A. Williams

Link

Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook

Link

Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman

Link

Birds of a feather deceive together: The chicanery of multiplied metadata, D. M. Cook

Link

I remember Richelieu: Is anything secure anymore?, Michael G. Crowley and Michael N. Johnstone

Link

Identifying bugs in digital forensic tools, B Cusack and A Homewood

Link

Acquisition of evidence from network intrusion detection systems, Brian Cusack and Muteb Alqahtani

Link

Steganographic checks in digital forensic investigation: A social networking case, Brian Cusack and Aimie Chee

Link

Including network routers in forensic investigation, Brian Cusack and Raymond Lutui

Link

Data carving using artificial headers, R. Daniel, N. L. Clarke, and F. Li

Link

Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk

Link

The impact of custom ROM backups on android external storage erasure, Haydon P. Hope and Peter Hannay

PDF

Windows surface RT tablet forensics, Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Andy Jones

Link

A user-oriented network forensic analyser: the design of a high-level protocol analyser, D Joy, Fudong Li, Nathan Clarke, and Steven Furnell

PDF

Performance evaluation of a technology independent security gateway for Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, and Is-Mkwawa Mkwawa

Link

Active authentication for mobile devices utilising behaviour profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

An evaluation of behavioural profiling on mobile devices, Fudong Li, Ross Wheeler, and Nathan Clarke

PDF

Integrating soil and plant tissue tests and using an artificial intelligence method for data modelling is likely to improve decisions for in-season nitrogen management, Andreas Neuhaus, Leisa Armstrong, Jinsong Leng, Dean Diepeveen, and Geoff Anderson

Link

An analysis of security issues in building automation systems, Matthew D. Peacock and Michael N. Johnstone

Link

Finding evidence of wordlists being deployed against SSH honeypots – Implications and impacts, Priya N. Rabadia and Craig Valli

PDF

Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business, Craig Valli, Ian C. Martinus, and Michael N. Johnstone

PDF

Why penetration testing is a limited use choice for sound cyber security practice, Craig Valli, Andrew J. Woodward, Peter Hannay, and Michael N. Johnstone

Link

A situation awareness model for information security risk management, Jeb Webb, Atif Ahmad, Sean Maynard, and Graeme Shanks

Expert Evidence in Australia: A More Transparent Path Post-Dasreef, Nigel Wilson

Submissions from 2013

Link

A response selection model for intrusion response systems: Response Strategy Model (RSM), Nor Badrul Anuar, Maria Papadaki, Steven Furnell, and Nathan Clarke

Link

Breaking the theft-chain-cycle: Property marking as a defensive tool, William J. Bailey and David J. Brooks

Link

Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders, Gabrielle Blanquart and David M. Cook

Link

Defying the logic, forgetting the facts: the new European proposal for data protection in the police sector, Joseph A. Cannataci

PDF

E-Invigilator: A biometric-based supervision system for e-Assessments, Nathan L. Clarke, P Dowland, and Steven M. Furnell

The contemporary Australian intelligence domain, Jeffrey Corkill and Alan Davies

PDF

Security, control and deviance: Mapping the security domain and why it matters, Jeffrey D. Corkill and Michael P. Coole

Link

Australian Democracy in the War on Terror, Michael G. Crowley

Link

The effectiveness of internet activity erasure tools to protect privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber

Link

The Contemporary Australian Intelligence Domain - A Multi Dimension Examination, Alan Davies and Jeffrey Corkill

Link

An examination and validation of linguistic constructs for studying high-stakes deception, Christie Fuller, David Biros, Judee Burgoon, and Jay Nunamaker

Link

Getting past passwords, Steven Furnell

Link

Security education: The challenge beyond the classroom, Steven Furnell

Link

Still on the hook: the persistent problem of phishing, Steven Furnell

Link

Essential lessons still not learned? Examining the password practices of end-users and service providers, Steven Furnell and Nina Bar

Link

Geo Forensics: Classes of locational data sources for embedded devices, Peter Hannay

Link

Exchanging demands: Weaknesses in SSL implementations for mobile platforms, Peter Hannay, Clinton R. Carpene, Craig Valli, Andrew J. Woodward, and Michael N. Johnstone

Link

Co-operative user identity verification using an Authentication Aura, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L. Reynolds

Link

Embedding Secure Programming in the Curriculum: Some Lessons Learned, Michael N. Johnstone

Link

Security aspects of military sensor-based defence systems, Michael N. Johnstone and Robert Thompson

Link

Automated detection of vehicles with machine learning, Michael N. Johnstone and Andrew J. Woodward

Link

Paradigms for cybersecurity education in a Homeland Security Program, Gary C. Kessler and James Ramsay

Link

Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

Phishing Detection: A Literature Survey, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

Physical security barrier selection: A decision support analysis, Agnieszka Kiszelewska and Michael Coole

Link

A technology independent security gateway for real-time multimedia communication, Fudong LI, Nathan Clarke, and Steven Furnell

Link

A technology independent security gateway for future Emergency Telecommunication Systems (ETS), Fudong Li, Nathan Clarke, Steven Furnell, Jose Oscar Fajardo, Fidel Liberal, and Mamadou Sidibe

Link

An exploratory study of the lived experience of being an intelligence analyst, Sharon Moss, Jeffrey Corkill, and Eyal Gringart

Link

Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone