Follow

Submissions from 2013

Link

Patterns and patter - An investigation into SSH activity using Kippo Honeypots, Craig Valli, Priya N. Rabadia, and Andrew J. Woodward

Link

The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille Abdul Rahman, and David M. Cook

PDF

A conceptual framework for secure use of mobile health, Patricia A. Williams and Anthony Maeder

Submissions from 2012

Link

Forensics Data Acquisition Methods for Mobile Phones, Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin

Link

A revised UTAUT model to investigate E -health acceptance of health professionals in Africa, Ami -Narh and Patricia Williams

Link

Smart-Frame: a Flexible, Scalable, and Secure Information Management Framework for Smart Grids, Baek, Quang Vu, Andrew Jones, Sameera Al Mulla, and Chan Yeob Yeun

Link

Layered analysis of security ceremonies, Bella and Elizabeth Coles-Kemp

Link

Australia: recent developments in space situational awareness, Biddington

Link

Australia's Place in Space: Historical Constraints and Future Opportunities, Biddington

Link

Securing Space: Will Code of Conduct Discussions Help? A Perspective from Australia, Biddington

Link

The Regulation of Space and Cyberspace: One coin, Two sides, Biddington

PDF

Mobile Device Management for Personally Controlled Electronic Health Records: Effective Selection of Evaluation Criteria, Brand and Patricia Williams

Link

Exposing potential privacy issues with IPV6 address construction, Carpene and Andrew Woodward

PDF

The international effort: building the bridge for Translational Medicine: Report of the 1st International Conference of Translational Medicine (ICTM), Chen, Roland Andersson, William CS Cho, David Christiani, Richard Coico, Jeffery Drazen, Markus Ege, Thomas Fehniger, Hongwei Gao, Kunlin Jin, Michael N. Liebman, Elena Lopez, Giuseppe Marraro, Gyorgy Marko-Varga, Francesco M. Marincola, Laurentiu M. Popescu, Claudio Spada, Aamir Shahzad, Ena Wang, Wei Wang, Xiangdong Wang, Yong-Xiao Wang, Jinglin Xia, and Jia Qu

Link

A novel security architecture for a space-data DTN, Clarke, Vasilis Katos, Sofia-Anna Menesidou, Bogdan Ghita, and Steven Furnell

PDF

Security Specialists are from Mars; Healthcare Practitioners are from Venus: The Case for a Community-of-Practice Approach to Security Architectures for Healthcare, Coles-Kemp and Patricia Williams

Link

Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language, Coole, Jeffrey Corkill, and Andrew Woodward

Link

Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems, Coole, Andrew Woodward, and Craig Valli

PDF

Building patient trust in electronic health records, Cripps and Craig Standing

PDF

Accountable-eHealth Systems: the Next Step Forward for Privacy, Gajanayake, Tony Iannella, Bill Lane, and Tony Sahama

PDF

Legal Issues Related to Accountable-eHealth Systems in Australia, Gajanayake, Bill Lane, Tony Iannella, and Tony Sahama

PDF

Assessing the accessibility of E-learning, Goodwin, Iain Sutherland, Frode Roarson, and Tom Drange

PDF

Commitment and the 1% Motorcycle Club: threats to the brotherhood, Harris

PDF

Cloud security: A case study in telemedicine, Johnstone

PDF

On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks, Johnstone and Jeremy Jarvis

Link

Towards Effective Algorithms for Intelligent Defense Systems, Johnstone and Andrew Woodward

Link

The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Jones, Thomas Martin, and Mohammed Alzaabi

PDF

A Holistic Approach to eHealth Security in Australia: Developing a National eHealth Sercurity and Access Framework (NESAF), Lejins and John Leitch

PDF

Developing Governance Capability to Improve Information Security Resilience in Healthcare, Mahncke and Patricia Williams

Link

Multimodal behavioural biometric authentication for mobile devices, Saevanee, Nathan Clarke, and Steven Furnell

PDF

An Overview of Cloud Computing Challenges and Its Security Concerns, Sansurooah

Link

Towards an organizational culture framework for information security practices, Soon Lim, Shanton Chang, Atif Ahmad, and Sean Maynard

Link

Protective Emblems in Cyber Warfare, Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth

PDF

An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users, Szewczyk

Link

A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia, Szewczyk

Link

The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia, Szewczyk and Krishnun Sansurooah

Link

Managing the Mapuche: Security and Identity collisions in Chile, Robyn Torok

Link

SSH -- Somewhat Secure Host, Valli

Link

Eavesdropping on the Smart Grid, Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, and Christopher Holme

Link

High temperature dry sliding friction and wear behavior of aluminum matrix composites (Al3Zr+α-Al2O3)/Al, Zhu, Cuicui Jar, Jinzhu Song, Jun Zhao, Jianliang Li, and Zonghan Xie

Submissions from 2009

Link

Media hegemony, activism and identity: Muslim women re-presenting Muslim women, Anne Aly

Link

The terrorists' audience: A model of internet radicalisation, Anne Aly

Link

An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness, Anne Aly, Anne Pedersen, Lisa Hartley, and Craig McGarty

Link

Risk culture influences in internet safety and security, S Atkinson, S M. Furnell, and A.D. Phippen

Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks

Link

Freegate: A defence against the pending censorship of Australia?, C Bolan and P Hannay

Link

A spoofing attack against an EPC class one RFID system, Christopher Bolan

Link

From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke

Defeating biometric fingerprint systems: An applied testing methodology, David Brooks

Link

Intruder Alarm Systems: Is the Security Industry Installing and Maintaining Alarm Systems in Compliance to Australian Standard AS2201?, David Brooks

Link

Key concepts in security risk management: A psychometric concept map to approach to understanding, David Brooks

Link

What is security: Definition through knowledge categorisation, David Brooks

Security Decay: An Entropic Approach to Definition and Understanding, M COOLE and David Brooks

Intelligence Support to Law Enforcement: Untangling the Gordian Knot, Jeffrey Corkill

Professional Intelligence Judgement Artistry: Some early observations, Jeffrey Corkill

Link

The function of security in reducing women's fear of crime in open public spaces: A case study of serial sex attacks at a western australian university, Christopher J. Cubbage and Clifton Smith

Link

Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward

Link

Smartpot: Creating a 1st generation smartphone honeypot, Michael Freeman and Andrew Woodward

Link

Mobile security: A pocket guide, Steven Furnell

Link

Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson

Link

From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson

Link

Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson

Fun & Games: an Introduction to Console Forensics, Peter Hannay

Link

Satellite navigation forensics techniques, Peter Hannay

Firewire Forensics in Modern Operating Systems, Peter Hannay and Andrew Woodward

Link

Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams

Link

Cyber influence, William Hutchinson

Security as an element in environmental assessment and decision making, William Hutchinson and Matthew Warren

Link

Assessing the usability of personal internet security tools, T Ibrahim, S M. Furnell, M Papadaki, and N L. Clarke

Link

Evaluating web-based user authentication using graphical techniques, MZ Jali, S M. Furnell, and PS Dowland

Link

Use of a secure portable application device as a component of network centric operations, Peter James

Link

Security requirements engineering-the reluctant oxymoron, Michael N. Johnstone

Link

An introduction to digital forensics, Andrew Jones

Link

A summary of thoughts, issues and problems, Andrew Jones

Link

Conclusions and Final Thoughts, Andrew Jones

Link

Developing the Business Plan, Andrew Jones

Link

Establishing and Managing a Digital Forensics Laboratory, Andrew Jones

Link

High technology crimes: case summaries, Andrew Jones

Link

Networking, liaison and sources of information, Andrew Jones

Link

Responding to crimes requiring computer forensic investigation, Andrew Jones

Link

The computer forensics unit strategic, tactical, and annual plans, Andrew Jones

Link

The future of digital forensics in the criminal justice system, Andrew Jones

Link

Types of forensic investigation, Andrew Jones

Why are we not getting better at Data Disposal?, Andrew Jones

Link

Workload management and the outsourcing option, Andrew Jones

Link

The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market, Andrew Jones, Craig Valli, and G Dabibi

Link

The 2008 analysis of information remaining on disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland, and Gareth Davies

Link

Lessons not learned on data disposal, Andy Jones

Link

Application of latent moderated structuring (LMS) to rank the effects of intervening variables on the IT and firm performance relationship, Abbas Keramati, Glenn Dardick, Navid Majir, and Behdad Banan

Link

Bluetooth Hacking: A Case Study, Gary C. Kessler and Dennis Browning

An Anomaly-based Intrusion Detection Architecture to Secure Wireless Network, SY Lim and Andrew Jones

Terror attacks: Understanding social risk views between Singaporean lay and security practitioners, Yam Hoo Loo and David Brooks

Link

Measuring information security governance within general medical practice, Rachel Mahncke, Donald McDermid, and Patricia Williams

Link

Challenges in improving information security practice in Australian general practice, Donald Mcdermid, Rachel Mahncke, and Patricia Williams

Link

Playing Safe: A prototype game for raising awareness of social engineering, Michael Newbould and Steven Furnell

Link

PCI compliance: Overcoming the challenges, Benjamin Ngugi, Gina Vega, and Glenn Dardick

Link

Security education in Singapore: A study of knowledge structures in electronic security technology, C Phinney and Clifton Smith

Link

The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk

Link

An assessment of people's vulnerabilities in relation to personal and sensitive data, B.G. Sanders, P.S. Dowland, and S M. Furnell

Link

A forensics overview and analysis of USB flash memory devices, Krishnun Sansurooah