Submissions from 2015
A fine-grained analysis of user activity on mobile applications: The sensitivity level perception, Saud Alotaibi, Steve Furnell, and Nathan Clarke
Behavioral‐based feature abstraction from network traffic, Gaseb Alotibi, Fudong Li, Nathan Clarke, and Steven Furnell
A new Frontier in war: Cyber Warfare in Estonia, Thomas Armistead and Leigh Armistead
802.11 Tracking and surveillance - A forensic perspective, M. Chernyshev, C. Valli, and P. Hannay
Birds of a feather deceive together: The chicanery of multiplied metadata, D. M. Cook
Deception in the cyber-world, William Hutchinson
E-invigilation of e-assessments, S. S. Ketab, N. L. Clarke, and P. S. Haskell-Dowland
An extensible platform for the forensic analysis of social media data, Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, and George Oikonomou
An identification of variables influencing the establishment of information security culture, Emad Sherif, Steven Furnell, and Nathan Clarke
Applying the ACPO guidelines to building automation systems, Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, and Mikhailia Burgess
Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok
Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok
An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams
Submissions from 2014
Protecting organizational competitive advantage: A knowledge leakage perspective, Atif Ahmad, Rachelle Bosua, and Rens Scheepers
Teaching information security management: reflections and experiences, Atif Ahmad and Sean Maynard
A conceptual model for federated authentication in the cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel
A forensically-enabled IASS cloud computing architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christopher Reich
Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic
Securing the Internet of Things Infrastructure - Standards and Techniques, Zubair A. Baig
Security of internet protocol cameras - A case example, William Campbell
A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward
Locational wireless and social media-based surveillance, Maxim Chernyshev
Verification of primitive Sub-Ghz RF replay attack techniques based on visual signal analysis, Maxim Chernyshev
The zombies strike back: Towards client-side beef detection, Maxim Chernyshev and Peter Hannay
Changing Places: The Need to Alter the Start Point for Information Security Design, Elizabeth Coles-Kemp and Patricia A. Williams
Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook
Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman
I remember Richelieu: Is anything secure anymore?, Michael G. Crowley and Michael N. Johnstone
Identifying bugs in digital forensic tools, B Cusack and A Homewood
Acquisition of evidence from network intrusion detection systems, Brian Cusack and Muteb Alqahtani
Steganographic checks in digital forensic investigation: A social networking case, Brian Cusack and Aimie Chee
Including network routers in forensic investigation, Brian Cusack and Raymond Lutui
Data carving using artificial headers, R. Daniel, N. L. Clarke, and F. Li
Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk
The impace of custom ROM backups on android external storage erasure, Haydon P. Hope and Peter Hannay
Windows surface RT tablet forensics, Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Andy Jones
A user-oriented network forensic analyser: the design of a high-level protocol analyser, D Joy, Fudong Li, Nathan Clarke, and Steven Furnell
Active authentication for mobile devices utilising behaviour profiling, F Li, Nathan Clarke, M Papadaki, and P Dowland
Performance evaluation of a technology independent security gateway for Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, and Is-Mkwawa Mkwawa
An evaluation of behavioural profiling on mobile devices, Fudong Li, Ross Wheeler, and Nathan Clarke
Integrating soil and plant tissue tests and using an artificial intelligence method for data modelling is likely to improve decisions for in-season nitrogen management, Andreas Neuhaus, Leisa Armstrong, Jinsong Leng, Dean Diepeveen, and Geoff Anderson
An analysis of security issues in building automation systems, Matthew D. Peacock and Michael N. Johnstone
Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts, Priya N. Rabadia and Craig Valli
Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business, Craig Valli, Ian C. Martinus, and Michael N. Johnstone
Why penetration testing is a limited use choice for sound cyber security practice, Craig Valli, Andrew J. Woodward, Peter Hannay, and Michael N. Johnstone
A situation awareness model for information security risk management, Jeb Webb, Atif Ahmad, Sean Maynard, and Graeme Shanks
Expert Evidence in Australia: A More Transparent Path Post-Dasreef, Nigel Wilson
Submissions from 2013
A response selection model for intrusion response systems: Response Strategy Model (RSM), Nor Badrul Anuar, Maria Papadaki, Steven Furnell, and Nathan Clarke
Breaking the theft-chain-cycle: Property marking as a defensive tool, William J. Bailey and David J. Brooks
Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders, Gabrielle Blanquart and David M. Cook
Defying the logic, forgetting the facts: the new European proposal for data protection in the police sector, Joseph A. Cannataci
E-Invigilator: A biometric-based supervision system for e-Assessments, Nathan L. Clarke, P Dowland, and Steven M. Furnell
The contemporary Australian intelligence domain, Jeffrey Corkill and Alan Davies
Security, control and deviance: Mapping the security domain and why it matters, Jeffrey D. Corkill and Michael P. Coole
Australian Democracy in the War on Terror, Michael G. Crowley
The effectiveness of internet activity erasure tools to protect privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber
The contemporary Australian intelligence domain: A multi dimension examination, Alan Davies and Jeffrey Corkill
An examination and validation of linguistic constructs for studying high-stakes deception, Christie Fuller, David Biros, Judee Burgoon, and Jay Nunamaker
Getting past passwords, Steven Furnell
Security education: The challenge beyond the classroom, Steven Furnell
Still on the hook: the persistent problem of phishing, Steven Furnell
Essential lessons still not learned? Examining the password practices of end-users and service providers, Steven Furnell and Nina Bar
Geo Forensics: Classes of locational data sources for embedded devices, Peter Hannay
Exchanging demands: Weaknesses in SSL implementations for mobile platforms, Peter Hannay, Clinton R. Carpene, Craig Valli, Andrew J. Woodward, and Michael N. Johnstone
Co-operative user identity verification using an Authentication Aura, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L. Reynolds
Embedding Secure Programming in the Curriculum: Some Lessons Learned, Michael N. Johnstone
Security aspects of military sensor-based defence systems, Michael N. Johnstone and Robert Thompson
Automated detection of vehicles with machine learning, Michael N. Johnstone and Andrew J. Woodward
Paradigms for cybersecurity education in a Homeland Security Program, Gary C. Kessler and James Ramsay
Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones
Phishing Detection: A Literature Survey, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones
Physical security barrier selection: A decision support analysis, Agnieszka Kiszelewska and Michael Coole
A technology independent security gateway for real-time multimedia communication, Fudong LI, Nathan Clarke, and Steven Furnell
A technology independent security gateway for future Emergency Telecommunication Systems (ETS), Fudong Li, Nathan Clarke, Steven Furnell, Jose Oscar Fajardo, Fidel Liberal, and Mamadou Sidibe
Active Authentication for Mobile Devices Utilising Behavioural Profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland
An exploratory study of the lived experience of being an intelligence analyst, Sharon Moss, Jeffrey Corkill, and Eyal Gringart
Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone
Manipulation of hard drive firmware to conceal entire partitions, Huw Read, Konstantino Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, and Andrew Blyth
Usability and security support offered through ADSL router user manuals, Patryk S. Szewczyk
Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk S. Szewczyk, Nikki Robins, and Krishnun Sansurooah
Patterns and patter - An investigation into SSH activity using Kippo Honeypots, Craig Valli, Priya N. Rabadia, and Andrew J. Woodward
The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille Abdul Rahman, and David M. Cook
A conceptual framework for secure use of mobile health, Patricia A. Williams and Anthony Maeder
Submissions from 2012
Forensics Data Acquisition Methods for Mobile Phones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin
A revised UTAUT model to investigate E -health acceptance of health professionals in Africa, James Ami -Narh and Patricia Williams
Smart-Frame: a Flexible, Scalable, and Secure Information Management Framework for Smart Grids, Joonsang Baek, Quang Vu, Andrew Jones, Sameera Al Mulla, and Chan Yeob Yeun
Layered analysis of security ceremonies, Gianpaolo Bella and Elizabeth Coles-Kemp
Australia: recent developments in space situational awareness, Brett Biddington
Australia's Place in Space: Historical Constraints and Future Opportunities, Brett Biddington
Securing Space: Will Code of Conduct Discussions Help? A Perspective from Australia, Brett Biddington
The Regulation of Space and Cyberspace: One coin, Two sides, Brett Biddington
Mobile Device Management for Personally Controlled Electronic Health Records: Effective Selection of Evaluation Criteria, Murray Brand and Patricia Williams
Exposing potential privacy issues with IPV6 address construction, Clinton Carpene and Andrew Woodward
The international effort: building the bridge for Translational Medicine: Report of the 1st International Conference of Translational Medicine (ICTM), Xiaoming Chen, Roland Andersson, William CS Cho, David Christiani, Richard Coico, Jeffery Drazen, Markus Ege, Thomas Fehniger, Hongwei Gao, Kunlin Jin, Michael N. Liebman, Elena Lopez, Giuseppe Marraro, Gyorgy Marko-Varga, Francesco M. Marincola, Laurentiu M. Popescu, Claudio Spada, Aamir Shahzad, Ena Wang, Wei Wang, Xiangdong Wang, Yong-Xiao Wang, Jinglin Xia, and Jia Qu
A novel security architecture for a space-data DTN, Nathan Clarke, Vasilis Katos, Sofia-Anna Menesidou, Bogdan Ghita, and Steven Furnell
Security Specialists are from Mars; Healthcare Practitioners are from Venus: The Case for a Community-of-Practice Approach to Security Architectures for Healthcare, Elizabeth Coles-Kemp and Patricia Williams
Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language, Michael Coole, Jeffrey Corkill, and Andrew Woodward
Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems, Michael Coole, Andrew Woodward, and Craig Valli
Building patient trust in electronic health records, Helen Cripps and Craig Standing
Accountable-eHealth Systems: the Next Step Forward for Privacy, Randike Gajanayake, Tony Iannella, Bill Lane, and Tony Sahama