Follow

Submissions from 2009

Link

Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams

Link

Cyber influence, William Hutchinson

Link

Assessing the usability of personal internet security tools, T Ibrahim, S M. Furnell, M Papadaki, and N L. Clarke

Link

Evaluating web-based user authentication using graphical techniques, MZ Jali, S M. Furnell, and PS Dowland

Link

Use of a secure portable application device as a component of network centric operations, Peter James

Link

Security requirements engineering-the reluctant oxymoron, Michael N. Johnstone

Link

An introduction to digital forensics, Andrew Jones

Link

A summary of thoughts, issues and problems, Andrew Jones

Link

Conclusions and Final Thoughts, Andrew Jones

Link

Developing the Business Plan, Andrew Jones

Link

High technology crimes: case summaries, Andrew Jones

Link

Networking, liaison and sources of information, Andrew Jones

Link

Responding to crimes requiring computer forensic investigation, Andrew Jones

Link

The computer forensics unit strategic, tactical, and annual plans, Andrew Jones

Link

The future of digital forensics in the criminal justice system, Andrew Jones

Link

Types of forensic investigation, Andrew Jones

Link

Workload management and the outsourcing option, Andrew Jones

Link

The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market, Andrew Jones, Craig Valli, and G Dabibi

Link

The 2008 analysis of information remaining on disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland, and Gareth Davies

Link

Lessons not learned on data disposal, Andy Jones

Link

Application of latent moderated structuring (LMS) to rank the effects of intervening variables on the IT and firm performance relationship, Abbas Keramati, Glenn Dardick, Navid Majir, and Behdad Banan

Link

Bluetooth Hacking: A Case Study, Gary C. Kessler and Dennis Browning

Link

Measuring information security governance within general medical practice, Rachel Mahncke, Donald McDermid, and Patricia Williams

Link

Challenges in improving information security practice in Australian general practice, Donald Mcdermid, Rachel Mahncke, and Patricia Williams

Link

Playing Safe: A prototype game for raising awareness of social engineering, Michael Newbould and Steven Furnell

Link

PCI compliance: Overcoming the challenges, Benjamin Ngugi, Gina Vega, and Glenn Dardick

Link

Security education in Singapore: A study of knowledge structures in electronic security technology, C Phinney and Clifton Smith

Link

The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk

Link

An assessment of people's vulnerabilities in relation to personal and sensitive data, B.G. Sanders, P.S. Dowland, and S M. Furnell

Link

A forensics overview and analysis of USB flash memory devices, Krishnun Sansurooah

Link

Developing an academic curriculum in information operations: The first step, C.D. Schou, J Ryan, and Leigh Armistead

ADSL Router Forensics: Methods of Acquisition, Patryk Szewczyk

Link

ADSL Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk

PDF

Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective, Patryk Szewczyk and Craig Valli

Link

Improving an organisations existing information technology policy to increase security, Shane Talbot and Andrew Woodward

Link

Automatic detection of child pornography: A research in progress, Glen Thompson

Link

Education and Training, Craig Valli

Link

Laboratory Location, Craig Valli

Link

Management of Evidence Storage, Craig Valli

Link

Management of the Collection of Evidence, Craig Valli

Link

Quality Assurance, Craig Valli

PDF

SCADA Forensics with Snort IDS, Craig Valli

Link

Scoping the Requirement for the Laboratory, Craig Valli

Link

Selecting the Staff, Craig Valli

Link

The future of Digital Forensics and Its Role in Criminal Investigations, Craig Valli

Link

The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies, Craig Valli

Link

Understanding the role of the Digital Forensic Laboratory Manager, Craig Valli

PDF

Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli

PDF

SCADA Security - Slowly Circling a Disaster Area, Craig Valli and Andrew Woodward

Capturing Culture in Medical Information Security Research, Patricia Williams

Link

What does security culture look like for small organizations?, Patricia Williams

Link

When you can't see the forest for the domains: why a two forest model should be used to achieve logical segregation between SCADA and corporate networks, Andrew Woodward and Brett Turner

Submissions from 2008

Link

An overview of mobile embedded memory and forensics methodology, Haitham Al-Hajri

Link

iPhone forensics methodology and tools, Haitham Al-Hajri and Krishnun Sansurooah

Organisational security: A propositional study to map expert knowledge, Adel Alruwaii and David Brooks

Psychometric risk perception: Why some individuals elect not to act on risks?, Jaber Alsuhaimi and David Brooks

Link

Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia Williams

Link

Survey and future trends of efficient cryptographic function implementations on GPGPUs, Adrian Boeing

Link

Protecting critical infrastructure with games technology, Adrian Boeing, Martin Masek, and William Bailey

Link

A Review of the Electronic Product Code Standards for RFID Technology, Christopher Bolan

Link

RFID communications - Who is listening?, Christopher Bolan

Public street CCTV: a psychometric study of social risk, David Brooks

Link

Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke

Link

Evaluation a critical point on the path to intelligence, Jeffrey Corkill

Australia's oil refining industry - Importance, threats and emergency response, Amanda East and William Bailey

Link

Malware Analysis Framework from Static to Dynamic Analysis, Fadi El-moussa and Andrew Jones

Link

Forensic acquisition and analysis of the TomTom one satellite navigation unit, Peter Hannay

Link

Evaluating the Usability Impacts of Security Interface Adjustments in Word 2007, M Helala, S. M Furnell, and M Papadaki

Link

Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson

Link

Propaganda dilemmas for environmental security, William Hutchinson

PDF

The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland

PDF

Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland

Link

Catching the Malicious Insider, Andy Jones

Link

Dealing with the malicious insider, Andy Jones and Carl Colwill

Link

Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward

Link

Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran

Link

Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

Link

Industrial espionage from residual data: Risks and countermeasures, Ian Sutherland and Andy Jones

Link

Malware, viruses and log visualisation, Iain Swanson

Link

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams

Link

Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand

Link

The impact of U3 devices on forensic analysis, Ravi Tank and Patricia Williams

Link

Network security isn't all fun and games: an analysis of information transmitted whilst playing Team Fortress 2, Brett Turner and Andrew Woodward

Link

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation, Brett Turner and Andrew Woodward

Link

The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand

PDF

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Craig Valli and Andrew Jones

Link

The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues, Craig Valli and Andrew Woodward

Link

A Practical Application of CMM to Medical Security Capability, Patricia Williams

Link

Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams

Link

How addressing implementation issues can assist in medical information security governance, Patricia Williams

Link

In a "trusting" environment, everyone is responsible for information security, Patricia Williams

Link

Is There an Ideal Forensic Process?, Patricia Williams

Link

Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew

Link

Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli

Link

Forensic implications of using the firewire memory exploit with Microsoft Windows XP, A Woodward and P Hannay

Link

Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis, Andrew Woodward and Craig Valli

Submissions from 2007

Link

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

Link

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams

Link

Teaching PHP with security in mind, Greg Baatard

Link

A single channel attack on 915MHz radio frequency identification systems, Christopher Bolan