Submissions from 2016
Activity recognition using wearable computing, Neamah Al-Naffakh, Nathan Clarke, Paul Dowland, and Fudong Li
A comprehensive evaluation of feature selection for gait recognition using smartwatches, Neamah Al-Naffakh, Nathan Clarke, Paul Haskell-Dowland, and Fudong Li
A Novel Taxonomy for Mobile Applications Data, Saud Alotaibi, Steven Furnell, and Nathan Clarke
Transparent authentication systems for mobile device security: A review, Saud Alotaibi, Steven Furnell, and Nathan Clarke
A forensic acquisition and analysis system for IaaS: Architectural model and experiment, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich
Leveraging biometrics for insider misuse identification, Abdulrahman Alruban, Nathan Clarke, Fudong Li, and Steven Furnell
A review of graphical authentication utilising a keypad input method, H. Alsaiari, M. Papadaki, P.S. Dowland, and Steven Furnell
Controlled access to cloud resources for mitigating economic denial of sustainability (EDoS) attacks, Zubair A. Baig, Sadiq M. Sait, and Farid Binbeshr
On 802.11 access point locatability and named entity recognition in service set identifiers, Maxim Chernyshev, Craig Valli, and Peter Hannay
Information security and practice: The user's perspective, Nathan Clarke, Fudong Li, Steven Furnell, Ingo Stengel, and Giorgio Ganis
Protecting corporate intellectual property: Legal and technical approaches, Michael G. Crowley and Michael N. Johnstone
Vulnerability management: Not a patch on where we should be?, Steve Furnell
Identifying users by network traffic metadata, Alotibi Gaseb, Nathan Clarke, Fudong Li, and Steven Furnell
Timestamp analysis for quality validation of network forensic data, Nikolai Hampton and Zubair A. Baig
Information security and digital forensics in the world of cyber physical systems, Andrew Jones, Stilianos Vidalis, and Nasser Abouzakhar
The 2016 analysis of information remaining on computer hard disks offered for sale on the second hand market in the UAE, Thomas Anthony Martin, Andy Jones, and Mohammed Alzaabi
An automated approach for digital forensic analysis of heterogeneous big data, Hussam Mohammed, Nathan Clarke, and Fudong Li
A comparison study of wireless network security in several Australasian cities and suburbs, Alastair Nisbet and Andrew Woodward
Going online on behalf of others: An investigation of ‘proxy’ internet consumers, Neil Selwyn, Nicola Johnson, Selena Nemorin, and Elizabeth Knight
Awareness, behaviour and culture: The ABC in cultivating security compliance, Emad Sherif, Steven Furnell, and Nathan Clarke
Extracting intelligence from digital forensic artefacts, Stilianos Vidalis, Olga Angelopoulou, and Andy Jones
Submissions from 2015
Security, privacy and usability – a survey of users’ perceptions and attitudes, Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christopher Reich
A survey of continuous and transparent multibiometric authentication systems, A. Al Abdulwahid, Nathan Clarke, I. Stengel, and Steven Furnell
The value of metadata in digital forensics, Fahad Alanazi and Andrew Jones
A fine-grained analysis of user activity on mobile applications: The sensitivity level perception, Saud Alotaibi, Steve Furnell, and Nathan Clarke
Behavioral‐based feature abstraction from network traffic, Gaseb Alotibi, Fudong Li, Nathan Clarke, and Steven Furnell
A new Frontier in war: Cyber Warfare in Estonia, Thomas Armistead and Leigh Armistead
802.11 Tracking and surveillance - A forensic perspective, M. Chernyshev, C. Valli, and P. Hannay
Deception in the cyber-world, William Hutchinson
E-invigilation of e-assessments, S. S. Ketab, N. L. Clarke, and P. S. Haskell-Dowland
An extensible platform for the forensic analysis of social media data, Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, and George Oikonomou
An identification of variables influencing the establishment of information security culture, Emad Sherif, Steven Furnell, and Nathan Clarke
Applying the ACPO guidelines to building automation systems, Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, and Mikhailia Burgess
Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok
Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok
An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams
Submissions from 2014
Protecting organizational competitive advantage: A knowledge leakage perspective, Atif Ahmad, Rachelle Bosua, and Rens Scheepers
Teaching information security management: reflections and experiences, Atif Ahmad and Sean Maynard
A conceptual model for federated authentication in the cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, and Ingo Stengel
A forensically-enabled IAAS cloud computing architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christopher Reich
Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic
Securing the internet of things infrastructure – Standards and techniques, Zubair A. Baig
Security of internet protocol cameras - A case example, William Campbell
A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward
Locational wireless and social media-based surveillance, Maxim Chernyshev
Verification of primitive Sub-Ghz RF replay attack techniques based on visual signal analysis, Maxim Chernyshev
The zombies strike back: Towards client-side BeEF detection, Maxim Chernyshev and Peter Hannay
Changing Places: The Need to Alter the Start Point for Information Security Design, Elizabeth Coles-Kemp and Patricia A. Williams
Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook
Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman
Birds of a feather deceive together: The chicanery of multiplied metadata, D. M. Cook
I remember Richelieu: Is anything secure anymore?, Michael G. Crowley and Michael N. Johnstone
Identifying bugs in digital forensic tools, B Cusack and A Homewood
Acquisition of evidence from network intrusion detection systems, Brian Cusack and Muteb Alqahtani
Steganographic checks in digital forensic investigation: A social networking case, Brian Cusack and Aimie Chee
Including network routers in forensic investigation, Brian Cusack and Raymond Lutui
Data carving using artificial headers, R. Daniel, N. L. Clarke, and F. Li
Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk
The impact of custom ROM backups on android external storage erasure, Haydon P. Hope and Peter Hannay
Windows surface RT tablet forensics, Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Andy Jones
A user-oriented network forensic analyser: the design of a high-level protocol analyser, D Joy, Fudong Li, Nathan Clarke, and Steven Furnell
Performance evaluation of a technology independent security gateway for Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, and Is-Mkwawa Mkwawa
Active authentication for mobile devices utilising behaviour profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland
An evaluation of behavioural profiling on mobile devices, Fudong Li, Ross Wheeler, and Nathan Clarke
Integrating soil and plant tissue tests and using an artificial intelligence method for data modelling is likely to improve decisions for in-season nitrogen management, Andreas Neuhaus, Leisa Armstrong, Jinsong Leng, Dean Diepeveen, and Geoff Anderson
An analysis of security issues in building automation systems, Matthew D. Peacock and Michael N. Johnstone
Finding evidence of wordlists being deployed against SSH honeypots – Implications and impacts, Priya N. Rabadia and Craig Valli
Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business, Craig Valli, Ian C. Martinus, and Michael N. Johnstone
Why penetration testing is a limited use choice for sound cyber security practice, Craig Valli, Andrew J. Woodward, Peter Hannay, and Michael N. Johnstone
A situation awareness model for information security risk management, Jeb Webb, Atif Ahmad, Sean Maynard, and Graeme Shanks
Expert Evidence in Australia: A More Transparent Path Post-Dasreef, Nigel Wilson
Submissions from 2013
A response selection model for intrusion response systems: Response Strategy Model (RSM), Nor Badrul Anuar, Maria Papadaki, Steven Furnell, and Nathan Clarke
Breaking the theft-chain-cycle: Property marking as a defensive tool, William J. Bailey and David J. Brooks
Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders, Gabrielle Blanquart and David M. Cook
Defying the logic, forgetting the facts: the new European proposal for data protection in the police sector, Joseph A. Cannataci
E-Invigilator: A biometric-based supervision system for e-Assessments, Nathan L. Clarke, P Dowland, and Steven M. Furnell
The contemporary Australian intelligence domain, Jeffrey Corkill and Alan Davies
Security, control and deviance: Mapping the security domain and why it matters, Jeffrey D. Corkill and Michael P. Coole
Australian Democracy in the War on Terror, Michael G. Crowley
The effectiveness of internet activity erasure tools to protect privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber
The Contemporary Australian Intelligence Domain - A Multi Dimension Examination, Alan Davies and Jeffrey Corkill
An examination and validation of linguistic constructs for studying high-stakes deception, Christie Fuller, David Biros, Judee Burgoon, and Jay Nunamaker
Getting past passwords, Steven Furnell
Security education: The challenge beyond the classroom, Steven Furnell
Still on the hook: the persistent problem of phishing, Steven Furnell
Essential lessons still not learned? Examining the password practices of end-users and service providers, Steven Furnell and Nina Bar
Geo Forensics: Classes of locational data sources for embedded devices, Peter Hannay
Exchanging demands: Weaknesses in SSL implementations for mobile platforms, Peter Hannay, Clinton R. Carpene, Craig Valli, Andrew J. Woodward, and Michael N. Johnstone
Co-operative user identity verification using an Authentication Aura, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L. Reynolds
Embedding Secure Programming in the Curriculum: Some Lessons Learned, Michael N. Johnstone
Security aspects of military sensor-based defence systems, Michael N. Johnstone and Robert Thompson
Automated detection of vehicles with machine learning, Michael N. Johnstone and Andrew J. Woodward
Paradigms for cybersecurity education in a Homeland Security Program, Gary C. Kessler and James Ramsay
Enhancing Phishing E-Mail Classifiers: A Lexical URL Analysis Approach, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones
Phishing Detection: A Literature Survey, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones
Physical security barrier selection: A decision support analysis, Agnieszka Kiszelewska and Michael Coole
A technology independent security gateway for real-time multimedia communication, Fudong LI, Nathan Clarke, and Steven Furnell
A technology independent security gateway for future Emergency Telecommunication Systems (ETS), Fudong Li, Nathan Clarke, Steven Furnell, Jose Oscar Fajardo, Fidel Liberal, and Mamadou Sidibe
An exploratory study of the lived experience of being an intelligence analyst, Sharon Moss, Jeffrey Corkill, and Eyal Gringart
Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone