Submissions from 2009
The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk
An assessment of people's vulnerabilities in relation to personal and sensitive data, B.G. Sanders, P.S. Dowland, and S M. Furnell
A forensics overview and analysis of USB flash memory devices, Krishnun Sansurooah
Developing an academic curriculum in information operations: The first step, C.D. Schou, J Ryan, and Leigh Armistead
Current Issues in Aviation Security, Narayanan Srinivasan and Shreeman Prabhakaran
ADSL Router Forensics: Methods of Acquisition, Patryk Szewczyk
ADSL Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective, Patryk Szewczyk and Craig Valli
Improving an organisations existing information technology policy to increase security, Shane Talbot and Andrew Woodward
Automatic detection of child pornography, Glen Thompson
Education and Training, Craig Valli
Laboratory Location, Craig Valli
Management of Evidence Storage, Craig Valli
Management of the Collection of Evidence, Craig Valli
Quality Assurance, Craig Valli
SCADA Forensics with Snort IDS, Craig Valli
Scoping the Requirement for the Laboratory, Craig Valli
Selecting the Staff, Craig Valli
The future of Digital Forensics and Its Role in Criminal Investigations, Craig Valli
The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies, Craig Valli
Understanding the role of the Digital Forensic Laboratory Manager, Craig Valli
Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli
SCADA Security - Slowly Circling a Disaster Area, Craig Valli and Andrew Woodward
Capturing Culture in Medical Information Security Research, Patricia Williams
What does security culture look like for small organizations?, Patricia Williams
Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?, Andrew Woodward
When you can't see the forest for the domains: why a two forest model should be used to achieve logical segregation between SCADA and corporate networks, Andrew Woodward and Brett Turner
Submissions from 2008
An overview of mobile embedded memory and forensics methodology, Haitham Al-Hajri
iPhone forensics methodology and tools, Haitham Al-Hajri and Krishnun Sansurooah
Organisational security: A propositional study to map expert knowledge, Adel Alruwaii and David Brooks
Psychometric risk perception: Why some individuals elect not to act on risks?, Jaber Alsuhaimi and David Brooks
Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia Williams
Survey and future trends of efficient cryptographic function implementations on GPGPUs, Adrian Boeing
Protecting critical infrastructure with games technology, Adrian Boeing, Martin Masek, and William Bailey
A Review of the Electronic Product Code Standards for RFID Technology, Christopher Bolan
RFID communications - Who is listening?, Christopher Bolan
Public street CCTV: a psychometric study of social risk, David Brooks
Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke
Evaluation a critical point on the path to intelligence, Jeffrey Corkill
Professional Intelligence Judgement Artistry, Jeffrey Corkill
Australia's oil refining industry - Importance, threats and emergency response, Amanda East and William Bailey
Malware Analysis Framework from Static to Dynamic Analysis, Fadi El-moussa and Andrew Jones
Aviation infrastructure protection: Threats, contingency plans and the importance of networks, Melvyn Griffiths
Forensic acquisition and analysis of the TomTom one satellite navigation unit, Peter Hannay
Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims, Peter Hannay and Andrew Woodward
Evaluating the Usability Impacts of Security Interface Adjustments in Word 2007, M Helala, S. M Furnell, and M Papadaki
Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson
Propaganda dilemmas for environmental security, William Hutchinson
The Ethics of Information Operations, William Hutchinson
The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland
Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland
Catching the Malicious Insider, Andy Jones
Dealing with the malicious insider, Andy Jones and Carl Colwill
Modern Society as Risk Society: Implications of Modernity on Private Security, David Jurcic
The Use of Red Teaming in The Corporate Environment: A Study of Security Management, Vulnerabilities and Defence, G Lane and David Brooks
Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward
Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran
Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan
Industrial espionage from residual data: Risks and countermeasures, Ian Sutherland and Andy Jones
Nuclear Radiation: Properties, Characteristics, And Radiological Dispersal Devices, Geoffrey Swan
Malware, viruses and log visualisation, Iain Swanson
Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams
Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand
The impact of U3 devices on forensic analysis, Ravi Tank and Patricia Williams
Network security isn’t all fun and games: An analysis of information transmitted while playing Team Fortress 2, Brett Turner and Andrew Woodward
Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation, Brett Turner and Andrew Woodward
The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand
A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Craig Valli and Andrew Jones
The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues, Craig Valli and Andrew Woodward
A Practical Application of CMM to Medical Security Capability, Patricia Williams
Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams
How addressing implementation issues can assist in medical information security governance, Patricia Williams
In a "trusting" environment, everyone is responsible for information security, Patricia Williams
Is There an Ideal Forensic Process?, Patricia Williams
Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew
Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli
What Artefacts do Current BitTorrent Clients Leave Behind? , Andrew Woodward
Forensic implications of using the firewire memory exploit with Microsoft Windows XP, Andrew Woodward and Peter Hannay
Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis, Andrew Woodward and Craig Valli
Submissions from 2007
The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams
The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams
Teaching PHP with security in mind, Greg Baatard
Identifying Criteria which Influence the Effectiveness of Public Profiles in Online Learning Environments, Gregory Baatard
A single channel attack on 915MHz radio frequency identification systems, Christopher Bolan
KILL features of RFID tags in a medical environment: Boon or burden?, Christopher Bolan
Radio Frequency Identification: a review of low cost tag security proposals, Christopher Bolan
Advanced User Authentication for Mobile Devices, NL Clarke and Steven Furnell
Authenticating mobile phone users using keystroke analysis, NL Clarke and Steven Furnell
An Assessment of Website Password Practices, Steven Furnell
Making Security Usable: Are Things Improving?, Steven Furnell
Assessing the Security Perceptions of Personal Internet Users, Steven Furnell, P Bryant, and AD Phippen
Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Susan Kennedy
A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nicholas Cope
Network security – Is IP telephony helping the cause?, Paul Hansen and Andrew Woodward
How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward
Securing VoIP: A framework to mitigate or manage risks, Peter James and Andrew Woodward
A framework for the management of information security risks, Andrew Jones
Experiences and Methodologies Teaching Hands-On Cyberforensics Skills Online, Gary Kessler
User perception of the security & privacy concerns of RFID technology, F Li, N L. Clarke, and C Bolan
The issues in securing electronic health information in transit, Rachel Mahncke and Patricia Williams