Follow

Submissions from 2006

PDF

Establishing a vendor neutral skills based framework for digital forensics curriculum development and competence assessment, Craig Valli

PDF

SQL Injection - Threats to Medical Systems: The Issues and Countermeasures, Craig Valli

Use of bootable Linux CDs for the delivery of educational course content, Craig Valli

Link

Telemedicine and the digital door doctor, Darren Webb and Patricia Williams

Link

Apprasing information security rituals in primary care medical practice, Patricia Williams

Link

Making research real: Is action research a suitable methodology for medical information security, Patricia Williams

Link

Security immunization using basic countermeasures, Patricia Williams

Link

The role of standards in medical information security: an opportunity for improvement, Patricia Williams

Link

Primary care information security: a case study for practical assistance, Patricia Williams and Rachel Mahncke

Link

Shared Electronic Health Records: A changing landscape for security in medical practice, Patricia Williams and Rachel Mahncke

Data Security and wireless networks - mutually exclusive?, Andrew Woodward

Link

LIARS: Laptop Inspector and Recovery System, Andrew Woodward

Submissions from 2005

RFID-Evaluation of Tag Security Schemes, Christopher Bolan

The Growth of 802.11b and 802.11g Networks in the Perth CBD, Western Australia, Christopher Bolan

The introduction of RFID Security into computer security courses, Christopher Bolan

Link

Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks

Link

Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell

User Authentication for Mobile Devices: A Composite Approach, Nathan Clarke and Steven Furnell

Link

A protection profiles approach to risk analysis for small and medium enterprises, Vassilis Dimopoulos and Steven Furnell

A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments, Klaus Fischer, Udo Bleimann, Woldemar Fuhrmann, and Steven Furnell

TCP performance estimation using neural networks modelling, Bogdan Ghita, Steven Furnell, Benn Lines, and Emmanuel Ifeachor

Link

Using human computer interaction principles to promote usable security, D Katsabas, S M. Furnell, and P S. Dowland

Link

A computer network laboratory based on the concept of virtual machines, Wojciech Kuczborski

Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset, Julien Lecomte, Nathan Clarke, and Steven Furnell

PDF

After Conversation - A Forensic ICQ Logfile Extraction Tool, Kim Morfitt and Craig Valli

Effects of Steganography In The Business World: How Mobile Devices Can Make A Difference, Danny Ng

Link

HTTP-aware anonymisation of packet traces, Eric Salama, Bogdan Ghita, and Steven Furnell

Link

Individuals perceptions of wireless security in the home environment, Patryk Szewczyk

Link

Securing PDAs in the healthcare environment, Emiko Terado and Patricia Williams

PDF

Honeypot Technologies and Their Applicability as an Internal Countermeasure, Craig Valli

PDF

Integrating Open Source Protections into SCADA Networks, Craig Valli

PDF

A UK and Australian Study of Hard Disk Disposal, Craig Valli and Andrew Jones

PDF

An Investigation into the Efficiency of Forensic Erasure Tools for Hard Disk Mechanisms, Craig Valli and Paul Patak

PDF

An Investigation into Long Range Detection of Passive UHF RFID Tags, Craig Valli, Andrew Woodward, Ken Wild, and Reino Karvinen

Link

Awareness invoking positive change: Reflections on lecturing practice in Computer and Information Science, Patricia Williams

Link

Information security awareness of medical practitioners, Patricia Williams

PDF

Physician secure thyself, Patricia Williams

PDF

The underestimation of threats to patients data in clinical practice, Patricia Williams

Link

Where are the policies for PDA usage in the Australian healthcare environment?, Patricia A. H. Williams

Link

Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson

A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke

Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke

Link

The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke

Link

Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward

PDF

Recommendations for wireless network security policy: An analysis and classification of current and emerging threats and solutions for different organisations, Andrew Woodward

Link

The effectiveness of commercial erasure programs on BitTorrent activity, Andrew Woodward

WPA/WPA2: Placebo or Panacea?, Andrew Woodward

Submissions from 2003

PDF

Security management education online, Peter J. Hosie, Clifton L. Smith, and Joseph Luca

A new minor in network administration and design, Wojciech Kuczborski

High-Radix Arithmetic Systems on Signed Digit Number Representation and Residue Number System, Wojciech Kuczborski

The significance of virtual computer networks in distance education, Wojciech Kuczborski

Link

Socialism in Mozambique? The 'Mozambican revolution' in critical perspective, David Robinson

PDF

Honeyd - A OS Fingerprinting Artifice, Craig Valli

PDF

Industry Certification: Challenges for the conduct of University security based courses, Craig Valli

An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta

PDF

A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli