Submissions from 2007
Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry, Danny Ng and Andrew Woodward
A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head, PM Rodwell, Steven Furnell, and PL Reynolds
An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah
ADSL router forensics part 1: An introduction to a new source of electronic evidence, Patryk Szewczyk
An examination of the Asus WL-HDD 2.5 as a nepenthes malware collector, Patryk Szewczyk
A New Taxonomy for Comparing Intrusion Detection Systems, CJ Tucker, Steven Furnell, BV Ghita, and PJ Brooke
IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems, Craig Valli
Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks, Craig Valli and Andrew Woodward
An overview of ADSL homed nepenthes honeypots in Western Australia, Craig Valli and Aaron Wooten
A holistic perspective on models for medical information security, Patricia Williams
Medical data security: Are you informed or afraid?, Patricia Williams
Medical insecurity: when one size does not fit all, Patricia Williams
Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice, Andrew Woodward and Patricia Williams
Profiling Through a Digital Mobile Device, Lee Fueng Yap and Andrew Jones
Submissions from 2006
Strategies for the blocking of RFID tags, C Bolan
Do no harm: The use of RFID tags in a medical environment, Christopher Bolan
The Lazarus Effect: Resurrecting Killed RFID Tags, Christopher Bolan
Mapping the consensual knowledge of security risk management experts, David Brooks
A Composite User Authentication Architecture for Mobile Devices, Nathan Clarke and Steven Furnell
Does your wireless LAN have criminal intent?, Michael Crowley and Andrew Woodward
Security-relevant semantic patterns of BPEL in cross-organisational business processes, K P Fischer, U Bleimann, W Fuhrmann, and S M. Furnell
Assessing the usability of WLAN security for SOHO users, Bogdan Ghita and Steven Furnell
A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward
The implementation of E-mail content management in a large corporation, Keir Hansen and Craig Valli
Honeypots: How do you know when you are inside one?, Simon Innes and Craig Valli
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland, and Paula Thomas
A global review of information remaining on disks disposed of by organisations, Andy Jones
Evaluation of end-user application security from a usability perspective, Dimitris Katsabas, Steven Furnell, and Paul Dowland
Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward
Risk and Restitution: Assessing how users establish online trust, Hazel Lacohee, Andy Phippen, and Steven Furnell
Secure transmission of shared electronic health records: A review, Rachel Mahncke and Patricia Williams
A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 – “systems installed in a client's premises.”, Robert Mclaughlin and David J. Brooks
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli
Achieving Automated Intrusion Response: A Prototype Implementation, Maria Papadaki and Steven Furnell
Designing and explaining programs with a literate pseudocode, Geoffrey Roy
An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah
A Digital forensic practitioner's guide to giving evidence in a court of law, Shayne Sherman
Personal Firewalls - Testing Robustness, Patryk Szewczyk and Craig Valli
Tags at war: A review of the United States Department of Defence RFID tag data standard, Nadezda Urosevic and Christopher Bolan
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures, Craig Valli
Use of bootable Linux CDs for the delivery of educational course content, Craig Valli
Telemedicine and the digital door doctor, Darren Webb and Patricia Williams
Apprasing information security rituals in primary care medical practice, Patricia Williams
Making Research Real: Is Action Research a Suitable Methodology for Medical Information Security Investigations?, Patricia Williams
Security immunization using basic countermeasures, Patricia Williams
The role of standards in medical information security: an opportunity for improvement, Patricia Williams
Primary care information security: a case study for practical assistance, Patricia Williams and Rachel Mahncke
Shared Electronic Health Records: A changing landscape for security in medical practice, Patricia Williams and Rachel Mahncke
Data Security and wireless networks - mutually exclusive?, Andrew Woodward
LIARS: Laptop Inspector and Recovery System, Andrew Woodward
Submissions from 2005
RFID-Evaluation of Tag Security Schemes, Christopher Bolan
The Growth of 802.11b and 802.11g Networks in the Perth CBD, Western Australia, Christopher Bolan
The introduction of RFID Security into computer security courses, Christopher Bolan
Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks
Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell
User Authentication for Mobile Devices: A Composite Approach, Nathan Clarke and Steven Furnell
A protection profiles approach to risk analysis for small and medium enterprises, Vassilis Dimopoulos and Steven Furnell
A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments, Klaus Fischer, Udo Bleimann, Woldemar Fuhrmann, and Steven Furnell
TCP performance estimation using neural networks modelling, Bogdan Ghita, Steven Furnell, Benn Lines, and Emmanuel Ifeachor
Using human computer interaction principles to promote usable security, D Katsabas, S M. Furnell, and P S. Dowland
A computer network laboratory based on the concept of virtual machines, Wojciech Kuczborski
Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset, Julien Lecomte, Nathan Clarke, and Steven Furnell
After Conversation - A Forensic ICQ Logfile Extraction Tool, Kim Morfitt and Craig Valli
Effects of Steganography In The Business World: How Mobile Devices Can Make A Difference, Danny Ng
HTTP-aware anonymisation of packet traces, Eric Salama, Bogdan Ghita, and Steven Furnell
Individuals perceptions of wireless security in the home environment, Patryk Szewczyk
Securing PDAs in the healthcare environment, Emiko Terado and Patricia Williams
Honeypot Technologies and Their Applicability as an Internal Countermeasure, Craig Valli
Integrating Open Source Protections into SCADA Networks, Craig Valli
A UK and Australian Study of Hard Disk Disposal, Craig Valli and Andrew Jones
An Investigation into the Efficiency of Forensic Erasure Tools for Hard Disk Mechanisms, Craig Valli and Paul Patak
An Investigation into Long Range Detection of Passive UHF RFID Tags, Craig Valli, Andrew Woodward, Ken Wild, and Reino Karvinen
Awareness invoking positive change: Reflections on lecturing practice in Computer and Information Science, Patricia Williams
Information security awareness of medical practitioners, Patricia Williams
Physician secure thyself, Patricia Williams
The underestimation of threats to patients data in clinical practice, Patricia Williams
Where are the policies for PDA usage in the Australian healthcare environment?, Patricia A. H. Williams
Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson
A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke
Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke
The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke
Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward
The effectiveness of commercial erasure programs on BitTorrent activity, Andrew Woodward
WPA/WPA2: Placebo or Panacea?, Andrew Woodward
Submissions from 2003
Security management education online, Peter J. Hosie, Clifton L. Smith, and Joseph Luca
A new minor in network administration and design, Wojciech Kuczborski
High-Radix Arithmetic Systems on Signed Digit Number Representation and Residue Number System, Wojciech Kuczborski
The significance of virtual computer networks in distance education, Wojciech Kuczborski
Socialism in Mozambique? The 'Mozambican revolution' in critical perspective, David Robinson
Honeyd - A OS Fingerprinting Artifice, Craig Valli
Industry Certification: Challenges for the conduct of University security based courses, Craig Valli
An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta
A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli