default search action
Australian Computer, Network & Information Forensics Conference 2004: Perth, Western Australia
- 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings. School of Computer and Information Science, Edith Cowan University, Western Australia 2004, ISBN 0-7298-0571-9
- Suen Yek:
Implementing network defence using deception in a wireless honeypot. Australian Computer, Network & Information Forensics Conference 2004: 4-15 - Marwan Al-Zarouni:
Tracing E-mail Headers. Australian Computer, Network & Information Forensics Conference 2004: 16-30 - Hyun-Sang Kim, Sang-Jin Lee, Jong-In Lim:
Digitalevidence Integrated Management System. Australian Computer, Network & Information Forensics Conference 2004: 31-39 - Atif Ahmad, Anthonie B. Ruighaver:
Towards Identifying Criteria for the Evidential Weight of System Event Logs. Australian Computer, Network & Information Forensics Conference 2004: 40-47 - Sue Webb:
Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia. Australian Computer, Network & Information Forensics Conference 2004: 48-56 - Christian Frichot:
An Analysis and Comparison of Clustered Password Crackers. Australian Computer, Network & Information Forensics Conference 2004: 57-65 - Christian Frichot:
An Analysis of the Integrity of Palm Images Acquired with PDD. Australian Computer, Network & Information Forensics Conference 2004: 66-75 - Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells:
Graphical Authentication: An Architectural Design Specification. Australian Computer, Network & Information Forensics Conference 2004: 76-82 - Chris Hu:
A Preliminary Examination of Tool Markings on Flash Memory Cards. Australian Computer, Network & Information Forensics Conference 2004: 83-93 - Mathew Hannan, Barry Blundell:
Electronic Crime - its not only the big end of town that should be worried. Australian Computer, Network & Information Forensics Conference 2004: 94-102 - Mathew Hannan:
To Revisit: What is Forensic Computing? Australian Computer, Network & Information Forensics Conference 2004: 103-111 - Craig Valli:
Wireless Snort - A WIDS in progress. Australian Computer, Network & Information Forensics Conference 2004: 112-116 - Suen Yek, Chris Bolan:
An analysis of security in 802.11b and 802.11g wireless networks in Perth, WA. Australian Computer, Network & Information Forensics Conference 2004: 117-124 - Craig Valli:
Throwing out the Enterprise with the Hard Disk. Australian Computer, Network & Information Forensics Conference 2004: 124-129 - Andrew Woodward:
The risks, costs and possible solutions involved in setting up and running wireless local area networks. Australian Computer, Network & Information Forensics Conference 2004: 130-135 - Bradley L. Schatz, George M. Mohay, Andrew J. Clark:
Generalising Event Forensics Across Multiple Domains. Australian Computer, Network & Information Forensics Conference 2004: 136-144
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.