default search action
Search dblp for Publications
export results for "stream:conf/ausforensics:"
@inproceedings{DBLP:conf/ausforensics/Bolan05, author = {Christopher Bolan}, editor = {Craig Valli and Andrew Woodward}, title = {Radio Frequency Identification - {A} Review of Low Cost Tag Security Proposals}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {1--7}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 15:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Bolan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/GlassM05, author = {Steve Glass and Vallipuram Muthukkumarasamy}, editor = {Craig Valli and Andrew Woodward}, title = {802.11 {DCF} Denial of Service Vulnerabilities}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {8--14}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/GlassM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Goldschmidt05, author = {Peter Goldschmidt}, editor = {Craig Valli and Andrew Woodward}, title = {Managing the False Alarms: {A} Framework for Assurance and Verification of Surveillance Monitoring}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {15--23}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Goldschmidt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Innes05, author = {Simon Innes}, editor = {Craig Valli and Andrew Woodward}, title = {Secure Deletion and the Effectiveness of Evidence Elimination Software}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {24--44}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Innes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Innes05a, author = {Simon Innes}, editor = {Craig Valli and Andrew Woodward}, title = {Turning a Linksys {WRT54G} into more than just a Wireless Router}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {45--53}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Innes05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/MorfittV05, author = {Kim Morfitt and Craig Valli}, editor = {Craig Valli and Andrew Woodward}, title = {After Conversation - An Forensic {ICQ} Logfile Extraction Tool}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {54--61}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/MorfittV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/TurnbullBS05, author = {Benjamin P. Turnbull and Barry Blundell and Jill Slay}, editor = {Craig Valli and Andrew Woodward}, title = {Googling Forensics}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {62--67}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/TurnbullBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli05, author = {Craig Valli}, editor = {Craig Valli and Andrew Woodward}, title = {Honeypot technologies and their applicability as an internal countermeasure}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {68--73}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliJ05, author = {Craig Valli and Andy Jones}, editor = {Craig Valli and Andrew Woodward}, title = {A {UK} and Australian Study of Hard Disk Disposal}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {74--78}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliP05, author = {Craig Valli and Paul Patak}, editor = {Craig Valli and Andrew Woodward}, title = {An investigation into the efficiency of forensic erasure tools for hard disk mechanisms}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {79--83}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliWWK05, author = {Craig Valli and Andrew Woodward and Ken Wild and Reino Karvinen}, editor = {Craig Valli and Andrew Woodward}, title = {An investigation into long range detection of passive {UHF} {RFID} tags}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {84--86}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliWWK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Wong05, author = {Lih Wern Wong}, editor = {Craig Valli and Andrew Woodward}, title = {Information Gathering Using Google}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {87--107}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Wong05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Woodward05, author = {Andrew Woodward}, editor = {Craig Valli and Andrew Woodward}, title = {The effectiveness of commercial erasure programs on BitTorrent activity}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {108--114}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Woodward05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Yek05, author = {Suen Yek}, editor = {Craig Valli and Andrew Woodward}, title = {Blackhat fingerprinting of the wired and wireless honeynet}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {115--125}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Yek05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Yek05a, author = {Suen Yek}, editor = {Craig Valli and Andrew Woodward}, title = {How to build a faraday cage on the cheap for wireless security testing}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {126--130}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Yek05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ausforensics/2005, editor = {Craig Valli and Andrew Woodward}, title = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, isbn = {0-7298-0612-X}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/AhmadR04, author = {Atif Ahmad and Anthonie B. Ruighaver}, title = {Towards Identifying Criteria for the Evidential Weight of System Event Logs}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {40--47}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Sat, 09 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/AhmadR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Al-Zarouni04, author = {Marwan Al{-}Zarouni}, title = {Tracing E-mail Headers}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {16--30}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Al-Zarouni04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Frichot04, author = {Christian Frichot}, title = {An Analysis and Comparison of Clustered Password Crackers}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {57--65}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Frichot04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Frichot04a, author = {Christian Frichot}, title = {An Analysis of the Integrity of Palm Images Acquired with {PDD}}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {66--75}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Frichot04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Hannan04, author = {Mathew Hannan}, title = {To Revisit: What is Forensic Computing?}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {103--111}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Hannan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/HannanB04, author = {Mathew Hannan and Barry Blundell}, title = {Electronic Crime - its not only the big end of town that should be worried}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {94--102}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/HannanB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Hu04, author = {Chris Hu}, title = {A Preliminary Examination of Tool Markings on Flash Memory Cards}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {83--93}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Hu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/KimLL04, author = {Hyun{-}Sang Kim and Sang{-}Jin Lee and Jong{-}In Lim}, title = {Digitalevidence Integrated Management System}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {31--39}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/KimLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/PierceWMW04, author = {Justin D. Pierce and Matthew J. Warren and David R. Mackay and Jason G. Wells}, title = {Graphical Authentication: An Architectural Design Specification}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {76--82}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/PierceWMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/SchatzMC04, author = {Bradley L. Schatz and George M. Mohay and Andrew J. Clark}, title = {Generalising Event Forensics Across Multiple Domains}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {136--144}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Fri, 11 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/SchatzMC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli04, author = {Craig Valli}, title = {Wireless Snort - {A} {WIDS} in progress}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {112--116}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli04a, author = {Craig Valli}, title = {Throwing out the Enterprise with the Hard Disk}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {124--129}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Webb04, author = {Sue Webb}, title = {Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {48--56}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Webb04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Woodward04, author = {Andrew Woodward}, title = {The risks, costs and possible solutions involved in setting up and running wireless local area networks}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {130--135}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Woodward04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Yek04, author = {Suen Yek}, title = {Implementing network defence using deception in a wireless honeypot}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {4--15}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Yek04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/YekB04, author = {Suen Yek and Chris Bolan}, title = {An analysis of security in 802.11b and 802.11g wireless networks in Perth, {WA}}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {117--124}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/YekB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ausforensics/2004, title = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, isbn = {0-7298-0571-9}, timestamp = {Fri, 20 Jul 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/AhmadR03, author = {Atif Ahmad and Tobias Ruighaver}, editor = {Craig Valli and Matt Warren}, title = {Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 16:11:52 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/AhmadR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/BleasdaleMP03, author = {Melisa Bleasdale and Scott Mann and John Patzakis}, editor = {Craig Valli and Matt Warren}, title = {Computer Forensics in the Global Enterprise}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/BleasdaleMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Cartwright03, author = {David Cartwright}, editor = {Craig Valli and Matt Warren}, title = {Architectural Innovations for Enterprise Forensics}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Cartwright03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Gupta03, author = {Nirbhay Gupta}, editor = {Craig Valli and Matt Warren}, title = {Is Honeyd Effective or Not?}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Gupta03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/McCombieW03, author = {Steve McCombie and Matt Warren}, editor = {Craig Valli and Matt Warren}, title = {Computer Forensic: An Issue of Definitions}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/McCombieW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/MohayCC03, author = {George M. Mohay and Kevin Chen and Andrew J. Clark}, editor = {Craig Valli and Matt Warren}, title = {{ECF} - Event Correlation for Forensics}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Sun, 23 Jun 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/MohayCC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/NarayananS03, author = {M. Karthik Narayanan and R. Srikanth}, editor = {Craig Valli and Matt Warren}, title = {Prevention of {IP} Spoofing in {TCP/IP} Connection: Vulnerability Analysis and Probable Solutions. {A} Reverse Engineering Approach}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/NarayananS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Nulden03, author = {Urban Nuld{\'{e}}n}, editor = {Craig Valli and Matt Warren}, title = {Incident Management and Incident Response: The Case of Sweden}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Nulden03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Park03, author = {Eunyoung Park}, editor = {Craig Valli and Matt Warren}, title = {A Security Surveillance Framework on a Large Scale Network}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Park03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/RuighaverTA03, author = {Tobias Ruighaver and C. C. Terence Tan and Atif Ahmad}, editor = {Craig Valli and Matt Warren}, title = {Incident Handling: Where the need for planning is often not recognised}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/RuighaverTA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/TurnerBF03, author = {Paul Turner and Vlasti Broucek and Sandra Frings}, editor = {Craig Valli and Matt Warren}, title = {The Federal Court, the Music Industry and the Universities}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/TurnerBF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/TurnerFHB03, author = {Paul Turner and Sandra Frings and Mathew Hannan and Vlasti Broucek}, editor = {Craig Valli and Matt Warren}, title = {Forensic Computing Theory {\&} Practice: Towards developing a methodology for a standardised approach to Computer misuse}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/TurnerFHB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli03, author = {Craig Valli}, editor = {Craig Valli and Matt Warren}, title = {Honeyd - {A} {OS} Fingerprinting Artifice}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Waghorn03, author = {Tom Waghorn}, editor = {Craig Valli and Matt Warren}, title = {Testing the Date Maintenance of the File Allocation Table File System}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Waghorn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Webb03, author = {Sue Webb}, editor = {Craig Valli and Matt Warren}, title = {Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, {W.A}}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Webb03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Yek03, author = {Suen Yek}, editor = {Craig Valli and Matt Warren}, title = {Measuring the Effectiveness of Deception in a Wireless Honeypot}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Yek03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ausforensics/2003, editor = {Craig Valli and Matt Warren}, title = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, isbn = {0-7298-0542-5}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.