default search action
Search dblp for Publications
export results for "toc:db/conf/ausforensics/ausforensics2005.bht:"
@inproceedings{DBLP:conf/ausforensics/Bolan05, author = {Christopher Bolan}, editor = {Craig Valli and Andrew Woodward}, title = {Radio Frequency Identification - {A} Review of Low Cost Tag Security Proposals}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {1--7}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 15:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Bolan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/GlassM05, author = {Steve Glass and Vallipuram Muthukkumarasamy}, editor = {Craig Valli and Andrew Woodward}, title = {802.11 {DCF} Denial of Service Vulnerabilities}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {8--14}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/GlassM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Goldschmidt05, author = {Peter Goldschmidt}, editor = {Craig Valli and Andrew Woodward}, title = {Managing the False Alarms: {A} Framework for Assurance and Verification of Surveillance Monitoring}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {15--23}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Goldschmidt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Innes05, author = {Simon Innes}, editor = {Craig Valli and Andrew Woodward}, title = {Secure Deletion and the Effectiveness of Evidence Elimination Software}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {24--44}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Innes05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Innes05a, author = {Simon Innes}, editor = {Craig Valli and Andrew Woodward}, title = {Turning a Linksys {WRT54G} into more than just a Wireless Router}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {45--53}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Innes05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/MorfittV05, author = {Kim Morfitt and Craig Valli}, editor = {Craig Valli and Andrew Woodward}, title = {After Conversation - An Forensic {ICQ} Logfile Extraction Tool}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {54--61}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/MorfittV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/TurnbullBS05, author = {Benjamin P. Turnbull and Barry Blundell and Jill Slay}, editor = {Craig Valli and Andrew Woodward}, title = {Googling Forensics}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {62--67}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/TurnbullBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli05, author = {Craig Valli}, editor = {Craig Valli and Andrew Woodward}, title = {Honeypot technologies and their applicability as an internal countermeasure}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {68--73}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliJ05, author = {Craig Valli and Andy Jones}, editor = {Craig Valli and Andrew Woodward}, title = {A {UK} and Australian Study of Hard Disk Disposal}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {74--78}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliP05, author = {Craig Valli and Paul Patak}, editor = {Craig Valli and Andrew Woodward}, title = {An investigation into the efficiency of forensic erasure tools for hard disk mechanisms}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {79--83}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/ValliWWK05, author = {Craig Valli and Andrew Woodward and Ken Wild and Reino Karvinen}, editor = {Craig Valli and Andrew Woodward}, title = {An investigation into long range detection of passive {UHF} {RFID} tags}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {84--86}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/ValliWWK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Wong05, author = {Lih Wern Wong}, editor = {Craig Valli and Andrew Woodward}, title = {Information Gathering Using Google}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {87--107}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Wong05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Woodward05, author = {Andrew Woodward}, editor = {Craig Valli and Andrew Woodward}, title = {The effectiveness of commercial erasure programs on BitTorrent activity}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {108--114}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Woodward05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Yek05, author = {Suen Yek}, editor = {Craig Valli and Andrew Woodward}, title = {Blackhat fingerprinting of the wired and wireless honeynet}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {115--125}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Yek05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Yek05a, author = {Suen Yek}, editor = {Craig Valli and Andrew Woodward}, title = {How to build a faraday cage on the cheap for wireless security testing}, booktitle = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, pages = {126--130}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Yek05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ausforensics/2005, editor = {Craig Valli and Andrew Woodward}, title = {Proceedings of 3rd Australian Computer, Network {\&} Information Forensics Conference, 2005, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, isbn = {0-7298-0612-X}, timestamp = {Thu, 23 Feb 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.