- 2005
- Christopher Bolan:
Radio Frequency Identification - A Review of Low Cost Tag Security Proposals. Australian Computer, Network & Information Forensics Conference 2005: 1-7 - Steve Glass, Vallipuram Muthukkumarasamy:
802.11 DCF Denial of Service Vulnerabilities. Australian Computer, Network & Information Forensics Conference 2005: 8-14 - Peter Goldschmidt:
Managing the False Alarms: A Framework for Assurance and Verification of Surveillance Monitoring. Australian Computer, Network & Information Forensics Conference 2005: 15-23 - Simon Innes:
Secure Deletion and the Effectiveness of Evidence Elimination Software. Australian Computer, Network & Information Forensics Conference 2005: 24-44 - Simon Innes:
Turning a Linksys WRT54G into more than just a Wireless Router. Australian Computer, Network & Information Forensics Conference 2005: 45-53 - Kim Morfitt, Craig Valli:
After Conversation - An Forensic ICQ Logfile Extraction Tool. Australian Computer, Network & Information Forensics Conference 2005: 54-61 - Benjamin P. Turnbull, Barry Blundell, Jill Slay:
Googling Forensics. Australian Computer, Network & Information Forensics Conference 2005: 62-67 - Craig Valli:
Honeypot technologies and their applicability as an internal countermeasure. Australian Computer, Network & Information Forensics Conference 2005: 68-73 - Craig Valli, Andy Jones:
A UK and Australian Study of Hard Disk Disposal. Australian Computer, Network & Information Forensics Conference 2005: 74-78 - Craig Valli, Paul Patak:
An investigation into the efficiency of forensic erasure tools for hard disk mechanisms. Australian Computer, Network & Information Forensics Conference 2005: 79-83 - Craig Valli, Andrew Woodward, Ken Wild, Reino Karvinen:
An investigation into long range detection of passive UHF RFID tags. Australian Computer, Network & Information Forensics Conference 2005: 84-86 - Lih Wern Wong:
Information Gathering Using Google. Australian Computer, Network & Information Forensics Conference 2005: 87-107 - Andrew Woodward:
The effectiveness of commercial erasure programs on BitTorrent activity. Australian Computer, Network & Information Forensics Conference 2005: 108-114 - Suen Yek:
Blackhat fingerprinting of the wired and wireless honeynet. Australian Computer, Network & Information Forensics Conference 2005: 115-125 - Suen Yek:
How to build a faraday cage on the cheap for wireless security testing. Australian Computer, Network & Information Forensics Conference 2005: 126-130 - Craig Valli, Andrew Woodward:
Proceedings of 3rd Australian Computer, Network & Information Forensics Conference, 2005, Perth, Western Australia. School of Computer and Information Science, Edith Cowan University, Western Australia 2005, ISBN 0-7298-0612-X [contents] - 2004
- Atif Ahmad, Anthonie B. Ruighaver:
Towards Identifying Criteria for the Evidential Weight of System Event Logs. Australian Computer, Network & Information Forensics Conference 2004: 40-47 - Marwan Al-Zarouni:
Tracing E-mail Headers. Australian Computer, Network & Information Forensics Conference 2004: 16-30 - Christian Frichot:
An Analysis and Comparison of Clustered Password Crackers. Australian Computer, Network & Information Forensics Conference 2004: 57-65 - Christian Frichot:
An Analysis of the Integrity of Palm Images Acquired with PDD. Australian Computer, Network & Information Forensics Conference 2004: 66-75 - Mathew Hannan:
To Revisit: What is Forensic Computing? Australian Computer, Network & Information Forensics Conference 2004: 103-111 - Mathew Hannan, Barry Blundell:
Electronic Crime - its not only the big end of town that should be worried. Australian Computer, Network & Information Forensics Conference 2004: 94-102 - Chris Hu:
A Preliminary Examination of Tool Markings on Flash Memory Cards. Australian Computer, Network & Information Forensics Conference 2004: 83-93 - Hyun-Sang Kim, Sang-Jin Lee, Jong-In Lim:
Digitalevidence Integrated Management System. Australian Computer, Network & Information Forensics Conference 2004: 31-39 - Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells:
Graphical Authentication: An Architectural Design Specification. Australian Computer, Network & Information Forensics Conference 2004: 76-82 - Bradley L. Schatz, George M. Mohay, Andrew J. Clark:
Generalising Event Forensics Across Multiple Domains. Australian Computer, Network & Information Forensics Conference 2004: 136-144 - Craig Valli:
Wireless Snort - A WIDS in progress. Australian Computer, Network & Information Forensics Conference 2004: 112-116 - Craig Valli:
Throwing out the Enterprise with the Hard Disk. Australian Computer, Network & Information Forensics Conference 2004: 124-129 - Sue Webb:
Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia. Australian Computer, Network & Information Forensics Conference 2004: 48-56 - Andrew Woodward:
The risks, costs and possible solutions involved in setting up and running wireless local area networks. Australian Computer, Network & Information Forensics Conference 2004: 130-135