- Suen Yek:
Implementing network defence using deception in a wireless honeypot. Australian Computer, Network & Information Forensics Conference 2004: 4-15 - Suen Yek, Chris Bolan:
An analysis of security in 802.11b and 802.11g wireless networks in Perth, WA. Australian Computer, Network & Information Forensics Conference 2004: 117-124 - 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings. School of Computer and Information Science, Edith Cowan University, Western Australia 2004, ISBN 0-7298-0571-9 [contents]
- 2003
- Atif Ahmad, Tobias Ruighaver:
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation. Australian Computer, Network & Information Forensics Conference 2003 - Melisa Bleasdale, Scott Mann, John Patzakis:
Computer Forensics in the Global Enterprise. Australian Computer, Network & Information Forensics Conference 2003 - David Cartwright:
Architectural Innovations for Enterprise Forensics. Australian Computer, Network & Information Forensics Conference 2003 - Nirbhay Gupta:
Is Honeyd Effective or Not? Australian Computer, Network & Information Forensics Conference 2003 - Steve McCombie, Matt Warren:
Computer Forensic: An Issue of Definitions. Australian Computer, Network & Information Forensics Conference 2003 - George M. Mohay, Kevin Chen, Andrew J. Clark:
ECF - Event Correlation for Forensics. Australian Computer, Network & Information Forensics Conference 2003 - M. Karthik Narayanan, R. Srikanth:
Prevention of IP Spoofing in TCP/IP Connection: Vulnerability Analysis and Probable Solutions. A Reverse Engineering Approach. Australian Computer, Network & Information Forensics Conference 2003 - Urban Nuldén:
Incident Management and Incident Response: The Case of Sweden. Australian Computer, Network & Information Forensics Conference 2003 - Eunyoung Park:
A Security Surveillance Framework on a Large Scale Network. Australian Computer, Network & Information Forensics Conference 2003 - Tobias Ruighaver, C. C. Terence Tan, Atif Ahmad:
Incident Handling: Where the need for planning is often not recognised. Australian Computer, Network & Information Forensics Conference 2003 - Paul Turner, Vlasti Broucek, Sandra Frings:
The Federal Court, the Music Industry and the Universities. Australian Computer, Network & Information Forensics Conference 2003 - Paul Turner, Sandra Frings, Mathew Hannan, Vlasti Broucek:
Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse. Australian Computer, Network & Information Forensics Conference 2003 - Craig Valli:
Honeyd - A OS Fingerprinting Artifice. Australian Computer, Network & Information Forensics Conference 2003 - Tom Waghorn:
Testing the Date Maintenance of the File Allocation Table File System. Australian Computer, Network & Information Forensics Conference 2003 - Sue Webb:
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A. Australian Computer, Network & Information Forensics Conference 2003 - Suen Yek:
Measuring the Effectiveness of Deception in a Wireless Honeypot. Australian Computer, Network & Information Forensics Conference 2003 - Craig Valli, Matt Warren:
1st Australian Computer, Network & Information Forensics Conference, 25 November 2003, Perth, Western Australia. School of Computer and Information Science, Edith Cowan University, Western Australia 2003, ISBN 0-7298-0542-5 [contents]