default search action
Australian Computer, Network & Information Forensics Conference 2003: Perth, Western Australia
- Craig Valli, Matt Warren:
1st Australian Computer, Network & Information Forensics Conference, 25 November 2003, Perth, Western Australia. School of Computer and Information Science, Edith Cowan University, Western Australia 2003, ISBN 0-7298-0542-5
Incident Management/ Response
- Urban Nuldén:
Incident Management and Incident Response: The Case of Sweden. Australian Computer, Network & Information Forensics Conference 2003 - Melisa Bleasdale, Scott Mann, John Patzakis:
Computer Forensics in the Global Enterprise. Australian Computer, Network & Information Forensics Conference 2003
Investigation Frameworks and Methods
- Eunyoung Park:
A Security Surveillance Framework on a Large Scale Network. Australian Computer, Network & Information Forensics Conference 2003 - Tobias Ruighaver, C. C. Terence Tan, Atif Ahmad:
Incident Handling: Where the need for planning is often not recognised. Australian Computer, Network & Information Forensics Conference 2003
Computer Forensics
- Atif Ahmad, Tobias Ruighaver:
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation. Australian Computer, Network & Information Forensics Conference 2003 - George M. Mohay, Kevin Chen, Andrew J. Clark:
ECF - Event Correlation for Forensics. Australian Computer, Network & Information Forensics Conference 2003 - Tom Waghorn:
Testing the Date Maintenance of the File Allocation Table File System. Australian Computer, Network & Information Forensics Conference 2003
Computer Forensics
- Steve McCombie, Matt Warren:
Computer Forensic: An Issue of Definitions. Australian Computer, Network & Information Forensics Conference 2003 - Paul Turner, Vlasti Broucek, Sandra Frings:
The Federal Court, the Music Industry and the Universities. Australian Computer, Network & Information Forensics Conference 2003 - Paul Turner, Sandra Frings, Mathew Hannan, Vlasti Broucek:
Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse. Australian Computer, Network & Information Forensics Conference 2003
Network Forensics
- Nirbhay Gupta:
Is Honeyd Effective or Not? Australian Computer, Network & Information Forensics Conference 2003 - Sue Webb:
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A. Australian Computer, Network & Information Forensics Conference 2003 - Craig Valli:
Honeyd - A OS Fingerprinting Artifice. Australian Computer, Network & Information Forensics Conference 2003
Internet Service Providers and Security
- David Cartwright:
Architectural Innovations for Enterprise Forensics. Australian Computer, Network & Information Forensics Conference 2003 - M. Karthik Narayanan, R. Srikanth:
Prevention of IP Spoofing in TCP/IP Connection: Vulnerability Analysis and Probable Solutions. A Reverse Engineering Approach. Australian Computer, Network & Information Forensics Conference 2003 - Suen Yek:
Measuring the Effectiveness of Deception in a Wireless Honeypot. Australian Computer, Network & Information Forensics Conference 2003
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.