Search dblp for Publications

export results for "stream:streams/conf/ausforensics:"

 download as .bib file

@inproceedings{DBLP:conf/ausforensics/Bolan05,
  author       = {Christopher Bolan},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Radio Frequency Identification - {A} Review of Low Cost Tag Security
                  Proposals},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {1--7},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 15:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Bolan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/GlassM05,
  author       = {Steve Glass and
                  Vallipuram Muthukkumarasamy},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {802.11 {DCF} Denial of Service Vulnerabilities},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {8--14},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/GlassM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Goldschmidt05,
  author       = {Peter Goldschmidt},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Managing the False Alarms: {A} Framework for Assurance and Verification
                  of Surveillance Monitoring},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {15--23},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Goldschmidt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Innes05,
  author       = {Simon Innes},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Secure Deletion and the Effectiveness of Evidence Elimination Software},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {24--44},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Innes05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Innes05a,
  author       = {Simon Innes},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Turning a Linksys {WRT54G} into more than just a Wireless Router},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {45--53},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Innes05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/MorfittV05,
  author       = {Kim Morfitt and
                  Craig Valli},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {After Conversation - An Forensic {ICQ} Logfile Extraction Tool},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {54--61},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/MorfittV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/TurnbullBS05,
  author       = {Benjamin P. Turnbull and
                  Barry Blundell and
                  Jill Slay},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Googling Forensics},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {62--67},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/TurnbullBS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli05,
  author       = {Craig Valli},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Honeypot technologies and their applicability as an internal countermeasure},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {68--73},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/ValliJ05,
  author       = {Craig Valli and
                  Andy Jones},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {A {UK} and Australian Study of Hard Disk Disposal},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {74--78},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/ValliJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/ValliP05,
  author       = {Craig Valli and
                  Paul Patak},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {An investigation into the efficiency of forensic erasure tools for
                  hard disk mechanisms},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {79--83},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/ValliP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/ValliWWK05,
  author       = {Craig Valli and
                  Andrew Woodward and
                  Ken Wild and
                  Reino Karvinen},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {An investigation into long range detection of passive {UHF} {RFID}
                  tags},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {84--86},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/ValliWWK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Wong05,
  author       = {Lih Wern Wong},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Information Gathering Using Google},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {87--107},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Wong05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Woodward05,
  author       = {Andrew Woodward},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {The effectiveness of commercial erasure programs on BitTorrent activity},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {108--114},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Woodward05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Yek05,
  author       = {Suen Yek},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Blackhat fingerprinting of the wired and wireless honeynet},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {115--125},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Yek05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Yek05a,
  author       = {Suen Yek},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {How to build a faraday cage on the cheap for wireless security testing},
  booktitle    = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  pages        = {126--130},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Yek05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ausforensics/2005,
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Proceedings of 3rd Australian Computer, Network {\&} Information
                  Forensics Conference, 2005, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  isbn         = {0-7298-0612-X},
  timestamp    = {Thu, 23 Feb 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/AhmadR04,
  author       = {Atif Ahmad and
                  Anthonie B. Ruighaver},
  title        = {Towards Identifying Criteria for the Evidential Weight of System Event
                  Logs},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {40--47},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Sat, 09 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/AhmadR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Al-Zarouni04,
  author       = {Marwan Al{-}Zarouni},
  title        = {Tracing E-mail Headers},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {16--30},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Al-Zarouni04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Frichot04,
  author       = {Christian Frichot},
  title        = {An Analysis and Comparison of Clustered Password Crackers},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {57--65},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Frichot04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Frichot04a,
  author       = {Christian Frichot},
  title        = {An Analysis of the Integrity of Palm Images Acquired with {PDD}},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {66--75},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Frichot04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Hannan04,
  author       = {Mathew Hannan},
  title        = {To Revisit: What is Forensic Computing?},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {103--111},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Hannan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/HannanB04,
  author       = {Mathew Hannan and
                  Barry Blundell},
  title        = {Electronic Crime - its not only the big end of town that should be
                  worried},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {94--102},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/HannanB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Hu04,
  author       = {Chris Hu},
  title        = {A Preliminary Examination of Tool Markings on Flash Memory Cards},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {83--93},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Hu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/KimLL04,
  author       = {Hyun{-}Sang Kim and
                  Sang{-}Jin Lee and
                  Jong{-}In Lim},
  title        = {Digitalevidence Integrated Management System},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {31--39},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/KimLL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/PierceWMW04,
  author       = {Justin D. Pierce and
                  Matthew J. Warren and
                  David R. Mackay and
                  Jason G. Wells},
  title        = {Graphical Authentication: An Architectural Design Specification},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {76--82},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/PierceWMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/SchatzMC04,
  author       = {Bradley L. Schatz and
                  George M. Mohay and
                  Andrew J. Clark},
  title        = {Generalising Event Forensics Across Multiple Domains},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {136--144},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Fri, 11 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/SchatzMC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli04,
  author       = {Craig Valli},
  title        = {Wireless Snort - {A} {WIDS} in progress},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {112--116},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli04a,
  author       = {Craig Valli},
  title        = {Throwing out the Enterprise with the Hard Disk},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {124--129},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Webb04,
  author       = {Sue Webb},
  title        = {Growth in the Deployment and Security of 802.11b Wireless Local Area
                  Networks in Perth, Western Australia},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {48--56},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Webb04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Woodward04,
  author       = {Andrew Woodward},
  title        = {The risks, costs and possible solutions involved in setting up and
                  running wireless local area networks},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {130--135},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Woodward04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Yek04,
  author       = {Suen Yek},
  title        = {Implementing network defence using deception in a wireless honeypot},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {4--15},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Yek04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/YekB04,
  author       = {Suen Yek and
                  Chris Bolan},
  title        = {An analysis of security in 802.11b and 802.11g wireless networks in
                  Perth, {WA}},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {117--124},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/YekB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ausforensics/2004,
  title        = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  isbn         = {0-7298-0571-9},
  timestamp    = {Fri, 20 Jul 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/AhmadR03,
  author       = {Atif Ahmad and
                  Tobias Ruighaver},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Design of a Network-Access Audit Log for Security Monitoring and Forensic
                  Investigation},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 16:11:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/AhmadR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/BleasdaleMP03,
  author       = {Melisa Bleasdale and
                  Scott Mann and
                  John Patzakis},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Computer Forensics in the Global Enterprise},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/BleasdaleMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Cartwright03,
  author       = {David Cartwright},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Architectural Innovations for Enterprise Forensics},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Cartwright03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Gupta03,
  author       = {Nirbhay Gupta},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Is Honeyd Effective or Not?},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Gupta03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/McCombieW03,
  author       = {Steve McCombie and
                  Matt Warren},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Computer Forensic: An Issue of Definitions},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/McCombieW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/MohayCC03,
  author       = {George M. Mohay and
                  Kevin Chen and
                  Andrew J. Clark},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {{ECF} - Event Correlation for Forensics},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Sun, 23 Jun 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/MohayCC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/NarayananS03,
  author       = {M. Karthik Narayanan and
                  R. Srikanth},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Prevention of {IP} Spoofing in {TCP/IP} Connection: Vulnerability
                  Analysis and Probable Solutions. {A} Reverse Engineering Approach},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/NarayananS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Nulden03,
  author       = {Urban Nuld{\'{e}}n},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Incident Management and Incident Response: The Case of Sweden},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Nulden03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Park03,
  author       = {Eunyoung Park},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {A Security Surveillance Framework on a Large Scale Network},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Park03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/RuighaverTA03,
  author       = {Tobias Ruighaver and
                  C. C. Terence Tan and
                  Atif Ahmad},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Incident Handling: Where the need for planning is often not recognised},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/RuighaverTA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/TurnerBF03,
  author       = {Paul Turner and
                  Vlasti Broucek and
                  Sandra Frings},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {The Federal Court, the Music Industry and the Universities},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/TurnerBF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/TurnerFHB03,
  author       = {Paul Turner and
                  Sandra Frings and
                  Mathew Hannan and
                  Vlasti Broucek},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Forensic Computing Theory {\&} Practice: Towards developing a
                  methodology for a standardised approach to Computer misuse},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/TurnerFHB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli03,
  author       = {Craig Valli},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Honeyd - {A} {OS} Fingerprinting Artifice},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Waghorn03,
  author       = {Tom Waghorn},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Testing the Date Maintenance of the File Allocation Table File System},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Waghorn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Webb03,
  author       = {Sue Webb},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Identifying Trends in the Deployment and Security of 802.11b Wireless
                  Technology, in Perth, {W.A}},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Webb03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Yek03,
  author       = {Suen Yek},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Measuring the Effectiveness of Deception in a Wireless Honeypot},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Yek03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ausforensics/2003,
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  isbn         = {0-7298-0542-5},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics