Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ausforensics/ausforensics2004.bht:"
@inproceedings{DBLP:conf/ausforensics/AhmadR04, author = {Atif Ahmad and Anthonie B. Ruighaver}, title = {Towards Identifying Criteria for the Evidential Weight of System Event Logs}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {40--47}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Sat, 09 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/AhmadR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Al-Zarouni04, author = {Marwan Al{-}Zarouni}, title = {Tracing E-mail Headers}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {16--30}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Al-Zarouni04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Frichot04, author = {Christian Frichot}, title = {An Analysis and Comparison of Clustered Password Crackers}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {57--65}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Frichot04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Frichot04a, author = {Christian Frichot}, title = {An Analysis of the Integrity of Palm Images Acquired with {PDD}}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {66--75}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Frichot04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Hannan04, author = {Mathew Hannan}, title = {To Revisit: What is Forensic Computing?}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {103--111}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Hannan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/HannanB04, author = {Mathew Hannan and Barry Blundell}, title = {Electronic Crime - its not only the big end of town that should be worried}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {94--102}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/HannanB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Hu04, author = {Chris Hu}, title = {A Preliminary Examination of Tool Markings on Flash Memory Cards}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {83--93}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Hu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/KimLL04, author = {Hyun{-}Sang Kim and Sang{-}Jin Lee and Jong{-}In Lim}, title = {Digitalevidence Integrated Management System}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {31--39}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/KimLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/PierceWMW04, author = {Justin D. Pierce and Matthew J. Warren and David R. Mackay and Jason G. Wells}, title = {Graphical Authentication: An Architectural Design Specification}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {76--82}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/PierceWMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/SchatzMC04, author = {Bradley L. Schatz and George M. Mohay and Andrew J. Clark}, title = {Generalising Event Forensics Across Multiple Domains}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {136--144}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Fri, 11 Dec 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/SchatzMC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli04, author = {Craig Valli}, title = {Wireless Snort - {A} {WIDS} in progress}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {112--116}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Valli04a, author = {Craig Valli}, title = {Throwing out the Enterprise with the Hard Disk}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {124--129}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Valli04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Webb04, author = {Sue Webb}, title = {Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {48--56}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Webb04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Woodward04, author = {Andrew Woodward}, title = {The risks, costs and possible solutions involved in setting up and running wireless local area networks}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {130--135}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Woodward04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/Yek04, author = {Suen Yek}, title = {Implementing network defence using deception in a wireless honeypot}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {4--15}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/Yek04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/YekB04, author = {Suen Yek and Chris Bolan}, title = {An analysis of security in 802.11b and 802.11g wireless networks in Perth, {WA}}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {117--124}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Tue, 07 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/YekB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ausforensics/2004, title = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, isbn = {0-7298-0571-9}, timestamp = {Fri, 20 Jul 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.