Search dblp for Publications

export results for "toc:db/conf/ausforensics/ausforensics2004.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ausforensics/AhmadR04,
  author       = {Atif Ahmad and
                  Anthonie B. Ruighaver},
  title        = {Towards Identifying Criteria for the Evidential Weight of System Event
                  Logs},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {40--47},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Sat, 09 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/AhmadR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Al-Zarouni04,
  author       = {Marwan Al{-}Zarouni},
  title        = {Tracing E-mail Headers},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {16--30},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Al-Zarouni04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Frichot04,
  author       = {Christian Frichot},
  title        = {An Analysis and Comparison of Clustered Password Crackers},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {57--65},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Frichot04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Frichot04a,
  author       = {Christian Frichot},
  title        = {An Analysis of the Integrity of Palm Images Acquired with {PDD}},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {66--75},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Frichot04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Hannan04,
  author       = {Mathew Hannan},
  title        = {To Revisit: What is Forensic Computing?},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {103--111},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Hannan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/HannanB04,
  author       = {Mathew Hannan and
                  Barry Blundell},
  title        = {Electronic Crime - its not only the big end of town that should be
                  worried},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {94--102},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/HannanB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Hu04,
  author       = {Chris Hu},
  title        = {A Preliminary Examination of Tool Markings on Flash Memory Cards},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {83--93},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Hu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/KimLL04,
  author       = {Hyun{-}Sang Kim and
                  Sang{-}Jin Lee and
                  Jong{-}In Lim},
  title        = {Digitalevidence Integrated Management System},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {31--39},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/KimLL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/PierceWMW04,
  author       = {Justin D. Pierce and
                  Matthew J. Warren and
                  David R. Mackay and
                  Jason G. Wells},
  title        = {Graphical Authentication: An Architectural Design Specification},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {76--82},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/PierceWMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/SchatzMC04,
  author       = {Bradley L. Schatz and
                  George M. Mohay and
                  Andrew J. Clark},
  title        = {Generalising Event Forensics Across Multiple Domains},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {136--144},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Fri, 11 Dec 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/SchatzMC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli04,
  author       = {Craig Valli},
  title        = {Wireless Snort - {A} {WIDS} in progress},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {112--116},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Valli04a,
  author       = {Craig Valli},
  title        = {Throwing out the Enterprise with the Hard Disk},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {124--129},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Valli04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Webb04,
  author       = {Sue Webb},
  title        = {Growth in the Deployment and Security of 802.11b Wireless Local Area
                  Networks in Perth, Western Australia},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {48--56},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Webb04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Woodward04,
  author       = {Andrew Woodward},
  title        = {The risks, costs and possible solutions involved in setting up and
                  running wireless local area networks},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {130--135},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Woodward04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/Yek04,
  author       = {Suen Yek},
  title        = {Implementing network defence using deception in a wireless honeypot},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {4--15},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/Yek04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/YekB04,
  author       = {Suen Yek and
                  Chris Bolan},
  title        = {An analysis of security in 802.11b and 802.11g wireless networks in
                  Perth, {WA}},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {117--124},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Tue, 07 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/YekB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ausforensics/2004,
  title        = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  isbn         = {0-7298-0571-9},
  timestamp    = {Fri, 20 Jul 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics