Refereed Conference Papers
2011
- Aked, S. (2011). AN INVESTIGATION INTO DARKNETS AND THE CONTENT AVAILABLE VIA ANONYMOUS PEER-TO-PEER FILE SHARING The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 10-18.
- Alghafli, K. A., A. Jones, et al. (2011). Guidelines for the Digital Forensic Processing of Smartphones. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre: 1-8.
- Andersson, K. and P. Szewczyk (2011). INSECURITY BY OBSCURITY CONTINUES: ARE ADSL ROUTER MANUALS PUTTING END-USERS AT RISK. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 19-24.
- Bailey, B. (2011). CASE STUDIES: A SECURITY SCIENCE RESEARCH METHODOLOGY The 4th Australian Security and Intelligence Conference. D. J. Brooks and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia: 9-15
- Bella, G. and L. Coles-Kemp (2011). SEEING THE FULL PICTURE: THE CASE FOR EXTENDING SECURITY CEREMONY ANALYSIS. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 49-55.
- Bolan, C. (2011). A PROPOSAL FOR UTILISING ACTIVE JAMMING FOR THE DEFENCE OF RFID SYSTEMS AGAINST ATTACK. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 56-62.
- Braes, B. & Brooks, D. (2011, July). Organisational Resilience: Understanding and identifying the essential concepts. SAFE 2011, Proceedings of the Fourth International Conference on Safety and Security Engineering, Antwerp, Belgium.
- Brand, M. (2011). Forensic Recovery and Analysis of the artefacts of a Crimeware Toolkit. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre: 9-15.
- Brand, M., C. Valli, et al. (2011). A Threat to Cyber Resilience: A Malware Rebirthing Botnet. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 1-6.
- Brooks, D. J. (2011). INTELLIGENT BUILDINGS: AN INVESTIGATION INTO CURRENT AND EMERGING SECURITY VULNERABILITIES IN AUTOMATED BUILDING SYSTEMS USING AN APPLIED DEFEAT METHODOLOGY The 4th Australian Security and Intelligence Conference. D. J. Brooks and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia: 16-26.
- Brooks, D.J. and Cotton, H., Intelligent Buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology? The Proceedings of the 4th Australian Security and Intelligence Conference.
- Brooks, D.J. and Cotton, H., Security Risk Management in the Asia Pacific Region: What are Security Professional Using? The Proceedings of the 4th Australian Security and Intelligence Conference.
- Carpene, C. (2011). Looking to iPhone backup files for evidence extraction. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre: 16-32.
- Chaerani, W., N. Clarke, et al. (2011). Information Leakage through Second Hand USB Flash drives within the United Kingdom. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre: 33-38.
- Cook, D. M. and T. Smith (2011). FINANCE, FEAR, AND FAMILY: ISSUES OF TRUST AND THE COMMON GROUND WITH TERRORIST FUNDING. The 2nd Australian Counter Terrorism Conference. M. Crowley and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 1-11.
- Cook, D.M, Szewczyk, P., and Sansurooah. K. (2011). Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, in the 9th Australian Information Security Management Conference, Citigate Hotel, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2011, pp. 63-68.
- Coole, M. And Brooks, D.J. Mapping The Organizational Relations Within Physical Security’s Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice; The Proceedings of the 4th Australian Security and Intelligence Conference.
- Cook, D. M., P. Szewczyk, et al. (2011). Securing the Elderly: A Developmental Approach to Hypermedia Based Online Information Security for Senior Novice Computer Users. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 20-28.
- Cotton, H. and C. Bolan (2011). USER PERCEPTIONS OF END USER LICENSE AGREEMENTS IN THE SMARTPHONE ENIVRONMENT. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 69-75.
- Davies, A., J. Ducie, et al. (2011). THE AUSTRALIAN IMMIGRATION BLACK HOLE: A RADICAL PROBLEM? . The 2nd Australian Counter Terrorism Conference. M. Crowley and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 21-29.
- Doleman, R., & Brooks, D.J. (May, 2011). Why are there systemic failures of fire protection equipment in Australian Aged Care Nursing facilities? Conference Proceedings from the 10th EuroFM Research Symposium 2011, 35-45
- Doleman, R and Brooks, D.J., A strategy to articulate the facility management knowledge categories within the built environment. The Proceedings of the 4th Australian Security and Intelligence Conference.
- Donald, C. H. M. (2011). IS THERE A CORE SET OF SKILLS FOR VISUAL ANALYSIS ACROSS DIFFERENT IMAGING TECHNOLOGIES? . The 4th Australian Security and Intelligence Conference. D. J. Brooks and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia: 68-73.
- Donald, F. M. and C. H. M. Donald (2011). INDIVIDUALISED RESPONSES TO VIGILANCE DEMANDS AND THEIR MANAGEMENT The 4th Australian Security and Intelligence Conference. D. J. Brooks and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia: 74-80.
- Fowle, K. and D. Schofiled (2011). Visualising Forensic Data: Investigation to Court. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre: 56-65.
- Hannay, P., Using Traffic Analysis to Identify the Second Generation Onion Router, Published at Embedded and Ubiquitous Computing (EUC), 2011
- Hannay, P. and G. Baatard (2011). GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 29-37.
- Hocking, C. G., S. M. Furnell, et al. (2011). A PRELIMINARY INVESTIGATION OF DISTRIBUTED AND COOPERATIVE USER AUTHENTICATION The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 101-110.
- Jacobson, E. and A. Woodward (2011). A LONGITUDINAL STUDY OF WI-FI ACCESS POINT SECURITY IN THE PERTH CENTRAL BUSINESS DISTRICT. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 124-129.
- James, P. (2011). ARE EXISTING SECURITY MODELS SUITABLE FOR TELEWORKING? . The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 130-139.
- Johnstone, M. N. (2011). MODELLING MISUSE CASES AS A MEANS OF CAPTURING SECURITY REQUIREMENTS The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 140-147.
- Johnstone, M. N. (2011). SECURITY ASPECTS OF SENSOR-BASED DEFENCE SYSTEMS The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 148-154.
- Johnstone, M.N. and Jarvis, J.A. (2011). ‘Penetration of ZigBee-Based Wireless Sensor Networks. Pages 17-23 of: Bolan, C. and Valli, C., (eds), Proceedings of the 12th Australian Information Warfare Conference. Perth, Australia.
- Joseph, J. and J. Corkill (2011). INFORMATION EVALUATION: HOW ONE GROUP OF INTELLIGENCE ANALYSTS GO ABOUT THE TASK. The 4th Australian Security and Intelligence Conference. D. J. Brooks and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia: 97-103.
- Letch, J., McGlinn, E., Bell, J., Downing, E., and Cook, D.M. (2011) An Exploration of 1st and 2nd Generation CPTED For End of Year School Leavers at Rottnest Island, The 4th Australian Security and Intelligence Conference, Citigate Hotel, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2011, pp. 38-48.
- Mahncke, R. J. and P. A. H. Williams (2011). AUSTRALIAN PRIMARY CARE HEALTH CHECK: WHO IS ACCOUNTABLE FOR INFORMATION SECURITY? The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 165-171.
- McCauley, V. B. and P. A. H. Williams (2011). TRUSTED INTEROPERABILITY AND THE PATIENT SAFETY ISSUES OF PARASITIC HEALTH CARE SOFTWARE The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 189-195.
- Martin, T. A. and A. Jones (2011). An evaluation of data erasing tools. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre: 84-92.
- Maynard, S.B., Ahmad A. B. R.A., (2011). STAKEHOLDERS IN SECURITY POLICY DEVELOPMENT The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 182-188.
- Nor Badrul Anuar, S. F., Maria Papadaki, Nathan Clarke (2011). A RISK INDEX MODEL FOR SECURITY INCIDENT PRIORITISATION. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 25-39.
- O'Rourke, S. (2011). Empowering protest through social media. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 47-55.
- Pung, W. and A. Woodward (2011). Can current packet analysis software detect Bittorrent activity or extract files from BTP and μTP traffic streams. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre.
- Subsorn, P. and S. Limwiriyakul (2011). A comparative analysis of the security of internet banking in Australia: a customer perspective. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 70-83.
- Szewczyk, P. and K. Sansurooah (2011). A 2011 Investigation into Remnant Data on Second Hand Memory cards sold in Australia. The 9th Australian Digital Forensics Conference. A. Woodward and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre: 134-138.
- Torok, R. (2011). Facebook jihad: A case study of recruitment discourses and strategies targeting a Western female. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 84-94.
- Torok, R. (2011). BIN LADEN'S FORMATION OF THE SELF: A COMPARATIVE ANALYSIS The 2nd Australian Counter Terrorism Conference. M. Crowley and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 35-42.
- Valli, C, Woodward, A., and Hannay P, (May 2011), Backtrack in the Outback - A Report on Cyber Security Evaluation of Organisations in Western Australia, Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA ,pp 191-196
- Warren, M., S. Leitch, et al. (2011). ATTACK VECTORS AGAINST SOCIAL NETWORKING SYSTEMS: THE FACEBOOK EXAMPLE. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 231-237.
- Williams, P. A. H. (2011). Why Australia's e-health system will be a vulnerable national asset. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 95-99.
- Williams, P. A. H. (2011). Why Australia's e-health system will be a vulnerable national asset. The 2nd International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 95-99.
- Williams, P. A. H. (2011). HELP OR HINDRANCE: THE PRACTICALITY OF APPLYING SECURITY STANDARDS IN HEALTHCARE. The 9th Australian Information Security Management Conference. T. Williams and C. Valli. Citigate Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University, Perth, Western Australia 238-244.
2010
- Aly, A. (2010). The Internet as Ideological Battleground 1st Australian Counter Terrorism Conference. A. Aly. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 1-6.
- Bailey, W. J. (2010). Hearts and Minds, Psuedo Gangs and Counter Insurgency: Based Upon Experiences from Previous Campaigns in Kenya (1952-60), Malaya (1948-60) & Rhodesia (1964-1979). Proceedings of the 1st Australian Counter Terrorism Conference. D. A. Aly, secAU, ECU: 7-14.
- Barker, J. E., Hannay,P. ,Bolan,C.M. (2010). Using Traffic Analysis to Identify Tor Usage – A Proposed Study. Proceedings of the 2010 International Conference on Security & Management, SAM 2010. K. D. Hamid R. Arabnia, Michael R. Grimaila, George Markowsky, CSREA Press. 2: pp.620-623.
- Beard, B., Brooks,D.J. (2010). A comparison of laboratory and vulnerability evaluation methods for the testing security equipment. Proceedings of the 3rd Australian Security and Intelligence Conference. D. Brooks, Edith Cowan University: 1-13.
- Bhamra, S. S. (2010). The 2010 Personal Firewall Robustness Evaluation. Proceedings of the 8th Australian Digital Forensics Conference. D. A. Woodward, secAU-Security Research Centre: 18-30.
- Braes, B., Brooks,D.J. (2010). Organisational resilience: A propositional study to understand and identify the essential concepts. Proceedings of the 3rd Australian Security and Intelligence Conference. D. Brooks, Edith Cowan University: 14-22.
- Brand,M.W., Valli,C., Woodward,A.J. (2010). Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software. 8th Australian Digital Forensics Conference. Dr Andrew Woodward. Duxton Hotel, Perth Western Australia. secAU Security Research Centre Edith Cowan University. pp 31-38.
- Brand,M.W., Valli,C., Woodward,A.J. (2010). Malware Forensics: Discovery of the Intent of Deception. 8th Australian Digital Forensics Conference. Dr Andrew Woodward. Duxton Hotel, Perth, Western Australia. secAU Security Research Centre Edith Cowan University. 39-45.
- Brooks, D. J., Corkill, J., Pooley, J., Cohen, L., Ferguson, C., & Harms, C. (2010). National security: A propositional study to develop resilience indicators as an aid to personnel vetting. Paper presented at the 3rd Australian Security and Intelligence Conference, Perth.
- Brooks, D. J. (2010). Assessing vulnerabilities of biometric readers using an applied defeat evaluation methodology. The Proceedings of the 3rd Australian Security and Intelligence Conference. D. Brooks, Edith Cowan University: 23-34.
- Cheng, T. C., Woodward,A.J. (2010). An investigation into the efficacy of three erasure tools under Windows 7. The Proceedings of the 8th Australian Digital Forensics Conference. D. A. J. Woodward, secAU Security Research Centre Edith Cowan University: 162-168.
- Cook.D and Smith T “The Malarkey of Money Transfers: Overlooking E-Bay whilst the Hawaladars are Hunted”, 1st Australian Counter Terrorism Conference, Dec 1st secau Security Congress.
- Cook, D.M. (2010) "Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance with High Impact Returns," in The 1st International Cyber Resilience Conference, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2010, pp. 22-30.
- Cook,D.M. (2010) "The Use of Governance to Identify Cyber Threats Through Social Media," in The 1st International Cyber Resilience Conference, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2010, pp. 31-40.
- Dardick, G (2010) Cyber Forensics Assurance, 8th Australian Digital Forensics Conference. Dr Andrew J Woodward. Duxton Hotel, Perth, Western Australia. secAU Security Research Centre Edith Cowan University. 57-64
- Fowle, K. G. (2010). The Science, The Technology, The Law. Proceedings of the 8th Australian Digital Forensics Conference. A. Woodward, secAU Security Research Centre, ECU: 65-74.
- Griffiths, D., James,P.A. (2010). Fireguard - A secure browser with reduced forensic footprint. Proceedings of the 8th Australian Digital Forensics Conference. D. A. Woodward, secAU, ECU: 75-91.
- Griffiths, M., Brooks, D. J., & Corkill, J. (2010). Defining the security professional: Definition through a body of knowledge. Paper presented at the 3rd Australian Security and Intelligence Conference, Perth.
- Hannay, P. & Bolan, Christopher (2010) The 2010 IDN Homograph Attack Mitigation Survey Proceedings of the 2010 International Conference on Security & Management, SAM 2010, Las Vegas Nevada, USA
- Harris, K. J. (2010). Review: Disillusionment with radical social groups. Proceedings of the 1st Australian Counter Terrorism Conference. D. A. Aly, secAU, ECU: 31-39.
- Hearn, K., Williams, P.A.H. & Mahncke, R.M. (2010). International relations and cyber attacks: Official and unofficial discourse. In P.A.H. Williams (Ed.) Proceedings of the 11th Australian Information Warfare and Security Conference, secau- Security Research Centre, Edith Cowan University, Perth, WA
- Hocking, C., S. Furnell, et al. (2010). A distributed and cooperative user authentication framework. Sixth International Conference on Information Assurance and Security (IAS). Atlanta, USA, IEEE: 304-310.
- Hutchinson, W. E. (2010). Influence Operations : Action and Attitude. 11th Australian Information Warfare Conference. P. Williams. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre: 13-17.
- Hutchinson, W. E. and M. J. Warren (2010). Influence operations and behavioural change. 9th European Conference on Information Warfare and Security. J. Demergis. Thessalonica, Greece, Academic Publishing Limited: 116-119.
- Ibrahim, T., S. Furnell, et al. (2010). Assessing the Usability of End-User Security Software. TrustBus 2010 - 7th International Conference on Trust, Privacy and Security in Digital Business S. Katsikas, J. Lopez and M. Soriano. Bilbao, Spain, Springer-Verlag. LNCS 6264: 177-189.
- Johnstone, M. N. (2010). Threat modelling with Stride and UML. 8th Australian Information Security Management Conference. C. Bolan. Duxton Hotel, Perth, Western Australia, secau – Security Research Centre, Edith Cowan University: 18-27.
- Jones, A. and T. Martin (2010). Making Information Security Acceptable to the User. 2010 International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 51-57.
- Jones, A., C. Valli, et al. (2010). The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market 8th Australian Digital Forensics Conference. A. Woodward. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 92-105.
- Kerai, P. L. (2010). Remote Access Forensics for VNC and RDP on Windows Platform. 8th Australian Digital Forensics Conference. A. Woodward. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 106-116.
- Kerai, P. L. (2010). Tracing VNC and RDP protocol artefacts on Windows mobile and Windows smartphone for forensic purpose. The 1st International Cyber Resilience Conference. C. Valli. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 58-68.
- Krey, M., B. Harriehausen, Knoll, M. Furnell, S. (2010). IT Governance and its impact on the Swiss Healthcare. 12th International Conference on Computer Modelling and Simulation (UKSIM 2010). Cambridge, UK: 340-345.
- Li, F., N. Clarke, et al. (2010). Behaviour profiling on mobile devices. 2010 International Conference on Emerging Security Technologies (EST) IEEE: 77-82.
- Masek, M., A. Boeing, et al. (2010). Critical infrastructure protection risk modelling with games technology. What kind of information society? Governance, Virtuality, Surveilance, Sustainability, Resilience. J. Berleur, M. D. Hercheui and L. M. Hilty. Brisbane, Australia, Springer. 328: 363-372.
- McDermid, D. C., R. J. Mahncke, et al. (2010). An Information Security Governance Encounter for Australian Primary Care Health Providers. 2010 International Conference on Security & Management. H. R. Arabnia, K. Daimi, M. R. Grimailaet al. Las Vegas, Nevada, USA, CSREA Press, USA: 637-643.
- McDermid, D. C., Mahncke, R.J. and Williams, P. A. H. (2010). An information security governance framework for Australian primary health care providers. In C. Bolan (Ed.) Proceedings of the 7th Australian Information Security Management Conference, secau - Security Research Centre, Edith Cowan University, Perth, WA.
- Mahncke, R. & Williams, P.A.H. (2010). Small Business - a cyber resilience vulnerability? In C. Valli (Ed.) Proceedings of the The 1st International Cyber Resilience Conference. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University:
- Nur-E-Alam, N., Vasiliev, M., Alameh, K. and Valli, C.(2010) "Magneto-Optical Visualisation for High-Resolution Forensic Data Recovery Using Advanced Thin Film Nano-Materials," in The 1st International Cyber Resilience Conference, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2010, pp. 78-82.
- O'Rourke, S. J. (2010). The emergent challenges for policing terrorism: Lessons from Mumbai. 1st Australian Counter Terrorism Conference. A. Aly. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 45-53.
- Patel, N. and Williams, P. A. H. (2010). Breaches in medical information security: The problem of reporting. 2010 International Conference on Security & Management. H. R. Arabnia, K. Daimi, M. R. Grimailaet al. Las Vegas Nevada, USA, CSREA Press. II: 633-636.
- Pung,W. and Woodward,A.J. (2010). Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?. 8th Australian Digital Forensics Conference. Dr Andrew J Woodward. Duxton Hotel, Perth, Western Australia. secAU Security Research Centre Edith Cowan University. 135-141.
- Sargent, R. A. and D. J. Brooks (2010). Terrorism in Australia: A psychometric study into the Western Australian public perception of terrorism. 3rd Australian Security and Intelligence Conference. D. Brooks. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre: 63-72.
- Shauchenka, H., Bleimann, U., Knoll, M., & Clarke, N. (2010). Service Quality Assessment in Distance Learning. Paper presented at the Eighth International Network Conference, Heidelberg, Germany:269-277
- Sutherland, I., Davies, G., Jones, A., & Blyth, A. (2010). Zombie Hard Disks - Data from the Living Dead. 8th Australian Digital Forensics Conference, Duxton Hotel, Perth,Western Australia. Western Australia. secau - Security Research Centre, Edith Cowan University:156-161
- Szewczyk, P., Valli, C. (2010). Ignorant Experts: Computer and Network Security Support from Internet Service Providers. IEEE 4th International Conference on Network and System Security, Crown Conference Centre Melbourne, Victoria:323-327
- Szewczyk, P. (2010). Security Information Supplied by Australian Internet Service Providers, 8th Australian Information Security Management Conference, Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University:138-143
- Talib, S., Clarke,N. ,Furnell,S. (2010). An Analysis of Information Security Awareness within Home and Work Environments. Availability, Reliability and Security, 2010. ARES '10. International Conference on, IEEE: 196-203.
- Valli, C. and P. Hannay (2010). Geotagging Where Cyberspace Comes to Your Place. 2010 International Conference on Security & Management (SAM '10). H. R. Arabnia, et.al.,. Las Vegas, Nevada, USA, CSREA Press. 2: 627-630.
- Valli, C. and M. H. Al Lawati (2010). Developing VoIP Router honeypots. 2010 International Conference on Security & Management. H. R. Arabnia, et.al., Las Vegas, Nevada, USA, CSREA Press. 2: 615-619. USA
- Valli, C. (2010) Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity, The 2010 ADFSL Conference on Digital Forensics, Security and Law, May 19-21, 2010:
- Valli, C., (2010) An Analysis of Malfeasant Activity Directed at a VoIP Honeypot," in 8th Australian Digital Forensics Conference, Duxton Hotel, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2010, pp. 169-174.
- Valli, C. and Al Lawati, M. (2010) "Developing Robust VoIP Router Honeypots Using Device Fingerprints," in The 1st International Cyber Resilience Conference, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2010, pp. 90-96.
- Warren, M., G. Pye, et al. (2010). Australian critical infrastructure protection: A case of two tales. 11th Australian Information Warfare and Security Conference. P. Williams. Duxton Hotel, Perth, Western Australia, secau - Security Research Centre, Edith Cowan University: 30-36.
- Williams, P.A.H. (2010). Improving Medical Information Security using Contextualization Models. In A. Ware (Ed.), Annual International Conference on Infocomm Technologies in Competitive Strategies (ICT 2010), pp65-68. Singapore, Global Science and Technology Forum (GSTF).
- Williams, P.A.H. (2010). Is cyber resilience in medical practice security achievable? In C. Valli (Ed.) Proceedings of the International Cyber Resilience Conference. pp. TBA Perth: Edith Cowan University.
- Williams, P. A. H. (2010) An ill-defined problem – effective biomedical informatics curriculum? In D. Hansen, L. Schaper, & D. Rowlands, (Eds.), Proceedings of the HIC2010 Informing the Business of Health Care, International Conference, pp. 101-108. Health Informatics Society of Australia Ltd, Sydney, Australia.
- Williams, P. A. H. (2010). Medical Information Security: Is it all too hard? In H.R. Arabnia & S. Aissi (Eds.) Proceedings of the 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing – SAM’10 – The 2010 International Conference on Security & Management (2nd edition), pp.TBA. USA: CSREA Press.
- Williams, P.A.H. (2010). Information Warfare: Time for a redefinition. In P.A.H. Williams (Ed.) Proceedings of the 11th Australian Information Warfare and Security Conference, secau - Security Research Centre, Edith Cowan University, Perth, WA.
- Williams, P.A.H., Scott, R, and Paine, D. (2010). An Engaging Leadership Framework (ELF) Project investigating how Gen Y students learn, in ECulture 2011: Educating for Employability. 2010, CLD: Edith Cowan University.
- Woodward, A. and Valli, C. (2010) "Which Organisational Model Meets Best Practice Criterion for Critical Infrastructure Providers: An Examination of The Australian Perspective Based on Case Studies," in The 1st International Cyber Resilience Conference, Perth, Western Australia: secau - Security Research Centre, Edith Cowan University, 2010, pp. 118-125.
2009
- Hannay, P. (2009).Fun and Games an introduction to Console forensics, Presented at WORLDCOMP2009, Security and Management Conference 2009, Las Vegas, 13-17th July, 2009
- Hannay, P. and Woodward, A. (2009) Firewire Forensics, Presented at WORLDCOMP2009, Security and Management Conference 2009, Las Vegas, 13-17th July, 2009
- Szewczyk, P., Furnell, S. (2009). Assessing the Online Security Awareness of Australian Internet Users. Paper presented at the 8th Annual Security Conference, The Orleans, Las Vegas. USA
- Valli, C. (2009). Visualisation of Honeypot data using Graphviz and Afterglow. ADFSL Conference on Digital Forensics, Security and Law, Burlington, Vermont, USA.
- Valli, C. (2009) SCADA Forensics with Snort IDS, Presented at WORLDCOMP2009, Security and Management Conference 2009, Las Vegas, 13-17th July, 2009
- Valli, C. and Woodward, A. (2009) SCADA – Slowly Circling A Disaster Area, Presented at WORLDCOMP2009, Security and Management Conference 2009, Las Vegas, 13-17th July, 2009
- Woodward, A. (2009) Do Current Bittorrent Clients running on Windows 7 beta leave behind meaningful data?, Presented at WORLDCOMP2009, Security and Management Conference 2009, Las Vegas, 13-17th July, 2009
- Bolan, C. (2009). A Spoofing Attack against an EPC Class One RFID System. Paper presented at the 7th Australian Information Security Management Conference Perth, Western Australia.
- Hannay, P., and Bolan, C. (2009). An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations. Paper presented at the 7th Australian Information Security Management Conference Perth, Western Australia.
- Bolan, C., and Hannay, P. (2009). Freegate: A Defence against the Pending Censorship of Australia? Paper presented at the Third International Symposium on Human Aspects of Information Security and Assurance, Piraeus, Greece.
- Corkill, J (2009). Intelligence support to law enforcement – untangling the Gordian knot. Paper presented at the Australian and New Zealand Critical Criminology Conference 2009, Monash University, Melbourne, Victoria.
- Leitch, S. and M. J. Warren (2009). Security Issues Challenging Facebook 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 137-142.
- Li, D. (2009). Firearm Forensics Based on Ballistics Cartridge Case Image Segmentation Using Colour Invariants. 2nd Australian Security and Intelligence Conference. D. Brooks. Kings Hotel, Perth, secau – Security Research Centre: 55-63.
- Limwiriyakul, S. (2009). A Method for Securing Online Community Service: A Study of Selected Western Australian Councils. 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 129 – 136.
- Loo, Y. H. and D. J. Brooks (2009). Terror attacks: Understanding social risk views between Singaporean lay and security practitioners. 2nd Australian Security and Intelligence Conference. D. Brooks. Kings Hotel, Perth, secau – Security Research Centre: 33-40.
- Mahncke, R. J., D. C. McDermid, et al. (2009). Measuring information security governance within general medical practice 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 63-71.
- McDermid, D. C., R. J. Mahncke, et al. (2009). Challenges in Improving Information Security Practice in Australian General Practice 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 1-5.
- Newbould, M. and S. Furnell (2009). Playing Safe: A Prototype Game For Raising Awareness of Social Engineering. 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 24-30.
- Pydayya, K., P. Hannay, et al. (2009). The 2009 Personal Firewall Robustness Evaluation 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre. 98-102.
- Rosewall, I. and M. J. Warren (2009). Information Security Disclosure: A Case Study 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 39-47.
- Sansurooah, K. (2009). A forensics overview and analysis of USB flash memory devices. The 7th Australian Digital Forensics Conference, Kings Hotel, Perth, Western Australia, secau – Security Research Centre, School of Computer and Security Science, Edith Cowan University, Perth, Western Australia.
- Stienne, D. S., N. Clarke, et al. (2009). Strong Authentication for Web Services using Smartcards 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 55-62.
- Swan, G. I. (2009). Energy Security: An Australian Nuclear Power Industry. 2nd Australian Security and Intelligence Conference. D. Brooks. Kings Hotel, Perth, secau – Security Research Centre: 48 -54.
- Szewczyk, P. (2009). ADSL Router Forensics Part 2: Acquiring Evidence. The 7th Australian Digital Forensics Conference, Kings Hotel, Perth, Western Australia, secau – Security Research Centre, School of Computer and Security Science, Edith Cowan University, Perth, Western Australia.
- Talbot, S. and A. Woodward (2009). Improving an Organisations Existing Information Technology Policy to Increase Security 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 120-128.
- Thompson, G. (2009). Automatic detection of child pornography. The 7th Australian Digital Forensics Conference, Kings Hotel, Perth, Western Australia, secau – Security Research Centre, School of Computer and Security Science, Edith Cowan University, Perth, Western Australia.
- Utakrit, N. (2009). A Review of Browser Extensions, a Man-in-the-Browser Phishing Techniques Targeting Bank Customers. 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 110 – 119.
- Valli, C. (2009). The not so smart, smart grid – potential security risks associated with the deployment of smart grid technologies. The 7th Australian Digital Forensics Conference, Kings Hotel, Perth, Western Australia, secau – Security Research Centre, School of Computer and Security Science, Edith Cowan University, Perth, Western Australia.
- Williams, P. A. H. (2009). What Does Security Culture Look Like For Small Organizations? . 7th Australian Information Security Management Conference. C. Bolan. Kings Hotel, Perth, secau – Security Research Centre: 48-54.
- T.Ibrahim, S.M.Furnell, M.Papadaki and N.L.Clarke. 2009. “Assessing the Usability of Personal Internet Security Tools“, Proceedings of the 8th European Conference on Information Warfare and Security (ECIW 2009), Braga, Portugal, 6-7 July 2009.
- B.G.Sanders, P.S.Dowland and S.M.Furnell. 2009. “An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data“, Proceedings of the Third International Symposium on Human Aspects of Information Security and Assurance (HAISA 2009), Athens, Greece, 25-26 June 2009, pp50-60.
- S.Atkinson, S.M.Furnell and A.D.Phippen. 2009. “Risk Culture Influences in Internet Safety and Security“, Proceedings of the Third International Symposium on Human Aspects of Information Security and Assurance (HAISA 2009), Athens, Greece, 25-26 June 2009, pp61-70.
- M.Z.Jali, S.M.Furnell and P.S.Dowland (2009) “Evaluating Web-Based User Authentication using Graphical Techniques“, Proceedings of the Third International Symposium on Human Aspects of Information Security and Assurance (HAISA 2009), Athens, Greece, 25-26 June 2009, pp108-118.
- N.Clarke, S.Karatzouni and S.Furnell.(2009) “Flexible and Transparent User Authentication for Mobile Devices“, Proceedings of the 24th IFIP Information Security Conference (SEC 2009), Paphos, Cyprus, 18-20 May 2009.
- El-Moussa F, Mudhar P, Jones A, (2009) Taxonomy of SIP Attacks and Countermeasures, European Conference on Information Warfare, Portugal
- Lim S Y, Jones A (2009) An Anomaly-based Intrusion Detection Architecture to Secure Wireless Network, Joint Workshop on Information Security 2009 (JWIS2009)
- Jones A, (2009) Why are we not getting better at Data Disposal?, Association of Digital Forensics, Security and Law Annual Conference 2009