Top of page
Global Site Navigation

ECU Security Research Institute

Local Section Navigation
You are here: Main Content

Refereed Conference Papers

2013

  • Torok, R (2013) The Syrian Calling: Western Jihad recruitment and Martyrdom, The Proceedings of the 4th Australian Counter Terrorism Conference, 12-24, Perth, Western Australia.
  • Bailey, B., Brooks, D., (2013), Breaking The Theft-Chain-Cycle: Property Marking As A Defensive Tool. The Proceedings of the 6th Australian Security and Intelligence Conference, 1-8, ECU.
  • Frohde, K., Brooks, D., (2013), Is emergency management considered a component of business continuity management?. The Proceedings of the 6th Australian Security and Intelligence Conference, 18-27, Perth.
  • Davies, A., Corkill, J., (2013), The contemporary Australian intelligence domain: A multi dimension examination. The Proceedings of 6th Australian Security and Intelligence Conference, 9-17, Perth WA.
  • Corkill, J., Coole, M., (2013), Security, control and deviance: Mapping the security domain and why it matters. Changing the way we think about change: Shifting boundaries, changing lives, 142-149, Hobart, Tasmania.
  • Moss, S., Corkill, J., Gringart, E., (2013), An exploratory study of the lived experience of being an intelligence analyst. The Procecedings of the 6th Australian Security and Intelligence Conference, 40-47, Perth WA.
  • Li, F., Clarke, N., Furnell, S., (2013), A Technology Independent Security Gateway for Real-Time Multimedia Communication. Network and System Security. Lecture Notes in Computer Science, LNCS 7873(3-4 June 2013), 14-25.
  • Li, F., Clarke, N., Furnell, S., Fajardo, JO., Liberal, F., Sidibe, M., (2013), A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS). Proceedings of the fifth international conference on Internet technologies and applications (ITA 13) Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), 299-308, United Kingdom.
  • Clarke, N., Dowland, P., Furnell, S., (2013), E-Invigilator: A biometric-based Supervision System for e-Assessments. 2013 International Conference on Information Society (i-Society), 238-242.
  • Kiszelewska, A., Coole, M., (2013), Physical security barrier selection: A decision support analysis. Proceedings of the 6th Australian Security and Intelligence Conference, 28-39, Perth, Western Australia.
  • Corkill, J., Coole, M., (2013), Security, control and deviance: Mapping the security domain and why it matters. Changing the way we think about change: Shifting boundaries, changing lives, 142-149, Hobart, Tasmania.
  • Cusack, B., Woodward, A., Butson, S., Leber, B., (2013), The effectiveness of Internet activity erasure tools to protect privacy. The Proceedings of the 11th Australian Information Security Management conference, 35-41.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia.
  • Johnstone, M., Woodward, A., (2013), Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference, 102-112, Perth, Western Australia.
  • Peacock, M., Johnstone, M., (2013), TOWARDS DETECTION AND CONTROL OF CIVILIAN UNMANNED AERIAL VEHICLES. The Proceedings of 14th Australian Information Warfare Conference, 9-15, Perth.
  • Thompson, R., Johnstone, M., (2013), Security aspects of military sensor-based defence systems. 2013 IEEE International Conference on Trust, Security and Privacy in Computing and Communication Systems, 302 - 309, Melbourne, Australia, DOI: 10.1109/TrustCom.2013.277.
  • Valli, C., Rabadia, P., Woodward, A., (2013), Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference, 141-149, Edith Cowan University.
  • Blanquart, G., Cook, D., (2013), Twitter Influence and Cumulative Perceptions of Extremist Support: A Case Study of Geert Wilders. The Proceedings of the 4th Australian Counter Terrorism Conference, 1 - 11, Perth, Western Australia.
  • Waugh, B., Abdipanah, M., Hashemi, O., Abdul Rahman, S., Cook, D., (2013), The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process. The Proceedings of the 14th Australian Information Warfare Conference, 28 - 38, Edith Cowan University, Joondalup.
  • Szewczyk, P., Robins, N., Sansurooah, K., (2013), Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference, 135-140, Joondalup, WA.
  • Almulla, S., Iraqi, Y., Jones, A., (2013), Cloud forensics: A research perspective. 2013 9th International Conference on Innovations in Information Technology, IIT 2013, 66-71, DOI: 10.1109/Innovations.2013.6544395.

2012

  • Abdulla Alghafli, K., Jones, A., Martin, TA., (2012), Forensics Data Acquisition Methods for Mobile Phones. 2012 International Conference for Internet Technology and Secured Transactions, 265-269
  • Aked, S., Bolan, C., & Brand, M. (2012). A proposed method for examining wireless device vulnerability to brute force attacks via WPS external registrar PIN authentication design. Paper presented at the World Congress in Computer Science, Computer Engineering, and Applied Computing (Security and Management), Las Vegas, Nevada.
  • Aked, S., C. Bolan and M. Brand (2012). An Investigation Into The Wi-Fi Protected Setup Pin Of The Linksys Wrt160n V2. The 10th Information Security Management Conference. T. Williams, M. Johnstone and C. Valli. Novotel Langley Hotel, Perth, Western Australia, Edith Cowan University, Western Australia.
  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N., (2012), A Response Strategy Model for Intrusion Response Systems. Information Security and Privacy Research, 376(4-6 June 2012), 573-578, Berlin, DOI: 10.1007/978-3-642-30436-1_51.
  • Baek, J., Vu, Q., Jones, A., Al Mulla, S., Yeun, CY., (2012), Smart-Frame: a Flexible, Scalable, and Secure Information Management Framework for Smart Grids. Internet Technology and Secured Transactions, 668-673.
  • Bailey, W J. (2012) Creating A Counter-Insurgency Plan: Elements Required Based Upon A Comparative Analysis Of Research Findings. The 5th Australian Security and Intelligence Conference. Novotel Langley Hotel, Perth, Western Australia, Edith Cowan University, Western Australia, pp 7-14
  • Bolan, C. (2012). Utilising the RFID LOCK command against multiple targets. Paper presented at the World Congress in Computer Science, Computer Engineering, and Applied Computing (Security and Management), Las Vegas, Nevada.
  • Bolan, C. (2012). A Proposed Formula for comparing KILL password effectiveness in single password RFID systems. Paper presented at the secau Security Congress (Information Security Management), Perth, Australia.
  • Bolan, C., & Cotton, H. (2012). User Reaction towards End User License Agreements on Android Smartphones. Paper presented at the World Congress in Computer Science, Computer Engineering, and Applied Computing (Security and Management), Las Vegas, Nevada.
  • Brand, M & Williams, P.A.H. (2012). Mobile Device Management for Personally Controlled Electronic Health Records: Effective Selection of Evaluation Criteria In P.A.H. Williams& L. Coles-Kemp (Eds.) Proceedings of the 1st Australian eHealth Informatics and Security Conference, [In press]. Perth: ECISRI - Security Research Institute, Edith Cowan University.
  • Carpene, C. and A. Woodward (2012). Exposing Potential Privacy Issues With Ipv6 Address Construction The 10th Information Security Management Conference. T. Williams, M. Johnstone and C. Valli. Novotel Langley Hotel, Perth, Western Australia, Edith Cowan University, Western Australia: 44-50.
  • Clarke, N., Katos, V., Menesidou, S., Ghita, B., Furnell, S., (2012), A novel security architecture for a space-data DTN. Wired/Wireless Internet Communication '12 Proceedings of the 10th International Conference on Wired/Wireless Internet Communication, 342-349, Berlin, DOI: 10.1007/978-3-642-30630-3_31.
  • Coles-Kemp, L. & Williams, P.A.H. (2012). Security specialists are from Mars; healthcare practitioners are from Venus: the case for a community-of-practice approach to security architectures for healthcare. In P.A.H. Williams & L.Coles-Kemp (Eds.) Proceedings of the 1st Australian eHealth Informatics and Security Conference, [In press]. Perth: ECISRI - Security Research Institute, Edith Cowan University.
  • Coole, M., Woodward, A., Valli, C. (2012) Understanding The Vulnerabilities In Wi-Fi And The Impact On Its Use In Cctv Systems. The 5th Australian Security and Intelligence Conference. Novotel Langley Hotel, Perth, Western Australia, Edith Cowan University, Western Australia, pp 36-44
  • Coole, M., Corkill, J., Woodward, A., (2012), Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language. The Proceedings of the 5th Australian Security and Intelligence Conference, 27-35, Perth, Western Australia.
  • Corkill, J., & Coole, M. (2012). Security, control and deviance: Mapping the security domain and why it matters. Paper presented at the 6th Annual Australian and New Zealand Critical Criminology Conference, University of Tasmania, Hobart
  • Corkill, J. (2012). Establishing an intelligence led security function. Paper presented at the Mine Site Security Summit Perth.
  • Corkill, J. (2012). Intelligence led crime prevention Paper presented at the International Society of Crime Prevention Professionals Singapore
  • Corkill, J., Brooks, D., Cohen, L., Pooley, J. A., & Ferguson, C. (2012). The development and use of resilience indicators as an aid to National Security personnel vetting. Paper presented at the Defence Human Science Symposium, DSTO, Adelaide.
  • Corkill, J., (2012), Resilience indicators as an aid to personnel vetting: A propositional study. Defence Human Sciences Symposium, Pushing the Boundaries of Human and Organisational Performance, n/a, Mawson Lakes, South Australia.
  • Cusack, B. and A. K. Kyaw (2012). Forensic Readiness For Wireless Medical Systems. The 10th Australian Digital Forensics Conference. A. Woodward and C. Valli. Novotel Langley Hotel, Perth, Western Australia, ECU Security Research Institute, Edith Cowan University pp. 21-32.
  • Cusack, B. and A. Nisbet (2012). Secure Key Deployment And Exchange Protocol For Manet Information Management The 10th Australian Digital Forensics Conference. A. Woodward and C. Valli. Novotel Langley Hotel, Perth, Western Australia, ECU Security Research Institute, Edith Cowan University pp 1-9.
  • Cusack, B. and J. Son (2012). Evidence Examination Tools For Social Networks The 10th Australian Digital Forensics Conference. A. Woodward and C. Valli. Novotel Langley Hotel, Perth, Western Australia, ECU Security Research Institute, Edith Cowan University pp 33-40.
  • Hannay, P., Baatard, G., (2012), The 2011 IDN Homograph Attack Mitigation Survey. Proceedings of the International Conference on Security and Management SAM'12, 653-657.
  • Harris, K. J. (2012). A Model Of Psychological Disengagement The 3rd Australian Counter Terrorism Conference. M. Crowley and C. Valli. Novotel Langley Hotel, Perth, Western Australia, Security Research Institute, Edith Cowan University, Perth, Western Australia pp 1-8.
  • Harris, K. J. (2012). Commitment And The 1% Motorcycle Club: Threats To The Brotherhood. The 3rd Australian Counter Terrorism Conference. M. Crowley and C. Valli. Novotel Langley Hotel, Perth, Western Australia, Security Research Institute, Edith Cowan University, Perth, Western Australia pp24-29.
  • James, P. and D. Griffiths (2012). The Mobile Execution Environment: A Secure And Non-Intrusive Approach To Implement A Bring Your Own Device Policy For Laptops The 10th Information Security Management Conference. T. Williams, M. Johnstone and C. Valli. Novotel Langley Hotel, Perth, Western Australia, Edith Cowan University, Western Australia: 100-109.
  • Johnstone, M.N. (2012). ‘Cloud security: A case study in telemedicine. Pages 42-48 of: Williams, T. and Valli, C. (eds), The 1st Australian eHealth Informatics and Security Conference. Perth, Australia.
  • Johnstone, M.N. and Woodward, A. (2012). ‘Towards Effective Algorithms for Intelligent Defense Systems'. Pages 498-508 of: Yang Xiang, Javier Lopez, C.-C. Jay Kuo, and Wanlei Zhou, (eds), The 4th International Symposium on Cyberspace Safety and Security (CSS 2012). Melbourne, Australia.
  • Jones, A., T. Martin and M. Alzaabi (2012). The 2012 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The UAE The 10th Australian Digital Forensics Conference. A. Woodward and C. Valli. Novotel Langley Hotel, Perth, Western Australia, ECU Security Research Institute, Edith Cowan University pp 47-53.
  • Mahncke, R.J. & Williams, P.A.H. (2012). Developing governance capability to improve information security resilience in healthcare. . In P.A.H. Williams & L..Coles-Kemp (Eds.) Proceedings of the 1st Australian eHealth Informatics and Security Conference, [In press]. Perth: ECISRI - Security Research Institute, Edith Cowan University.
  • Saevanee, H., Clarke, N., Furnell, S., (2012), Multi-modal behavioural biometric authentication for mobile devices. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 Proceedings, 376 (June 2012), 465-474, DOI: 10.1007/978-3-642-30436-1_38.
  • Saevanee, H., Clarke, N., Furnell, S., (2012), Multimodal behavioural biometric authentication for mobile devices. Information Security and Privacy Research, 376(4-6 June 2012), 465-474, Berlin, DOI: 10.1007/978-3-642-30436-1_38.
  • Sansurooah, K. and P. Szewczyk (2012). A Study Of Remnant Data Found On Usb Storage Devices Offered For Sale On The Australian Second Hand Market In 2011. The 10th Information Security Management Conference. T. Williams, M. Johnstone and C. Valli. Novotel Langley Hotel, Perth, Western Australia, Edith Cowan University, Western Australia.
  • Sansurooah, K., (2012), An Overview of Cloud Computing Challenges and Its Security Concerns. Proceedings of the International Conference on Security and Management SAM'12, 613-620, USA
  • Smith, T., Cook, D., (2012), Regulations for Retail Remittances: Compliance Entropy in Store-Front Transfers. e-Proceedings of the 5th International Conference on Financial Criminology (ICFC) 2013, 10-23, Universiti Teknologi Mara, Shah Alam Malaysia
  • Sutherland, I., Xynos, K., Jones, A., Blyth, A., (2012), Protective Emblems in Cyber Warfare. The Proceedings of the 13th Australian Information Warfare Conference, 10-16, Perth, Australia.
  • Szewczyk, P. and K. Sansurooah (2012). The 2012 Investigation Into Remnant Data On Second Hand Memory Cards Sold In Australia The 10th Australian Digital Forensics Conference. A. Woodward and C. Valli. Novotel Langley Hotel, Perth, Western Australia, ECU Security Research Institute, Edith Cowan University pp41-46.
  • Taleb-Bendiab, A. (2012). Experimenting With Anomaly Detection By Mining Large-Scale Information Networks. The 10th Information Security Management Conference.
  • Torok, R. (2012). Al-Jihad Fi Sabilillah: In The Heart Of Green Birds. The 3rd Australian Counter Terrorism Conference. M. Crowley and C. Valli. Novotel Langley Hotel, Perth, Western Australia, Security Research Institute, Edith Cowan University, Perth, Western Australia
  • Valli, C., Carpene, A.W., Hannay, P., Brand, M., Karvinen, R., and Holme, C. (2012). Eavesdropping On The Smart Grid The 10th Australian Digital Forensics Conference. A. Woodward and C. Valli. Novotel Langley Hotel, Perth, Western Australia, ECU Security Research Institute, Edith Cowan University pp54-60.
  • Valli, C. (2012) SSH -- Somewhat Secure Host, 4th International Symposium on Cyberspace Safety and Security , CSS 2012, Springer, Melbourne, Australia pp. 227-235
  • Williams, P.A.H., Gaunt, S., Grieve, G., McCauley, V., and Leslie, H. (2012). The Development of a National Approach to CDA: Successes, Challenges, and Lessons Learned from Australia. In B. Blobel, and R. Stegwee Eds) Standard and Solutions for ehealth Interoperability Special Issue of the European Journal of Biomedical Informatics, 8(3), 35-44.
  • Williams, P.A.H. (2012). Exclusivity or co-dependency: How information security is integral to data governance. Data Governance Conference, Health Informatics Society of Australia.

For Refereed Conference Papers prior to 2012 please refer to our download Refereed Conference Papers (2009-2013).

Skip to top of page