590 Works

Leading hackers down the garden path

Suen Yek
4th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 4th 2006.

Data recovery from PalmmsgV001

Satheesaan Pasupatheeswaran

Subverting National Internet Censorship - An Investigation into existing Tools and Techniques

Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay & Christopher Bolan
6th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 3rd 2008.

Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime

Fahmid Imtiaz
4th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 4th 2006.

A Fuzzy Approach For Detecting Anomalous Behaviour in E-mail Traffic

Mark JynHuey Lim, Michael Negnevitsky & Jacky Hartnett
4th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 4th 2006.

Forensic Analysis of the Contents of Nokia Mobile Phones

B. Williamson, P. Apeldoorn, B. Cheam & M. McDonald
4th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 4th 2006.

Improving forensic software tool performance in detecting fraud for financial statements

Brian Cusack & Tau’aho Ahokovi
The use of computer forensics is important for forensic accounting practice because most accounting information is in digital forms today. The access to evidence is increasingly more complex and in far greater volumes than in previous decades. The effective and efficient means of detecting fraud are required for the public to maintain their confidence in the reliability of accounting audit and the reputation of accounting firms. The software tools used by forensic accounting can be...

Understanding and combatting terrorist networks: Coupling social media mining with social network analysis

Benn Van Den Ende
Throughout the past decade the methods employed by terrorist organisations have changed drastically. One of these key changes has been associated with the rise of social media such as Facebook, Twitter, YouTube and blogging in general. Terrorist organisations appear to be using the wide reach and vast network capabilities created by social media to disseminate propaganda, radicalise susceptible individuals, recruit potential fighters and communicate strategic and operational objectives. However, this growing terrorist presence on Social...

Accelerating NTRUEncrypt for in-browser cryptography utilising graphical processing units and WebGL

Dajne Win, Seth Hall & Alastair Nisbet
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is vital to find faster methods to accelerate modern encryption algorithms to keep performance high whilst also preserving information security. Users often do not want to wait for applications to become responsive, applications on limited devices such as mobiles often compromise security in order to keep execution times quick. Often they use algorithms and key sizes which are not considered...

Impact Of Mooring Activities On Carbon Stocks In Seagrass Meadows [dataset]

Oscar Serrano, , Paul S. Lavery, Gary A. Kendrick, Sharyn Hinkey, Pere Masque, Arianne Arias-Ortiz, Andy Steven & Carlos M. Duarte
The database compiles published data (in Serrano et al. 2016, Scientific Reports, in press) on biogeochemical characteristics (density, organic carbon, calcium carbonate, stable carbon isotopes and sediment grain size) of sediments underneath seagrass meadows and adjacent un-vegetated patches after mooring disturbances in Rottnest Island (Perth, Western Australia). The dataset compiles data on biogeochemical sediment characteristics for a total of 16 cores, 50 cm-long (4 cores from seagrass meadows and 4 cores from adjacent bare sediments...

Variability in the carbon storage of seagrass habitats and its implications for global estimates of Blue Carbon ecosystem service [dataset]

Paul S. Lavery, Miguel Angel Mateo, Oscar Serrano & Mohammad Rozaimi
The database compiles published data (in Lavery et al. 2013, PLoS ONE 8(9): e73748. doi:10.1371/journal.pone.0073748) on biogeochemical variables (organic matter, organic carbon and CO3 contents, and stable carbon isotope signatures of the organic carbon) in sediment core from seagrass meadows in Australia. The cores studied were up to 29 cm long, and ecompass tropical, subtropical and temperate seagrass meadows in intertidal and subtidal habitats. Enquiries about the dataset may be sent to Paul Lavery p.lavery@ecu.edu.au.

Can Mud (Silt and Clay) Concentration Be Used To Predict Soil Organic Carbon Content Within Seagrass Ecosystems? [dataset]

Oscar Serrano, Paul S. Lavery, Carlos M. Duarte, Gary A. Kendrick, Antoni Calafat, Paul York, Andy Steven & Peter Macreadie
The database compiles published data (in Serrano et al. 2016, Biogeosciences, doi:10.5194/bg-2015-598) on biogeochemical characteristics (%organic carbon, stable carbon isotopes and mud content) of sediments underneath seagrass meadows and bare sediments in Australia and Spain. Details on habitat characteristics (latitude/longitude, water depth, seagrass species and geomorphology) and sediment depth are also provided for each location studied. The data set includes 1345 data entries from 100 sediment cores, encompassing 10 seagrass species in estuarine and coastal...

Community Building, Multiculturalism and the Suburban Public Library: Community, Cohesion and Sustainability. Qualitative Data From Interviews on Western Australian Migrants' Information Needs & Quantitative Web Survey Data On Service Provision At Australian Public Libraries, 2011-2012

Rajeswari Chelliah
This dataset consists of 3 files: File 1: Qualitative data enclosed in Microsoft Excel file. Data collection includes one to one interviews with Western Australian migrants. Content analysis: interview utterances were analysed for content, classified into categories, and coded and entered in Microsoft Excel file columns. File 2: Qualitative data enclosed in Microsoft Word file. Data collection includes one to one interviews with Western Australian migrants. Content analysis: interview utterances were analysed for content, classified...

An exploration of 1st and 2nd generation CPTED for end of year school leavers at Rottnest Island

John Letch, Ellice McGlinn, Johnathon Bell, Emma Downing & David Cook
Australian Security and Intelligence Conference

Forensic Analysis Avoidance Techniques of Malware

Murray Brand
5th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 3rd 2007.

ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence

Patryk Szewczyk
5th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 3rd 2007.

An examination of the Asus WL-HDD 2.5 as a Nepenthes malware collector

Patryk Szewczyk
5th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 3rd 2007.

Avoiding Sanctions at the E-Discovery Meet-And-Confer in Common Law Countries

Milton Luoma & Vicki Luoma
8th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, November 30th 2010

An Analysis of Malfeasant Activity Directed at a VoIP Honeypot

Craig Valli
8th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, November 30th 2010

Guidelines for the digital forensic processing of smartphones

Khawla Abdulla Alghafli, Andrew Jones & Thomas Anthony Martin
9th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, 5th -7th December 2011

Component technologies for e-discovery and prototyping of suit-coping system

& Dowon Hong
9th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, 5th -7th December 2011

Can current packet analysis software detect BitTorrent activity or extract files from BTP and μTP traffic streams?

William Pung & Andrew Woodward
9th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, 5th -7th December 2011

The Syrian Calling: Western Jihad Recruitment and Martyrdom

Robyn Torok
4th Australian Counter Terrorism Conference, Edith Cowan University, Perth, Western Australia, 2nd-4th December, 2013

Intelligent buildings: an investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology

David Brooks
Australian Security and Intelligence Conference

Terrorism as Opiniotainment: Perceptions Warriors and the Public Battlefield

Luke Howie
Proceedings of 7th Australian Information Warfare and Security Conference

Registration Year

  • 2021
    7
  • 2020
    16
  • 2019
    16
  • 2018
    27
  • 2017
    24
  • 2016
    500

Resource Types

  • Text
    555
  • Dataset
    31
  • Other
    1

Affiliations

  • Edith Cowan University
    9
  • CSIRO Ocean and Atmosphere
    1
  • UNSW Sydney
    1
  • Sydney Institute of Marine Science
    1