Suen Yek Implementing network defence using deception in a wireless honeypot. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:4-15 [Conf]
Marwan Al-Zarouni Tracing E-mail Headers. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:16-30 [Conf]
A. Ahmad, Anthonie B. Ruighaver Towards Identifying Criteria for the Evidential Weight of System Event Logs. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:40-47 [Conf]
Sue Webb Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:48-56 [Conf]
Christian Frichot An Analysis and Comparison of Clustered Password Crackers. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:57-65 [Conf]
Christian Frichot An Analysis of the Integrity of Palm Images Acquired with PDD. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:66-75 [Conf]
Chris Hu A Preliminary Examination of Tool Markings on Flash Memory Cards. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:83-93 [Conf]
Mathew Hannan, Barry Blundell Electronic Crime - its not only the big end of town that should be worried. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:94-102 [Conf]
Mathew Hannan To Revisit: What is Forensic Computing? [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:103-111 [Conf]
Craig Valli Wireless Snort - A WIDS in progress. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:112-116 [Conf]
Suen Yek, Chris Bolan An analysis of security in 802.11b and 802.11g wireless networks in Perth, WA. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:117-124 [Conf]
Craig Valli Throwing out the Enterprise with the Hard Disk. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:124-129 [Conf]
Andrew Woodward The risks, costs and possible solutions involved in setting up and running wireless local area networks. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:130-135 [Conf]