The SCEAS System
Navigation Menu

Conferences in DBLP

(ausforensics)
2004 (conf/ausforensics/2004)

  1. Suen Yek
    Implementing network defence using deception in a wireless honeypot. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:4-15 [Conf]
  2. Marwan Al-Zarouni
    Tracing E-mail Headers. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:16-30 [Conf]
  3. Hyun-Sang Kim, Sang-Jin Lee, Jong-in Lim
    Digitalevidence Integrated Management System. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:31-39 [Conf]
  4. A. Ahmad, Anthonie B. Ruighaver
    Towards Identifying Criteria for the Evidential Weight of System Event Logs. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:40-47 [Conf]
  5. Sue Webb
    Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:48-56 [Conf]
  6. Christian Frichot
    An Analysis and Comparison of Clustered Password Crackers. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:57-65 [Conf]
  7. Christian Frichot
    An Analysis of the Integrity of Palm Images Acquired with PDD. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:66-75 [Conf]
  8. Justin D. Pierce, Matthew J. Warren, David R. Mackay, Jason G. Wells
    Graphical Authentication: An Architectural Design Specification. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:76-82 [Conf]
  9. Chris Hu
    A Preliminary Examination of Tool Markings on Flash Memory Cards. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:83-93 [Conf]
  10. Mathew Hannan, Barry Blundell
    Electronic Crime - its not only the big end of town that should be worried. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:94-102 [Conf]
  11. Mathew Hannan
    To Revisit: What is Forensic Computing? [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:103-111 [Conf]
  12. Craig Valli
    Wireless Snort - A WIDS in progress. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:112-116 [Conf]
  13. Suen Yek, Chris Bolan
    An analysis of security in 802.11b and 802.11g wireless networks in Perth, WA. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:117-124 [Conf]
  14. Craig Valli
    Throwing out the Enterprise with the Hard Disk. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:124-129 [Conf]
  15. Andrew Woodward
    The risks, costs and possible solutions involved in setting up and running wireless local area networks. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:130-135 [Conf]
  16. Bradley Schatz, George M. Mohay, Andrew Clark
    Generalising Event Forensics Across Multiple Domains. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:136-144 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002