The SCEAS System
Navigation Menu

Search the dblp DataBase


Jill Slay: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Phillip Pudney, Jill Slay
    An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:29-39 [Conf]
  2. Yi-Chi Lin, Jill Slay
    Non-Repudiation in Pure Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:59-66 [Conf]
  3. Jill Slay, Gerald Quirchmayr
    A Formal Model for the Relationship between Culture and Trust within is Security Management. [Citation Graph (0, 0)][DBLP]
    AISM, 2004, pp:159-166 [Conf]
  4. Benjamin Turnbull, Barry Blundell, Jill Slay
    Googling Forensics. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2005, pp:62-67 [Conf]
  5. Gerald Quirchmayr, Jill Slay
    Identifying Emerging Web-Communication Patterns Between Government and Citizens. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:419-422 [Conf]
  6. Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin Turnbull, Tom Wilsdon
    Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:39-46 [Conf]
  7. Tom Wilsdon, Jill Slay
    Towards A Validation Framework for Forensic Computing Tools in Australia. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:409-414 [Conf]
  8. Jill Slay, Andrew Przibilla
    iPod Forensics: Forensically Sound Examination of an Apple iPod. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:267- [Conf]
  9. Jason Beckett, Jill Slay
    Digital Forensics: Validation and Verification in a Dynamic Work Environment. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:266- [Conf]
  10. Benjamin Turnbull, Jill Slay
    Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:267- [Conf]
  11. Jill Slay, Kris Jorgensen
    Applying Filter Clusters to Reduce Search State Space. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:295-301 [Conf]
  12. Jill Slay
    Doctor of Philosophy: IT Security. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:147-152 [Conf]
  13. Gerald Quirchmayr, Jill Slay
    Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science. [Citation Graph (0, 0)][DBLP]
    TelE-Learning, 2002, pp:177-184 [Conf]
  14. Jill Slay
    Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment. [Citation Graph (0, 0)][DBLP]
    Teleteaching, 1998, pp:921-930 [Conf]
  15. Jill Slay, Gerald Quirchmayr
    The Role Of Culture In the Development of Global E-Commerce Systems. [Citation Graph (0, 0)][DBLP]
    Information Systems: The e-Business Challenge, 2002, pp:103-115 [Conf]
  16. Tom Wilsdon, Jill Slay
    Digital Forensics: Exploring Validation, Verification and Certification. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:48-55 [Conf]
  17. Jill Slay
    Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings. [Citation Graph (0, 0)][DBLP]
    Educational Technology & Society, 2002, v:5, n:1, pp:- [Journal]
  18. Matthew Simon, Jill Slay
    Forensic Computing Training, Certification and Accreditation: An Australian Overview. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:105-112 [Conf]

  19. Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. [Citation Graph (, )][DBLP]

  20. Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. [Citation Graph (, )][DBLP]

  21. Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. [Citation Graph (, )][DBLP]

  22. Recovery of Skype Application Activity Data from Physical Memory. [Citation Graph (, )][DBLP]

  23. A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools. [Citation Graph (, )][DBLP]

  24. The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. [Citation Graph (, )][DBLP]

  25. Extracting Evidence Using Google Desktop Search. [Citation Graph (, )][DBLP]

  26. Computer Forensics and Culture. [Citation Graph (, )][DBLP]

  27. An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management. [Citation Graph (, )][DBLP]

  28. Lessons Learned from the Maroochy Water Breach. [Citation Graph (, )][DBLP]

  29. The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. [Citation Graph (, )][DBLP]

Search in 0.530secs, Finished in 0.532secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002