Jill Slay Doctor of Philosophy: IT Security. [Citation Graph (0, 0)][DBLP] International Information Security Workshops, 2004, pp:147-152 [Conf]
Gerald Quirchmayr, Jill Slay Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science. [Citation Graph (0, 0)][DBLP] TelE-Learning, 2002, pp:177-184 [Conf]
Jill Slay Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment. [Citation Graph (0, 0)][DBLP] Teleteaching, 1998, pp:921-930 [Conf]
Jill Slay, Gerald Quirchmayr The Role Of Culture In the Development of Global E-Commerce Systems. [Citation Graph (0, 0)][DBLP] Information Systems: The e-Business Challenge, 2002, pp:103-115 [Conf]
Jill Slay Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings. [Citation Graph (0, 0)][DBLP] Educational Technology & Society, 2002, v:5, n:1, pp:- [Journal]
Matthew Simon, Jill Slay Forensic Computing Training, Certification and Accreditation: An Australian Overview. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2007, pp:105-112 [Conf]
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis. [Citation Graph (, )][DBLP]
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. [Citation Graph (, )][DBLP]
Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. [Citation Graph (, )][DBLP]
Recovery of Skype Application Activity Data from Physical Memory. [Citation Graph (, )][DBLP]
A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools. [Citation Graph (, )][DBLP]
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. [Citation Graph (, )][DBLP]
Extracting Evidence Using Google Desktop Search. [Citation Graph (, )][DBLP]
An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management. [Citation Graph (, )][DBLP]
Lessons Learned from the Maroochy Water Breach. [Citation Graph (, )][DBLP]
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.302secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP