The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew Woodward: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Woodward
    Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. [Citation Graph (0, 0)][DBLP]
    AISM, 2005, pp:133-140 [Conf]
  2. Craig Valli, Andrew Woodward, Ken Wild, Reino Karvinen
    An investigation into long range detection of passive UHF RFID tags. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2005, pp:84-86 [Conf]
  3. Andrew Woodward
    The risks, costs and possible solutions involved in setting up and running wireless local area networks. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2004, pp:130-135 [Conf]
  4. Andrew Woodward
    The effectiveness of commercial erasure programs on BitTorrent activity. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2005, pp:108-114 [Conf]
  5. Andrew Woodward
    Data Security and wireless networks: mutually exclusive? [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:404-409 [Conf]

  6. Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry. [Citation Graph (, )][DBLP]


  7. Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP. [Citation Graph (, )][DBLP]


  8. Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice. [Citation Graph (, )][DBLP]


  9. What Artifacts do Current BitTorrent Clients Leave Behind?. [Citation Graph (, )][DBLP]


  10. Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims. [Citation Graph (, )][DBLP]


  11. Firewire Forensics in Modern Operating Systems. [Citation Graph (, )][DBLP]


  12. Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data? [Citation Graph (, )][DBLP]


  13. SCADA Security - Slowly Circling a Disaster Area. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002