Andrew Woodward Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. [Citation Graph (0, 0)][DBLP] AISM, 2005, pp:133-140 [Conf]
Andrew Woodward The risks, costs and possible solutions involved in setting up and running wireless local area networks. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2004, pp:130-135 [Conf]
Andrew Woodward The effectiveness of commercial erasure programs on BitTorrent activity. [Citation Graph (0, 0)][DBLP] Australian Computer, Network & Information Forensics Conference, 2005, pp:108-114 [Conf]
Andrew Woodward Data Security and wireless networks: mutually exclusive? [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:404-409 [Conf]
Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry. [Citation Graph (, )][DBLP]
Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP. [Citation Graph (, )][DBLP]
Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice. [Citation Graph (, )][DBLP]
What Artifacts do Current BitTorrent Clients Leave Behind?. [Citation Graph (, )][DBLP]
Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims. [Citation Graph (, )][DBLP]
Firewire Forensics in Modern Operating Systems. [Citation Graph (, )][DBLP]
Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data? [Citation Graph (, )][DBLP]