Sciweavers

AUSFORENSICS
2003
13 years 8 months ago
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Sue Webb
AUSFORENSICS
2003
13 years 8 months ago
Testing the Date Maintenance of the File Allocation Table File System
The directory entries used in the File Allocation Table filesystems maintain a significant amount of file metadata that is of interest to a forensic examiner. This information is ...
Tom Waghorn
AUSFORENSICS
2003
13 years 8 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli
AUSFORENSICS
2003
13 years 8 months ago
Incident Management and Incident Response: The Case of Sweden
This paper reports from an ongoing field study of police practice in Sweden. The field study consists of direct observations and conversational interviews. The paper discusses cur...
Urban Nuldén
AUSFORENSICS
2003
13 years 8 months ago
ECF - Event Correlation for Forensics
The focus of the research described in this paper is on the nature of the event information provided in commonly available computer and other logs and the extent to which it is po...
George M. Mohay, Kevin Chen, Andrew Clark
AUSFORENSICS
2003
13 years 8 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
AUSFORENSICS
2003
13 years 8 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver