Part of the Legal Studies Commons
Invited Paper - A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard Annual ADFSL Conference on Digital Forensics, Security and Law
PDF
Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone Annual ADFSL Conference on Digital Forensics, Security and Law
Keynote Speech I, Craig Valli Annual ADFSL Conference on Digital Forensics, Security and Law
Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia, Craig Valli, Andrew Woodward, Peter Hannay Annual ADFSL Conference on Digital Forensics, Security and Law
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity, Craig Valli Annual ADFSL Conference on Digital Forensics, Security and Law
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies Journal of Digital Forensics, Security and Law
Malware Forensics: Discovery of the Intent of Deception, Murray Brand, Craig Valli, Andrew Woodward Journal of Digital Forensics, Security and Law
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity, Craig Valli Journal of Digital Forensics, Security and Law
Visualization of honeypot data using Graphviz and Afterglow, Craig Valli Annual ADFSL Conference on Digital Forensics, Security and Law
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective, Patryk Szewczyk, Craig Valli Journal of Digital Forensics, Security and Law
Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli Journal of Digital Forensics, Security and Law
SiMPLE - Rethinking the Monolithic Approach to Digital Forensic Software, Craig Valli Annual ADFSL Conference on Digital Forensics, Security and Law
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand, Andy Jones, Craig Valli, Iain Sutherland Journal of Digital Forensics, Security and Law
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland Journal of Digital Forensics, Security and Law
Do Current Erasure Programs Remove Evidence of BitTorrent Activity?, Andrew Woodward, Craig Valli Annual ADFSL Conference on Digital Forensics, Security and Law
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt, Craig Valli Journal of Digital Forensics, Security and Law
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas Journal of Digital Forensics, Security and Law
Advanced Search