Author of the publication

Firewire Forensics in Modern Operating Systems.

, and . Security and Management, page 635-638. CSREA Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Firewire Forensics in Modern Operating Systems., and . Security and Management, page 635-638. CSREA Press, (2009)The risks, costs and possible solutions involved in setting up and running wireless local area networks.. Australian Computer, Network & Information Forensics Conference, page 130-135. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)A Model of Fluid-Structure and Biochemical Interactions with Applications to Subclinical Leaflet Thrombosis., , , , , , , and . CoRR, (2022)What Artifacts do Current BitTorrent Clients Leave Behind?.. Security and Management, page 608-613. CSREA Press, (2008)A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs., and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 115-127. Springer, (2016)Towards Effective Algorithms for Intelligent Defense Systems., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 498-508. Springer, (2012)The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues, and . CoRR, (2012)Internet of Things Forensics: The Need, Process Models, and Open Issues., , , and . IT Prof., 20 (3): 40-49 (2018)Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?. Security and Management, page 622-617. CSREA Press, (2009)SCADA Security - Slowly Circling a Disaster Area., and . Security and Management, page 613-617. CSREA Press, (2009)