Author of the publication

Service Set Identifier Geolocation for Forensic Purposes: Opportunities and Challenges.

, , and . HICSS, page 5487-5496. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices.. ECIW, page 363-368. Academic Conferences Limited, Reading, UK, (2005)A security review of local government using NIST CSF: a case study., , , and . J. Supercomput., 74 (10): 5171-5186 (2018)Honeypot technologies and their applicability as a strategic internal countermeasure.. Int. J. Inf. Comput. Secur., 1 (4): 430-436 (2007)Ignorant Experts: Computer and Network Security Support from Internet Service Providers., and . NSS, page 323-327. IEEE Computer Society, (2010)Throwing out the Enterprise with the Hard Disk.. Australian Computer, Network & Information Forensics Conference, page 124-129. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)SSH - Somewhat Secure Host.. CSS, volume 7672 of Lecture Notes in Computer Science, page 227-235. Springer, (2012)Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective., and . J. Digit. Forensics Secur. Law, 4 (3): 5-16 (2009)SQL Injection - Threats to Medical Systems: The Issues and Countermeasures.. Security and Management, page 421-425. CSREA Press, (2006)The Insider Threat to Medical Records; Has the Network Age Changed Anything?. Security and Management, page 410-414. CSREA Press, (2006)Honeyd - A OS Fingerprinting Artifice.. Australian Computer, Network & Information Forensics Conference, School of Computer and Information Science, Edith Cowan University, Western Australia, (2003)