Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization | 0 | 0.34 | 2022 |
Biometrics For Internet-Of-Things Security: A Review | 2 | 0.38 | 2021 |
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness. | 1 | 0.48 | 2021 |
Denial of service attack detection through machine learning for the IoT. | 2 | 0.39 | 2020 |
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. | 0 | 0.34 | 2019 |
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision Diagram | 4 | 0.36 | 2019 |
A Privacy-Preserving Lightweight Biometric System for Internet of Things Security | 0 | 0.34 | 2019 |
Finger-to-Heart(F2H): Authentication for Wireless Implantable Medical Devices. | 3 | 0.37 | 2019 |
Correction to: A security review of local government using NIST CSF: a case study. | 0 | 0.34 | 2019 |
Security and Accuracy of Fingerprint-Based Biometrics: A Review. | 4 | 0.39 | 2019 |
A security review of local government using NIST CSF: a case study. | 0 | 0.34 | 2018 |
Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. | 0 | 0.34 | 2018 |
A fingerprint and finger-vein based cancelable multi-biometric system. | 11 | 0.58 | 2018 |
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem. | 1 | 0.37 | 2018 |
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures. | 2 | 0.35 | 2018 |
POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia | 0 | 0.34 | 2018 |
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments | 0 | 0.34 | 2017 |
Security Issues With Bacnet Value Handling | 1 | 0.48 | 2017 |
An Exploration of Some Security Issues Within the BACnet Protocol. | 0 | 0.34 | 2017 |
Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. | 2 | 0.49 | 2017 |
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices | 0 | 0.34 | 2017 |
Future challenges for smart cities: Cyber-security and digital forensics. | 0 | 0.34 | 2017 |
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. | 0 | 0.34 | 2017 |
On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers | 3 | 0.51 | 2016 |
Service Set Identifier Geolocation For Forensic Purposes: Opportunities And Challenges | 1 | 0.43 | 2016 |
The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues | 0 | 0.34 | 2012 |
SSH: somewhat secure host | 1 | 0.43 | 2012 |
Geotagging Where Cyberspace Comes to Your Place | 8 | 0.76 | 2010 |
Developing VoIP Router Honeypots | 0 | 0.34 | 2010 |
Malware Forensics: Discovery of the Intent of Deception. | 7 | 0.87 | 2010 |
Ignorant Experts: Computer and Network Security Support from Internet Service Providers | 1 | 0.37 | 2010 |
SCADA Security - Slowly Circling a Disaster Area | 0 | 0.34 | 2009 |
Snort IDS for SCADA Networks | 2 | 0.39 | 2009 |
A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans | 1 | 0.39 | 2008 |
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market. | 0 | 0.34 | 2008 |
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. | 5 | 1.14 | 2008 |
IT Sharps: Issues Relating to Securely Disposing of Hard Disks from Medical Information Systems | 0 | 0.34 | 2007 |
Honeypot technologies and their applicability as a strategic internal countermeasure. | 4 | 0.55 | 2007 |
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients. | 0 | 0.34 | 2006 |
The Insider Threat to Medical Records; Has the Network Age Changed Anything? | 1 | 0.37 | 2006 |
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures | 0 | 0.34 | 2006 |
Honeypot technologies and their applicability as an internal countermeasure | 0 | 0.34 | 2005 |
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices | 0 | 0.34 | 2005 |
An investigation into long range detection of passive UHF RFID tags | 0 | 0.34 | 2005 |
Proceedings of 3rd Australian Computer, Network & Information Forensics Conference, 2005, Perth, Western Australia | 15 | 3.24 | 2005 |
An investigation into the efficiency of forensic erasure tools for hard disk mechanisms | 2 | 0.59 | 2005 |
A UK and Australian Study of Hard Disk Disposal | 2 | 0.50 | 2005 |
After Conversation - An Forensic ICQ Logfile Extraction Tool | 0 | 0.34 | 2005 |
Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005 | 18 | 3.22 | 2005 |
802.11b Wireless Networks Insecure at Any Speed | 2 | 0.83 | 2004 |