Sciweavers

9 search results - page 1 / 2
» ausforensics 2004
Sort
View
AUSFORENSICS
2004
13 years 6 months ago
Tracing E-mail Headers
Marwan Al-Zarouni
AUSFORENSICS
2004
13 years 6 months ago
Towards Identifying Criteria for the Evidential Weight of System Event Logs
Despite the widespread use of computing in almost all functions of contemporary society and the consequently large number of forensic investigations where computing has been invol...
A. Ahmad, Anthonie B. Ruighaver
AUSFORENSICS
2004
13 years 6 months ago
Implementing network defence using deception in a wireless honeypot
The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transm...
Suen Yek
AUSFORENSICS
2004
13 years 6 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli