Sciweavers

AUSFORENSICS
2003
13 years 5 months ago
Testing the Date Maintenance of the File Allocation Table File System
The directory entries used in the File Allocation Table filesystems maintain a significant amount of file metadata that is of interest to a forensic examiner. This information is ...
Tom Waghorn
AUSFORENSICS
2003
13 years 5 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli
AUSFORENSICS
2003
13 years 5 months ago
Incident Management and Incident Response: The Case of Sweden
This paper reports from an ongoing field study of police practice in Sweden. The field study consists of direct observations and conversational interviews. The paper discusses cur...
Urban Nuldén
AUSFORENSICS
2003
13 years 5 months ago
ECF - Event Correlation for Forensics
The focus of the research described in this paper is on the nature of the event information provided in commonly available computer and other logs and the extent to which it is po...
George M. Mohay, Kevin Chen, Andrew Clark
AUSFORENSICS
2003
13 years 5 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
AUSFORENSICS
2003
13 years 5 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
AUSFORENSICS
2004
13 years 6 months ago
Implementing network defence using deception in a wireless honeypot
The advance of 802.11b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transm...
Suen Yek
AUSFORENSICS
2004
13 years 6 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli