Cyberforensics 2014 Conference | |||||||
Authors | Title | File | Size | ||||
---|---|---|---|---|---|---|---|
Lynsay A. Shepherd, Jacqueline Archibald and R. Ian Ferguson | Reducing Risky Security Behaviours: Utilising Affective Feedback To Educate Users | 1_shepherd.pdf | 479 K | ||||
Fathiya Al Izki and George Weir | Information Security and Digital Divide in the Arab World | 2_alizki_weir.pdf | 584 K | ||||
Richard Connor, Stewart MacKenzie-Leigh and George Weir | The Forensic Detection of Very Similar Images | ||||||
Michelle Govan and Kenneth Ovens | Temporal Analysis Anomalies with iOS iMessage Communication Exchange | 4_govan_ovans.pdf | 494 K | ||||
Ethan Bayne, Ian Ferguson and John Isaacs | OpenCL Acceleration of Digital Forensic Methods | 5_bayne.pdf | 1,402 K | ||||
James Sutherland, Natalie Coull and Allan MacLeod | CPU covert channel accessible from Javascript | 6_sutherland.pdf | 454 K | ||||
Diane Gan and Gary Kelly | Analysis of Attacks Using a Honeypot | 7_kelly_gan.pdf | 285 K | ||||
Najla Etaher and George Weir | Understanding the Threat of Banking Malware | 8_etaher_weir.pdf | 404 K | ||||
Kyriakos Sergiou and Ameer-Al-Nemrat | Investigations in Black-box Penetration Techniques on Wireless Networks - Gathering Digital Evidence against Cyber-Intrusions | 9_sergiou_etal.pdf | 913 K | ||||
Katherine Darroch and George R S Weir | Measuring Sexually Explicit Content | 10_darroch_weir.pdf | 851 K | ||||
Andrew Gill | Automated Net Flow Heuristic Signature Production | 11_gill.pdf | 1,845 K |
Example citation: L. A. Shepherd et. al., Reducing Risky Security Behaviours: Utilising Affective Feedback To Educate Users, Proceedings of Cyberforensics 2014, University of Strathclyde, Glasgow, pp7-14, 2014.