Cyberforensics 2014: Papers

Cyberforensics 2014 Conference
Files: 11    Size: 8,234 K
AuthorsTitleFileSize
Lynsay A. Shepherd, Jacqueline Archibald and R. Ian FergusonReducing Risky Security Behaviours: Utilising Affective Feedback To Educate Users1_shepherd.pdf479 K
Fathiya Al Izki and George WeirInformation Security and Digital Divide in the Arab World2_alizki_weir.pdf584 K
Richard Connor, Stewart MacKenzie-Leigh and George WeirThe Forensic Detection of Very Similar Images
Michelle Govan and Kenneth OvensTemporal Analysis Anomalies with iOS iMessage Communication Exchange4_govan_ovans.pdf494 K
Ethan Bayne, Ian Ferguson and John IsaacsOpenCL Acceleration of Digital Forensic Methods5_bayne.pdf1,402 K
James Sutherland, Natalie Coull and Allan MacLeodCPU covert channel accessible from Javascript6_sutherland.pdf454 K
Diane Gan and Gary KellyAnalysis of Attacks Using a Honeypot7_kelly_gan.pdf285 K
Najla Etaher and George WeirUnderstanding the Threat of Banking Malware8_etaher_weir.pdf404 K
Kyriakos Sergiou and Ameer-Al-NemratInvestigations in Black-box Penetration Techniques on Wireless Networks - Gathering Digital Evidence against Cyber-Intrusions9_sergiou_etal.pdf913 K
Katherine Darroch and George R S WeirMeasuring Sexually Explicit Content10_darroch_weir.pdf851 K
Andrew GillAutomated Net Flow Heuristic Signature Production11_gill.pdf1,845 K

Example citation: L. A. Shepherd et. al., Reducing Risky Security Behaviours: Utilising Affective Feedback To Educate Users, Proceedings of Cyberforensics 2014, University of Strathclyde, Glasgow, pp7-14, 2014.