Author of the publication

The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.

, , , , , and . J. Digit. Forensics Secur. Law, 5 (4): 43-64 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SQL Injection - Threats to Medical Systems: The Issues and Countermeasures.. Security and Management, page 421-425. CSREA Press, (2006)The Insider Threat to Medical Records; Has the Network Age Changed Anything?. Security and Management, page 410-414. CSREA Press, (2006)Honeyd - A OS Fingerprinting Artifice.. Australian Computer, Network & Information Forensics Conference, School of Computer and Information Science, Edith Cowan University, Western Australia, (2003)Wireless Snort - A WIDS in progress.. Australian Computer, Network & Information Forensics Conference, page 112-116. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry., , , , , , and . IEEE Access, (2018)Non-business use of the WWW in three Western Australian organisations.. Internet Res., 14 (5): 353-359 (2004)Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One., , and . IEEE Trans. Inf. Forensics Secur., 12 (7): 1625-1636 (2017)Correction to: A security review of local government using NIST CSF: a case study., , , and . J. Supercomput., 75 (9): 6158 (2019)Digital Forensic Readiness Implementation in SDN: Issues and Challenges., and . CoRR, (2021)Denial of service attack detection through machine learning for the IoT., , , and . J. Inf. Telecommun., 4 (4): 482-503 (2020)