Search - IFIP Open Digital Library Access content directly

Filter your results

11 results
Structure: Internal structure identifier : 116321
Image document

Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails

Kathryn Parsons , Agata Mccormac , Malcolm Pattinson , Marcus Butavicius , Cate Jerram
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.366-378, ⟨10.1007/978-3-642-39218-4_27⟩
Conference papers hal-01463838v1
Image document

Extracting Evidence Related to VoIP Calls

David Irwin , Jill Slay
7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.221-228, ⟨10.1007/978-3-642-24212-0_17⟩
Conference papers hal-01569552v1
Image document

A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario

Kristian Beckers , Stefan Hofbauer , Gerald Quirchmayr , Christopher C. Wills
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.224-239
Conference papers hal-01506775v1

Multidisciplinary Research and Practice for Information Systems

Gerald Quirchmayr , Josef Basl , Ilsun You , Lida Xu , Edgar Weippl
Springer, LNCS-7465, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32498-7⟩
Books hal-01542459v1
Image document

Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks

Suhaila Ismail , Elena Sitnikova , Jill Slay
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.242-249, ⟨10.1007/978-3-642-55415-5_20⟩
Conference papers hal-01370370v1
Image document

Visualizing Information in Digital Forensics

Grant Osborne , Hannah Thinyane , Jill Slay
8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.35-47, ⟨10.1007/978-3-642-33962-2_3⟩
Conference papers hal-01523711v1

Intelligent Information Processing IX

Zhongzhi Shi , Eunika Mercier-Laurent , Jiuyong Li
Springer International Publishing, AICT-538, 2018, IFIP Advances in Information and Communication Technology, 978-3-030-00827-7. ⟨10.1007/978-3-030-00828-4⟩
Books hal-02197767v1
Image document

Data Recovery from Proprietary Formatted Cctv Hard Disks

Aswami Ariffin , Jill Slay , Kim-Kwang Choo
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.213-223, ⟨10.1007/978-3-642-41148-9_15⟩
Conference papers hal-01460629v1
Image document

Windows Event Forensic Process

Quang Do , Ben Martini , Jonathan Looi , Yu Wang , Kim-Kwang Choo
10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.87-100, ⟨10.1007/978-3-662-44952-3_7⟩
Conference papers hal-01393763v1
Image document

Data Recovery Function Testing for Digital Forensic Tools

Yinghua Guo , Jill Slay
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.297-311, ⟨10.1007/978-3-642-15506-2_21⟩
Conference papers hal-01060626v1
Image document

Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework

Han Jiao , Jixue Liu , Jiuyong Li , Chengfei Liu
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.400-411, ⟨10.1007/978-3-642-30436-1_33⟩
Conference papers hal-01518253v1