当前位置: X-MOL首页全球导师 海外导师 › Woodward, Andrew

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Williams, T., Woodward, A., (2015), Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 2015(8), 305-316, Macclesfield, UK, DOI: 10.2147/MDER.S50048. Woodward, A., Williams, T., (2015), An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security. Recent Advances in Information and Communication Technology 2015. Proceedings of the 11th International Conference on Computing and Information Technology (ICCIT), 361(2-3 July 2015), 1-8, Thailand, DOI: 10.1007/978-3-319-19024-2. Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA. Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA. Carpene, C., Woodward, A., (2014), A Survey Of IPv6 Address Usage In The Public Domain Name System. The Proceedings of 12th Australian Information Security Management Conference, 91-99, Perth, W.A.. Johnstone, M., Woodward, A., (2013), Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference, 102-112, Perth, Western Australia. Valli, C., Rabadia, P., Woodward, A., (2013), Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference, 141-149, Edith Cowan University. Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia. Cusack, B., Woodward, A., Butson, S., Leber, B., (2013), The effectiveness of internet activity erasure tools to protect privacy. The Proceedings of the 11th Australian Information Security Management conference, 35-41, Perth, WA. Carpene, C., Woodward, A., (2012), Exposing potential privacy issues with IPV6 address construction. The Proceedings of the 10th Australian Information Security Management Conference, 44-50, Perth, Western Australia. Coole, M., Woodward, A., Valli, C., (2012), Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference, 36-43, Perth, Western Australia. Johnstone, M., Woodward, A., (2012), Towards Effective Algorithms for Intelligent Defense Systems. Cyberspace Safety and Security: The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 498-508, Heidelberg, DOI: 10.1007/978-3-642-35362-8. Coole, M., Corkill, J., Woodward, A., (2012), Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language. The Proceedings of the 5th Australian Security and Intelligence Conference, 27-35, Perth, Western Australia. Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C., (2012), Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference, 54-60, Perth, Western Australia. Pung, W., Woodward, A., (2011), Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?. Proceedings of The 9th Australian Digital Forensics Conference, 93-99, Perth, Western Australia. Jacobson, E., Woodward, A., (2011), A longitudinal study of Wi-Fi access point security in the Perth Central Business District. Proceedings of The 9th Australian Information Security Management Conference, 124-129, Perth, WA. Brand, M., Valli, C., Woodward, A., (2011), A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference, 1(1-2 August), 1-6, Perth, WA. Valli, C., Woodward, A., Hannay, P., (2011), Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011, 191-195, Richmond, Virginia, USA.

推荐链接
down
wechat
bug