当前位置: X-MOL首页全球导师 海外导师 › Szewczyk, Patryk

研究领域

ADSL router forensics, embedded system forensic, consumer electronic forensics End-user security awareness, security education, security perceptions, usability of security products

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Szewczyk, P., (2012), An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users. Journal of Digital Forensics, Security and Law, 7(4), 51-72, Metropolitan State University, Minnesota, USA. Szewczyk, P., (2011), Analysis of Data Remaining on Second Hand ADSL Routers. Journal of Digital Forensics, Security and Law, 6(3), 17-30, Virginia. Blackman, D., Szewczyk, P., (2015), The challenges of seizing and searching the contents of wi-fi devices for the modern investigator. Proceedings of the 13th Australian Digital Forensics Conference, 37-48. Hampton, N., Szewczyk, P., (2015), A survey and method for analysing SoHo router firmware currency. Proceedings of the 13th Australian Information Security Management Conference, 11-27. El-Abed, J., Szewczyk, P., (2014), Persistent issues in encryption software: A heuristic and cognitive walkthrough. Proceedings of the 12th Australian Information Security Management Conference, 64-74, Perth, W.A.. Szewczyk, P., (2013), Usability and security support offered through ADSL router user manuals. The Proceedings of 11th Australian Information Security Management Conference, 93-101, Joondalup, WA. Szewczyk, P., Robins, N., Sansurooah, K., (2013), Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference, 135-140, Joondalup, WA. Szewczyk, P., Sansurooah, K., (2012), The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia. The Proceedings of the 10th Australian Digital Forensics Conference, 41-46, Edith Cowan University, Perth, Western Australia. Szewczyk, P., (2012), A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia. The Proceedings of the 10th Australian Information Security Management Conference, 111-117, Edith Cowan University Perth, Western Australia. Sansurooah, K., Szewczyk, P., (2012), A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. Proceedings of the 10th Australian Information Security Management Conference, 83-91, Perth, Western Australia. Cook, D., Szewczyk, P., Sansurooah, K., (2011), Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens. Proceedings of the 9th Australian Information Security Management Conference, 63-68, Perth, Western Australia . Szewczyk, P., Sansurooah, K., (2011), A 2011 investigation into remnant data on second hand memory cards sold in Australia. Proceedings of the 9th Australian Digital Forensics Conference, 134-138, Perth, Western Australia. Barker, J., Hannay, P., Szewczyk, P., (2011), Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 72-78, Piscataway, NJ. Cook, D., Szewczyk, P., Sansurooah, K., (2011), Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users. Proceedings of the 2nd International Cyber Resilience Conference, 20 - 28, Perth, Western Australia. Szewczyk, P., (2011), Usability of Internet Security Software: Have They Got it Right?. Proceedings of the 2011 5th International Conference on Network and System Security, 337-341, Piscataway, NJ. Andersson, K., Szewczyk, P., (2011), Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk. Proceedings of the 9th Australian Information Security Management Conference, 19-24, Perth, Western Australia.

推荐链接
down
wechat
bug