Andrew Woodward

According to our database1, Andrew Woodward authored at least 21 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Model of Fluid-Structure and Biochemical Interactions with Applications to Subclinical Leaflet Thrombosis.
CoRR, 2022

2018
Internet of Things Forensics: The Need, Process Models, and Open Issues.
IT Prof., 2018

2017
The effectiveness of classification algorithms on IPv6 IID construction.
Int. J. Auton. Adapt. Commun. Syst., 2017

Mobile Forensics: Advances, Challenges, and Research Opportunities.
IEEE Secur. Priv., 2017

2016
A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2012
The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues
CoRR, 2012

Towards Effective Algorithms for Intelligent Defense Systems.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2010
Malware Forensics: Discovery of the Intent of Deception.
J. Digit. Forensics Secur. Law, 2010

2009
Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?
Proceedings of the 2009 International Conference on Security & Management, 2009

SCADA Security - Slowly Circling a Disaster Area.
Proceedings of the 2009 International Conference on Security & Management, 2009

Firewire Forensics in Modern Operating Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP.
Proceedings of the 2008 International Conference on Security & Management, 2008

What Artifacts do Current BitTorrent Clients Leave Behind?.
Proceedings of the 2008 International Conference on Security & Management, 2008

Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice.
Proceedings of the 2007 International Conference on Security & Management, 2007

Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Data Security and wireless networks: mutually exclusive?
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
The effectiveness of commercial erasure programs on BitTorrent activity.
Proceedings of 3rd Australian Computer, 2005

An investigation into long range detection of passive UHF RFID tags.
Proceedings of 3rd Australian Computer, 2005

Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

2004
The risks, costs and possible solutions involved in setting up and running wireless local area networks.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004


  Loading...