Future challenges for smart cities: Cyber-security and digital forensics ZA Baig, P Szewczyk, C Valli, P Rabadia, P Hannay, M Chernyshev, ... Digital Investigation 22, 3-13, 2017 | 312 | 2017 |
Taxonomy of computer forensics methodologies and procedures for digital evidence seizure. K Sansurooah School of Computer and Information Science, Edith Cowan University, Perth …, 2006 | 25 | 2006 |
A forensics overview and analysis of USB flash memory devices K Sansurooah School of Computer and Information Science, Edith Cowan University, Perth …, 2009 | 17 | 2009 |
The 2012 investigation into remnant data on second hand memory cards sold in Australia P Szewczyk, K Sansurooah SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012 | 16 | 2012 |
A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011 K Sansurooah, P Szewczyk 10th Australian Information Security Management Conference 82, 2012 | 13 | 2012 |
Securing the elderly: A developmental approach to hypermedia based online information security for senior novice computer users DM Cook, P Szewczyk, K Sansurooah School of Computer and Information Science, Security Research Centre, Edith …, 2011 | 12 | 2011 |
An investigation into remnant data on USB storage devices sold in Australia creating alarming concerns N Robins, PAH Williams, K Sansurooah International Journal of Computers and Applications 39 (2), 79-90, 2017 | 10 | 2017 |
Seniors language paradigms: 21st century jargon and the impact on computer security and financial transactions for senior citizens DM Cook, P Szewczyk, K Sansurooah secau Security Research Centre, Edith Cowan University, Perth, Western Australia, 2011 | 8 | 2011 |
I know what you did last summer... An Investigation into Remnant Data on USB Storage Devices Sold in Australia in 2015 N Robins, PAH Williams, K Sansurooah Proceedings of the Australasian Computer Science Week Multiconference, 1-8, 2016 | 7 | 2016 |
An investigation into the efficiency of forensic data erasure tools for removable Usb flash memory storage devices K Sansurooah, H Hope, H Almutairi, F Alnazawi, Y Jiang SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013 | 7 | 2013 |
An Australian longitudinal study into remnant data recovered from second-hand memory cards P Szewczyk, K Sansurooah, PAH Williams International Journal of Information Security and Privacy (IJISP) 12 (4), 82-97, 2018 | 6 | 2018 |
Security risks of medical devices in wireless environments K Sansurooah SRI Security Research Institute, Edith Cowan University, 2015 | 6 | 2015 |
Vulnerabilities associated with wi-fi protected setup in a medical environment D Costantin, K Sansurooah, PAH Williams Proceedings of the Australasian Computer Science Week Multiconference, 1-12, 2017 | 5 | 2017 |
Sellers continue to give away confidential information on second hand memory cards sold in Australia P Szewczyk, N Robins, K Sansurooah SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013 | 5 | 2013 |
An overview and examination of digital PDA devices under forensics toolkits K Sansurooah School of Computer and Information Science, Edith Cowan University, Perth …, 2007 | 5 | 2007 |
The spy in your pocket: Smartphones and geo-location data K Sansurooah, B Keane SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2015 | 4 | 2015 |
An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16 K Sansurooah School of Computer and Information Science, Edith Cowan University, Perth …, 2006 | 3 | 2006 |
A forensics framework and method in the acquisition and extraction of data from NAND Flash memory storage chip K Sansurooah | 2 | 2015 |
An Overview of Cloud Computing Challenges and Its Security Concerns K Sansurooah CSREA Press, 2012 | 2 | 2012 |
An approach in identifying and tracing back spoofed IP packets to their sources K Sansurooah School of Computer and Information Science, Edith Cowan University, Perth …, 2007 | 2 | 2007 |