Search for a surname in the box below and then click "Search" to search for Staff.
Paterson, R. & Leimich, P. (2012). An investigation into PL/SQL Injection. ISBN 978-0-947649-97-5
SQL injection is a common attack method used to leverage infor-mation out of a database or to compromise a company’s network. This paper investigates four injection attacks th...
Leimich, P., Harrison, J. & Buchanan, W. J. (2016). A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation. 18, 96-109. doi:10.1016/j.diin.2016.07.003. ISSN 1742-2876
This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situatio...
Leimich, P., Ferguson, I. & Coull, N. From crime to court - an experience report of a digital forensics group project module.. Paper presented at HEA Teaching Computer Forensics Workshop, Sunderland, UK. (Unpublished)
This paper discusses the large-scale group project undertaken by BSc Hons Digital Forensics
students at Abertay University in their penultimate year. The philosophy of the pro...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
Findlay, C. & Leimich, P. An assessment of data leakage in Firefox under different conditions.. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,. (Unpublished)
Data leakage is a serious issue and can result in the loss of sensitive data,
compromising user accounts and details, potentially affecting millions of internet
users. This pa...
Comer, S. & Leimich, P. A Comparison of Geo-tagging in Mobile Internet Browsing Applications on iOS and Android.. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,. (Unpublished)
Nowadays there is almost no crime committed without a trace of digital evidence,
and since the advanced functionality of mobile devices today can be exploited to
assist in cri...