21 results

Editorial: TLAD 2015

Conference Proceeding
Leimich, P., & Bhogal, J. (2015)
Editorial: TLAD 2015. In Proceedings TLAD 2015. 13th International Workshop on the Teaching, Learning and Assessment of Databases
No abstract available.

Editorial: TLAD 2014

Conference Proceeding
Leimich, P., & Monger, A. (2014)
Editorial: TLAD 2014. In Proceedings TLAD 2014. 12th International Workshop on the Teaching, Learning and Assessment of Databases
No abstract avialable.

Uses of Peer Assessment in Database Teaching and Learning

Conference Proceeding
Paterson, J., Wilson, J. N., & Leimich, P. (2012)
Uses of Peer Assessment in Database Teaching and Learning. In Data Security and Security Data. , (135-146). https://doi.org/10.1007/978-3-642-25704-9_17
This discussion paper introduces three very different methods and contexts for the use of peer assessment in introductory database classes, each of which is supported by diffe...

A RAM triage methodology for Hadoop HDFS forensics

Journal Article
Leimich, P., Harrison, J., & Buchanan, W. J. (2016)
A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation, 18, 96-109. https://doi.org/10.1016/j.diin.2016.07.003
This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situatio...

Editorial: TLAD 2013

Conference Proceeding
Leimich, P., & Nelson, D. (2013)
Editorial: TLAD 2013. In Proceedings TLAD 2013. 11th International Workshop on Teaching, Learning and Assessment of Databases
No abstract available.

Fast Filtering of Known PNG Files Using Early File Features

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2017)
Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and Law
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...

An assessment of data leakage in Firefox under different conditions.

Presentation / Conference
Findlay, C., & Leimich, P. (2014, July)
An assessment of data leakage in Firefox under different conditions. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This pa...

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence

Conference Proceeding
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (2024)
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence. In Big Data Technologies and Applications. BDTA 2023. https://doi.org/10.1007/978-3-031-52265-9_8
The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and...

An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case

Conference Proceeding
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (2024)
An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case. In Big Data Technologies and Applications (156-167). https://doi.org/10.1007/978-3-031-52265-9_11
This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The ...

Fingerprinting JPEGs With Optimised Huffman Tables

Journal Article
McKeown, S., Russell, G., & Leimich, P. (2018)
Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), https://doi.org/10.15394/jdfsl.2018.1451
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...

Date