Mining malware command and control traces
Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
Fast Filtering of Known PNG Files Using Early File Features
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2017)
Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and Law
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Creation of an online virtual Cisco router learning environment.
Conference Proceeding
Rietsche, R., Russell, G., & Karduck, A. P. (2011)
Creation of an online virtual Cisco router learning environment. In Proceedings of the 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011)https://doi.org/10.2316/P.2011.734-045
Online learning environments are an important aspect to many University courses. They allow flexibility in student approaches, and permit students from a range of backgrounds ...
A forensic image description language for generating test images.
Conference Proceeding
Russell, G., Macfarlane, R. & Ludwiniak, R. (2011)
A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & TrainingISBN 978-1-899253-94-4
Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study....