Sub-file Hashing Strategies for Fast Contraband Detection
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560680
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...
Forensic Considerations for the High Efficiency Image File Format (HEIF)
Conference Proceeding
Mckeown, S., & Russell, G. (2020)
Forensic Considerations for the High Efficiency Image File Format (HEIF). https://doi.org/10.1109/CyberSecurity49315.2020.9138890
The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured means of capturing images from their camera application, with Android devices such as the...
Mining malware command and control traces
Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
Secret shares to protect health records in Cloud-based infrastructures
Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...
Creation of an online virtual Cisco router learning environment.
Conference Proceeding
Rietsche, R., Russell, G., & Karduck, A. P. (2011)
Creation of an online virtual Cisco router learning environment. In Proceedings of the 14th IASTED International Conference on Computers and Advanced Technology in Education (CATE 2011)https://doi.org/10.2316/P.2011.734-045
Online learning environments are an important aspect to many University courses. They allow flexibility in student approaches, and permit students from a range of backgrounds ...
A forensic image description language for generating test images.
Conference Proceeding
Russell, G., Macfarlane, R. & Ludwiniak, R. (2011)
A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & TrainingISBN 978-1-899253-94-4
Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study....
Process algebras and the rapid simulation of highly concurrent systems.
Conference Proceeding
Bate, M., Cowie, A., Milne, G., & Russell, G. (1994)
Process algebras and the rapid simulation of highly concurrent systems. In Proceedings of the 18th Australasian Computer Science Conference, 21-31
No abstract available.
Lightweight threads for portable software
Conference Proceeding
Russell, G. (1992)
Lightweight threads for portable software. In Proceedings of the UKUUG/SUKUG
No abstract available.