2009 |
26 | EE | Jill Slay,
Matthew Simon:
Voice Over IP: Privacy and Forensic Implications.
IJDCF 1(1): 89-101 (2009) |
2008 |
25 | EE | Benjamin Turnbull,
Jill Slay:
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics.
ARES 2008: 1355-1360 |
24 | EE | Joshua Broadway,
Benjamin Turnbull,
Jill Slay:
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
ARES 2008: 1361-1368 |
23 | EE | Timothy Pavlic,
Jill Slay,
Benjamin Turnbull:
Extracting Evidence Using Google Desktop Search.
IFIP Int. Conf. Digital Forensics 2008: 43-50 |
22 | EE | Yi-Chi Lin,
Jill Slay,
I.-Long Lin:
Computer Forensics and Culture.
ISI Workshops 2008: 288-297 |
2007 |
21 | EE | Jill Slay,
Michael Miller:
Lessons Learned from the Maroochy Water Breach.
Critical Infrastructure Protection 2007: 73-82 |
20 | EE | Jason Beckett,
Jill Slay:
Digital Forensics: Validation and Verification in a Dynamic Work Environment.
HICSS 2007: 266 |
19 | EE | Benjamin Turnbull,
Jill Slay:
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process.
HICSS 2007: 267 |
18 | EE | Jill Slay,
Andrew Przibilla:
iPod Forensics: Forensically Sound Examination of an Apple iPod.
HICSS 2007: 267 |
17 | EE | Matthew Simon,
Jill Slay:
Forensic Computing Training, Certification and Accreditation: An Australian Overview.
World Conference on Information Security Education 2007: 105-112 |
2006 |
16 | EE | Sameera Mubarak,
Jill Slay:
An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management.
ICDIM 2006: 55-62 |
15 | EE | Benjamin Turnbull,
Barry Blundell,
Jill Slay:
Google Desktop as a Source of Digital Evidence.
IJDE 5(1): (2006) |
2005 |
14 | EE | Phillip Pudney,
Jill Slay:
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia.
ACISP 2005: 29-39 |
13 | | Yi-Chi Lin,
Jill Slay:
Non-Repudiation in Pure Mobile Ad Hoc Network.
AISM 2005: 59-66 |
12 | | Benjamin Turnbull,
Barry Blundell,
Jill Slay:
Googling Forensics.
Australian Computer, Network & Information Forensics Conference 2005: 62-67 |
11 | | Barry Blundell,
Huang Xiao Dong,
Jill Slay,
Benjamin Turnbull,
Tom Wilsdon:
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool.
ECIW 2005: 39-46 |
10 | | Tom Wilsdon,
Jill Slay:
Towards A Validation Framework for Forensic Computing Tools in Australia.
ECIW 2005: 409-414 |
9 | | Jill Slay,
Kris Jorgensen:
Applying Filter Clusters to Reduce Search State Space.
IFIP Int. Conf. Digital Forensics 2005: 295-301 |
8 | EE | Tom Wilsdon,
Jill Slay:
Digital Forensics: Exploring Validation, Verification and Certification.
SADFE 2005: 48-55 |
2004 |
7 | | Jill Slay,
Gerald Quirchmayr:
A Formal Model for the Relationship between Culture and Trust within is Security Management.
AISM 2004: 159-166 |
6 | | Jill Slay:
Doctor of Philosophy: IT Security.
International Information Security Workshops 2004: 147-152 |
2002 |
5 | | Jill Slay,
Gerald Quirchmayr:
The Role Of Culture In the Development of Global E-Commerce Systems.
Information Systems: The e-Business Challenge 2002: 103-115 |
4 | | Gerald Quirchmayr,
Jill Slay:
Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science.
TelE-Learning 2002: 177-184 |
3 | EE | Jill Slay:
Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings.
Educational Technology & Society 5(1): (2002) |
2001 |
2 | | Gerald Quirchmayr,
Jill Slay:
Identifying Emerging Web-Communication Patterns Between Government and Citizens.
DEXA Workshop 2001: 419-422 |
1998 |
1 | | Jill Slay:
Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment.
Teleteaching 1998: 921-930 |