| 2009 |
| 26 | EE | Jill Slay,
Matthew Simon:
Voice Over IP: Privacy and Forensic Implications.
IJDCF 1(1): 89-101 (2009) |
| 2008 |
| 25 | EE | Benjamin Turnbull,
Jill Slay:
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics.
ARES 2008: 1355-1360 |
| 24 | EE | Joshua Broadway,
Benjamin Turnbull,
Jill Slay:
Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis.
ARES 2008: 1361-1368 |
| 23 | EE | Timothy Pavlic,
Jill Slay,
Benjamin Turnbull:
Extracting Evidence Using Google Desktop Search.
IFIP Int. Conf. Digital Forensics 2008: 43-50 |
| 22 | EE | Yi-Chi Lin,
Jill Slay,
I.-Long Lin:
Computer Forensics and Culture.
ISI Workshops 2008: 288-297 |
| 2007 |
| 21 | EE | Jill Slay,
Michael Miller:
Lessons Learned from the Maroochy Water Breach.
Critical Infrastructure Protection 2007: 73-82 |
| 20 | EE | Jason Beckett,
Jill Slay:
Digital Forensics: Validation and Verification in a Dynamic Work Environment.
HICSS 2007: 266 |
| 19 | EE | Benjamin Turnbull,
Jill Slay:
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process.
HICSS 2007: 267 |
| 18 | EE | Jill Slay,
Andrew Przibilla:
iPod Forensics: Forensically Sound Examination of an Apple iPod.
HICSS 2007: 267 |
| 17 | EE | Matthew Simon,
Jill Slay:
Forensic Computing Training, Certification and Accreditation: An Australian Overview.
World Conference on Information Security Education 2007: 105-112 |
| 2006 |
| 16 | EE | Sameera Mubarak,
Jill Slay:
An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management.
ICDIM 2006: 55-62 |
| 15 | EE | Benjamin Turnbull,
Barry Blundell,
Jill Slay:
Google Desktop as a Source of Digital Evidence.
IJDE 5(1): (2006) |
| 2005 |
| 14 | EE | Phillip Pudney,
Jill Slay:
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia.
ACISP 2005: 29-39 |
| 13 | | Yi-Chi Lin,
Jill Slay:
Non-Repudiation in Pure Mobile Ad Hoc Network.
AISM 2005: 59-66 |
| 12 | | Benjamin Turnbull,
Barry Blundell,
Jill Slay:
Googling Forensics.
Australian Computer, Network & Information Forensics Conference 2005: 62-67 |
| 11 | | Barry Blundell,
Huang Xiao Dong,
Jill Slay,
Benjamin Turnbull,
Tom Wilsdon:
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool.
ECIW 2005: 39-46 |
| 10 | | Tom Wilsdon,
Jill Slay:
Towards A Validation Framework for Forensic Computing Tools in Australia.
ECIW 2005: 409-414 |
| 9 | | Jill Slay,
Kris Jorgensen:
Applying Filter Clusters to Reduce Search State Space.
IFIP Int. Conf. Digital Forensics 2005: 295-301 |
| 8 | EE | Tom Wilsdon,
Jill Slay:
Digital Forensics: Exploring Validation, Verification and Certification.
SADFE 2005: 48-55 |
| 2004 |
| 7 | | Jill Slay,
Gerald Quirchmayr:
A Formal Model for the Relationship between Culture and Trust within is Security Management.
AISM 2004: 159-166 |
| 6 | | Jill Slay:
Doctor of Philosophy: IT Security.
International Information Security Workshops 2004: 147-152 |
| 2002 |
| 5 | | Jill Slay,
Gerald Quirchmayr:
The Role Of Culture In the Development of Global E-Commerce Systems.
Information Systems: The e-Business Challenge 2002: 103-115 |
| 4 | | Gerald Quirchmayr,
Jill Slay:
Adaptive context-aware learning environments: Live spaces as a basis for life-long learning in computer science.
TelE-Learning 2002: 177-184 |
| 3 | EE | Jill Slay:
Human Activity Systems: A Theoretical Framework for Designing Learning for Multicultural Settings.
Educational Technology & Society 5(1): (2002) |
| 2001 |
| 2 | | Gerald Quirchmayr,
Jill Slay:
Identifying Emerging Web-Communication Patterns Between Government and Citizens.
DEXA Workshop 2001: 419-422 |
| 1998 |
| 1 | | Jill Slay:
Using the World Wide Web to Create an Effective Cross-Cultural Learning Environment.
Teleteaching 1998: 921-930 |