Benjamin Turnbull

Senior Lecturer, Cyber Security
Senior Lecturer

About Ben

My research goal is to provide comprehensive situation understanding and decision support for all areas integrating cyber systems. As part of this, I research the nexus of cyber security and kinetic effect to understand the true impacts of cyber-attack, best-practice automated analysis and visual techniques to aid decision support. 

I am a researcher and practitioner working in the Digital Forensics, Cyber Security, Knowledge Representation and Visual Analytics domains. My research interests include novel approaches to securing computers and networks, automated learning from large datasets, forensic analysis of non-traditional devices, cyber security, cyber situation awareness, knowledge management, network analysis and visual analytics. I believe in real-world research that helps the community at large, and implementation is a large part of this. Additionally, I also work with the US Naval Research Laboratory, conducting research on the Tor network. 

For more information, please see my Google Scholar profile

Research

Research Interests

  • Cyber Security 
  • Cyber Business Impact Analysis
  • Internet of Things, Cyber Physical Systems Security
  • Linked Data Analysis
  • Artificial Intelligence Planning
  • Exploratory Visualisation Techniques

External Research Grants

      2018 Australian Army Research Scheme

  • Cyber Attacks on the Defence Supply Chain
  • $AU49,000.

      2017-2018 Defence Science and Technology Competitive Research Agreement (DST CERA) 

  • Automated Cyber Red Teaming
  • $AU 77,684.

      2018 UNSW Canberra SEIT Infrastructure

  • Cyber Computing Research Infrastructure
  • $AU 110,000.

      2016 - 2018 United States Naval Research Laboratory

  • Tor Single Onion Services
  • $US 213,000 (approx. $AU 280,000). 

      2017 UNSW Canberra Defence-related Research Grants

  • Ghost in The Network: Scenario-driven, model-based Automated Cyber Red-Teaming for Defence and Military Networks.
  • $AU 12,090.

      2016 UNSW Canberra Rector’s Start Up Grant

  • Calculating the Cost of Cyber-Attack: developing a cyber-kinetic battle damage assessment simulator.
  • $AU 9550.

 

Research Supervised

      Current Researchers

  • Rory MacLeod
  • Tim Wilson-Brown

      Primary PhD

  • Visualisation of Attack Graphs (ongoing)
  • 3D Visualisation of network traffic (ongoing)
  • Kinetic Impact of Cyber Attack (complete, 2017)
  • Visualisation of Attack Graphs (ongoing)
  • Visualisation of Forensic Data (complete, 2012)

      Honours

  • 18 Honours student completions (2003-2015)

Teaching 

Program Coordination

  • 2015 - 2017 - Co-Coordinator, Bachelor of Computing and Cyber Security
  • 2015 - 2016 - Cyber-Security Honours Coordinator
  • 2015 - Co-Founder, Bachelor of Computing and Cyber Security

Course Development and Redevelopment

  • ZEIT8023 - Wireless, Mobile and Internet of Things Security - Co-Developer
  • ZEIT8025 - Application & Software Security and Forensics - Co-Developer
  • ZEIT8022 - Identity and Access Management - Co-Developer
  • ZEIT3101 - IT Project 2 - Significant Redevelopment
  • ZEIT3118 - IT Project 1 - Significant Redevelopment
  • ZEIT2104 - Computers Security -Developer
  • ZINT2100 - Introduction to Cyber Security - Co-Developer
  • Digital Forensics - Co-Developer

Honours/Masters and Postgraduate

2017

  • Semester 1 - ZEIT8023 - Wireless, Mobile and Internet of Things Security

2016

  • Semester 2 - ZEIT8023 - Wireless, Mobile and Internet of Things Security
  • Semester 1 - ZEIT8023 - Wireless and Mobile Security

2015

  • Semester 2 - ZEIT8023 - Wireless and Mobile Security
  • Semester 2 - ZEIT4101 - Combined Cyber Security Elective Course 2 
  • Semester 2 - ZEIT4500 - Special Topic Supervision
  • Semester 1 - ZEIT4111 - Combined Cyber Security Elective Course 1
  • Semester 1 - ZEIT4216 - Special Topic Supervision
  • Semester 1 - ZEIT8025 - Application & Software Security and Forensics 
  • Semester 1 - ZEIT8022 - Identity and Access Management

Undergraduate Teaching

      2018 

  • Semester 1 - ZEIT3118 - IT Project 1

      2017

  • Semester 2 - ZEIT2104 - Computers Security
  • Semester 2 - ZEIT3101 - IT Project 2
  • Semester 1 - ZEIT3118 - IT Project 1

      2016

  • Semester 1 - ZINT2100 - Introduction to Cyber Security (Undergraduate)

      2015

  • Semester 2 - ZINT2100 - Introduction to Cyber Security (Undergraduate)
  • Semester 1 - ZINT2100 - Introduction to Cyber Security (Undergraduate)

Older Teaching

      2008

  • Semester 2 -Digital Forensics (Honours/Masters/Postgraduate)

      2007

  • Semester 2 -Digital Forensics (Honours/Masters/Postgraduate)
  • Semester 2 -Secure and High Integrity Systems (Undergraduate)
  • Semester 1 -Secure and High Integrity Systems (University of Malaya)

      2006

  • Semester 2 -Digital Forensics (Honours/Masters/Postgraduate)
  • Semester 2 -Secure and High Integrity Systems (Undergraduate)
  • Semester 2 -Secure and High Integrity Systems (Hong Kong Baptist University)
  • Semester 1 -Secure and High Integrity Systems (Hong Kong Baptist University)

      2005

  • Semester 2 -Secure and High Integrity Systems (Undergraduate)
  • Semester 2 -Secure and High Integrity Systems (Hong Kong Baptist University)

      2004

  • Semester 2 -Secure and High Integrity Systems (Undergraduate)

PUBLICATIONS

Book Chapters
add
Yamany W; Moustafa N; Turnbull B, 2021, 'Correction to: A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems', in AI 2020: Advances in Artificial Intelligence, Springer International Publishing, pp. C1 - C1, http://dx.doi.org/10.1007/978-3-030-64984-5_37
2021
Ormrod D; Turnbull B, 2019, 'Modeling and Simulation Approaches', in Cyber Resilience of Systems and Networks, Springer International Publishing, pp. 171 - 193, http://dx.doi.org/10.1007/978-3-319-77492-3_8
2019
Ormrod D; Turnbull B, 2019, 'Modeling and Simulation Approaches', in Kott A; Linkov I (ed.), Cyber Resilience of Systems and Networks, Springer, pp. 171 - 193, http://dx.doi.org/10.1007/978-3-319-77492-3_1
2019
Conference Papers
add
Hassan M; Moustafa N; Sitnikova E; Turnbull B; Vatsalan D, 2020, 'Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020
2020
Alkadi O; Moustafa N; Turnbull B, 2020, 'A Collaborative Intrusion Detection System using Deep Blockchain Framework for Securing Cloud Networks', 2020 Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), 2020 Amsterdam, Netherlands, 03 September 2020 - 04 September 2020
2020
Clark D; Turnbull B, 2020, 'Interactive 3D visualization of network traffic in time for forensic analysis', in VISIGRAPP 2020 - Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, pp. 177 - 184
2020
Sobb T; Sample C; Shelton C; Turnbull B, 2020, 'Modelling the supply chain: Trust but verify in complex systems', in Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020, pp. 439 - 447, http://dx.doi.org/10.34190/ICCWS.20.039
2020
Yamany W; Moustafa N; Turnbull B, 2020, 'A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems', Canberra, Australia, presented at The 33rd Australasian Joint Conference on Artificial Intelligence (AJCAI 2020), Canberra, Australia, 16 December 2020
2020
Clark DJ; Turnbull B, 2020, 'Experiment Design for Complex Immersive Visualisation', in 2020 Military Communications and Information Systems Conference, MilCIS 2020 - Proceedings, http://dx.doi.org/10.1109/MilCIS49828.2020.9282380
2020
Sobb TM; Turnbull B, 2020, 'Assessment of cyber security implications of new technology integrations into military supply chains', in Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020, pp. 128 - 135, http://dx.doi.org/10.1109/SPW50608.2020.00038
2020
Moustafa N; Salim S; Turnbull B, 2020, 'Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
2020
Turnbull B; Ormrod D; Moustafa N; Micallef N, 2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, Portugal, pp. 518 - 526, presented at ECCWS, Portugal, 04 July 2019 - 05 July 2019
2019
Ormrod D; Scott K; Scheinman L; Kodalle T; Sample C; Turnbull B, 2019, 'The persuasion game: Developing a serious game based model for information warfare and influence studies', in European Conference on Information Warfare and Security, ECCWS, Coimbra, Portugal, pp. 328 - 337, presented at Future European Conference on Cyber Warfare and Security, Coimbra, Portugal, 04 July 2019
2019
Ormrod D; Turnbull B, 2018, 'Cyber resilience as an information operations action to assure the mission', in European Conference on Information Warfare and Security, ECCWS, pp. 343 - 350
2018
Randhawa S; Turnbull B; Yuen J; Dean J, 2018, 'Mission-centric Automated Cyber Red Teaming', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3230833.3234688
2018
Taylor J; Turnbull B; Creech G, 2018, 'Volatile memory forensics acquisition efficacy: A comparative study towards analysing firmware-based rootkits', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3230833.3232810
2018
Moustafa N; Turnbull B; Choo K-KR, 2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', in Proceedings - 2018 IEEE International Conference on Industrial Internet, ICII 2018, 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, pp. 139 - 145, presented at 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, 21 October 2018 - 23 October 2018, http://dx.doi.org/10.1109/ICII.2018.00023
2018
Ormrod D; Turnbull B, 2017, 'A framework for the modelling and simulation of battlespace integrated cyber-kinetic effects', in European Conference on Information Warfare and Security, ECCWS, pp. 288 - 297
2017
Ormrod D; Turnbull BP, 2016, 'The Military Cyber-Maturity Model - Preparing Modern Cyber-Enabled Military Forces for Future Conflicts', in Proceedings of 11th International Conference on Cyber Warfare and Security:, Boston, pp. 261 - 268, presented at 11th International Conference on Cyber Warfare and Security: ICCWS2016, Boston, 17 March 2016 - 18 March 2016
2016
Yuen J; Turnbull BP; Hernandez J, 2015, 'Visual analytics for cyber red teaming', in Harrison L; Prigent N; Engel S; Best D (eds.), 2015 IEEE Symposium on Visualization for Cyber Security, VizSec 2015, IEEE, Chicago, IL, pp. 1 - 8, presented at 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), Chicago, IL, 25 October 2015 - 25 October 2015, http://dx.doi.org/10.1109/VIZSEC.2015.7312765
2015
O'Sullivan K; Turnbull BP, 2015, 'The Cyber Simulation Terrain: Towards an open source cyber effects simulation ontology', in Hutchinson B (ed.), roceedings of the 16th Aus tralian Information W arfare Confe rence, AUSTRALIAN INFORMATION WARFARE AND SECURITY CONFERENCE, Perth, WA, Australia, presented at AUSTRALIAN INFORMATION WARFARE AND SECURITY CONFERENCE, Perth, WA, Australia, 30 November 2015 - 02 December 2015, http://ro.ecu.edu.au/isw/60/
2015
Rice B; Turnbull BP, 2015, 'File System Modelling for Digital Triage: An Inductive Profiling Approach', in Valli C (ed.), The Proceedings of the 13th Australian Digital Forensics Conference, SRI Security Research Institute, Edith Cowan University, Perth, Western Australia, Perth, WA, Australia, pp. 132 - 140, presented at Australian Digital Forensics Conference, Perth, WA, Australia, 30 November 2015 - 02 December 2015, http://dx.doi.org/10.4225/75/57b3ff9efb892
2015
Ormrod D; Turnbull BP; O'Sullivan K, 2015, 'System of systems cyber effects simulation ontology', in Macal C; Rossetti M (ed.), Winter Simulation Conference (WSC), 2015, IEEE, Huntington Beach, CA, pp. 2475 - 2486, presented at 2015 Winter Simulation Conference (WSC), Huntington Beach, CA, 06 December 2015 - 09 December 2015, http://dx.doi.org/10.1109/WSC.2015.7408358
2015
Grove D; Murray A; Gerhardy D; Turnbull B; Tobin T; Moir C, 2013, 'An overview of the Parallax BattleMind v1.5 for computer network defence', in Conferences in Research and Practice in Information Technology Series, pp. 31 - 37
2013
Osborne G; Turnbull B; Slay J, 2012, 'Development of info vis software for digital forensics', in Proceedings - International Computer Software and Applications Conference, pp. 213 - 217, http://dx.doi.org/10.1109/COMPSACW.2012.47
2012
Shiralkar T; Lavine M; Turnbull B, 2009, 'A preliminary approach to the forensic analysis of an ultraportable ASUS Eee PC', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, pp. 116 - 121, http://dx.doi.org/10.1007/978-3-642-02312-5_13
2009
Turnbull B; Taylor R; Blundell B, 2009, 'The anatomy of electronic evidence - Quantitative analysis of police e-crime data', in Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, pp. 143 - 149, http://dx.doi.org/10.1109/ARES.2009.118
2009
Turnbull B; Osborne G; Simon M, 2009, 'Legal and technical implications of collecting wireless data as an evidence source', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, pp. 36 - 41, http://dx.doi.org/10.1007/978-3-642-02312-5_5
2009
Osborne G; Turnbull B, 2009, 'Enhancing computer forensics investigation through visualisation and data exploitation', in Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, pp. 1012 - 1017, http://dx.doi.org/10.1109/ARES.2009.120
2009
Slay J; Lin YC; Turnbull B; Beckett J; Lin P, 2009, 'Towards a formalization of digital forensics', in IFIP Advances in Information and Communication Technology, pp. 37 - 47, http://dx.doi.org/10.1007/978-3-642-04155-6_3
2009
Singh AP; Lavine M; Turnbull B; Shiralkar T, 2009, 'Acer aspire one netbooks: A forensic challenge', in Proceedings - International Computer Software and Applications Conference, pp. 404 - 409, http://dx.doi.org/10.1109/COMPSAC.2009.167
2009
Turnbull B, 2008, 'The adaptability of electronic evidence acquisition guides for new technologies', in e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, http://dx.doi.org/10.4108/e-forensics.2008.2770
2008
Journal articles
add
Tran QN; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve?', IEEE Open Journal of the Computer Society, vol. 2, pp. 179 - 191, http://dx.doi.org/10.1109/ojcs.2021.3068385
2021
Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, vol. 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590
2021
Samarasinghe D; Barlow M; Lakshika E; Lynar T; Moustafa N; Townsend T; Turnbull B, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, vol. 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198
2021
Johnson N; Turnbull B; Maher T; Reisslein M, 2021, 'Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies', IEEE Access, vol. 9, pp. 9365 - 9382, http://dx.doi.org/10.1109/ACCESS.2020.3048269
2021
Tran QN; Turnbull BP; Wu H-T; de Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, vol. 2, pp. 72 - 84, http://dx.doi.org/10.1109/ojcs.2021.3053032
2021
Keshk M; Turnbull B; Sitnikova E; Vatsalan D; Moustafa N, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, vol. 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737
2021
Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), vol. 12, pp. 6434 - 6434, http://dx.doi.org/10.3390/SU12166434
2020
Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, vol. 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715
2020
Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
2020
Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
2020
Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, vol. 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140
2020
Ormrod D; Turnbull B, 2019, 'The modelling and simulation of integrated battlefield cyber-kinetic effects', International Journal of Cyber Warfare and Terrorism, vol. 9, pp. 1 - 26, http://dx.doi.org/10.4018/IJCWT.2019100101
2019
Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security
2019
Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, vol. 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142
2019
Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems
2019
Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, vol. 6, pp. 32910 - 32924, http://dx.doi.org/10.1109/ACCESS.2018.2844794
2018
Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5
2018
Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719
2018
Ormrod D; Turnbull B, 2017, 'Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success', International Journal of Cyber Warfare and Terrorism, vol. 7, pp. 1 - 13, http://dx.doi.org/10.4018/ijcwt.2017100101
2017
Ormrod D; Turnbull B, 2017, 'Attrition rates and maneuver in agent-based simulation models', Journal of Defense Modeling and Simulation, vol. 14, pp. 257 - 272, http://dx.doi.org/10.1177/1548512917692693
2017
Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, vol. 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018
2017
Ormrod D; Turnbull B, 2016, 'The cyber conceptual framework for developing military doctrine', Defence Studies, vol. 16, pp. 270 - 298, http://dx.doi.org/10.1080/14702436.2016.1187568
2016
Turnbull B; Randhawa S, 2015, 'Automated event and social network extraction from digital evidence sources with ontological mapping', Digital Investigation, vol. 13, pp. 94 - 106, http://dx.doi.org/10.1016/j.diin.2015.04.004
2015
Osborne G; Turnbull B; Slay J, 2010, 'The 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics information visualisation', ARES 2010 - 5th International Conference on Availability, Reliability, and Security, pp. 629 - 634, http://dx.doi.org/10.1109/ARES.2010.74
2010
Slay J; Turnbull B; Blundell B; McKemmish R, 2009, 'Message from WSDF workshop co-chairs', Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, http://dx.doi.org/10.1109/ARES.2009.175
2009
Pavlic T; Slay J; Turnbull B, 2008, 'Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications', JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, vol. 3, pp. 35 - 55, http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000214231400003&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
2008
Turnbull B; Slay J, 2008, 'Wi-Fi network signals as a source of digital evidence: Wireless network forensics', ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, pp. 1355 - 1360, http://dx.doi.org/10.1109/ARES.2008.135
2008
Pavlic T; Slay J; Turnbull B, 2008, 'Extracting evidence using google desktop search', IFIP International Federation for Information Processing, vol. 285, pp. 43 - 50, http://dx.doi.org/10.1007/978-0-387-84927-0_4
2008
Broadway J; Turnbull B; Slay J, 2008, 'Improving the analysis of lawfully intercepted network packet data captured for forensic analysis', ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, pp. 1361 - 1368, http://dx.doi.org/10.1109/ARES.2008.122
2008
Turnbull B; Slay J, 2007, 'Wireless forensic analysis tools for use in the electronic evidence collection process', Proceedings of the Annual Hawaii International Conference on System Sciences, http://dx.doi.org/10.1109/HICSS.2007.617
2007
Slay J; Turnbull B, 2006, 'Computer Security Education and Research in Australia', IEEE Security & Privacy Magazine, vol. 4, pp. 60 - 63, http://dx.doi.org/10.1109/msp.2006.115
2006
Slay J; Turnbull B, 2006, 'The need for a technical approach to digital forensic evidence collection for wireless technologies', Proceedings of the 2006 IEEE Workshop on Information Assurance, vol. 2006, pp. 124 - 132
2006
Blundell B; Dong HX; Slay J; Turnbull B; Wilsdon T, 2005, 'Development of a "zero-skills" forensic laptop registration and identification tool', 4th European Conference on Information Warfare and Security 2005, ECIW 2005, pp. 39 - 45
2005
Turnbull B; Blundell B; Slay J, 2005, 'Googling forensics', Proceedings of 3rd Australian Computer, Network and Information Forensics Conference, pp. 62 - 67
2005
Slay J; Turnbull B, 2005, 'The 802.11 technology gap - Case studies in crime', IEEE Region 10 Annual International Conference, Proceedings/TENCON, vol. 2007, http://dx.doi.org/10.1109/TENCON.2005.300890
2005
Organisational units
lensSchool of Engineering & Information Technology
lensUNSW Institute for Cyber Security
Sub Theme
lensIntelligent Security