Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 161 - 13th Australasian Information Security Conference

(AISC 2015), Sydney, Australia,, January 2015

This volume contains papers presented at the 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia,, January 2015. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Ian Welch and Xun Yi.

Published

January 2015;.

ISBN-13

978-1-921770-43-2.

ISSN

1445-1336.

9 papers, xv+70 pages.

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 38.5% (5 from 13).


Volume Citation

Ian Welch and Xun Yi Eds. (2015). Proceedings of the 13th Australasian Information Security Conference (AISC 2015). CRPIT. 161. Sydney, Australia,, ACS.


Papers Included in the Volume

Di, B., Simpson, L., Bartlett, H., Dawson, E. and Wong, K. (2015). Correcting flaws in Mitchell’s analysis of EPBC. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 57-60. abstractpdfBibTeXEndNoteGS

Herrera, A. and Cheney, B. (2015). JMD: A Hybrid Approach for Detecting Java Malware. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 3-13. abstractpdfBibTeXEndNoteGS

Jayarathna, D., Tupakula, U. and Varadharajan, V. (2015). Hypervisor-based Security Architecture to Protect Web Applications. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 15-24. abstractpdfBibTeXEndNoteGS

Mani, D., Heravi, A., Choo, K.K.R. and Mubarak, S. (2015). Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 53-56. abstractpdfBibTeXEndNoteGS

Myers, D., Foo, E. and Radke, K. (2015). Internet-wide Scanning Taxonomy and Framework. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 61-65. abstractpdfBibTeXEndNoteGS

Newby, T., Grove, D.A., Murray, A.P., Owen, C.A., McCarthy, J. and North, C. (2015). Annex: A Middleware for Constructing High-Assurance Software Systems. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 25-34. abstractpdfBibTeXEndNoteGS

Richer, T.J., Neale, G. and Osborne, G. (2015). On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 35-44. abstractpdfBibTeXEndNoteGS

Rodofile, N.R., Radke, K. and Foo, E. (2015). Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 67-70. abstractpdfBibTeXEndNoteGS

Shield, J., Hopkins, B., Beaumont, M. and North. C (2015). Hardware Trojans – A Systemic Threat. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 45-51. abstractpdfBibTeXEndNoteGS

Papers listed: 9

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 23 Jan 2015