|
| | | |
Volume 161 - 13th Australasian Information Security Conference(AISC 2015), Sydney, Australia,, January 2015This volume contains papers presented at the 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia,, January 2015. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 38.5% (5 from 13). |
Volume CitationIan Welch and Xun Yi Eds. (2015). Proceedings of the 13th Australasian Information Security Conference (AISC 2015). CRPIT. 161. Sydney, Australia,, ACS.
Papers Included in the VolumeDi, B., Simpson, L., Bartlett, H., Dawson, E. and Wong, K. (2015). Correcting flaws in Mitchell’s analysis of EPBC. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 57-60. |
| Herrera, A. and Cheney, B. (2015). JMD: A Hybrid Approach for Detecting Java Malware. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 3-13. |
| Jayarathna, D., Tupakula, U. and Varadharajan, V. (2015). Hypervisor-based Security Architecture to Protect Web Applications. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 15-24. |
| Mani, D., Heravi, A., Choo, K.K.R. and Mubarak, S. (2015). Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 53-56. |
| Myers, D., Foo, E. and Radke, K. (2015). Internet-wide Scanning Taxonomy and Framework. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 61-65. |
| Newby, T., Grove, D.A., Murray, A.P., Owen, C.A., McCarthy, J. and North, C. (2015). Annex: A Middleware for Constructing High-Assurance Software Systems. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 25-34. |
| Richer, T.J., Neale, G. and Osborne, G. (2015). On the Eectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 35-44. |
| Rodofile, N.R., Radke, K. and Foo, E. (2015). Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 67-70. |
| Shield, J., Hopkins, B., Beaumont, M. and North. C (2015). Hardware Trojans – A Systemic Threat. In Proc. 13th Australasian Information Security Conference (AISC 2015), Sydney, Australia. CRPIT, 161. Welch, I. and Yi, X. Eds., ACS. 45-51. |
|
Papers listed: 9
|