Andrew Woodward
According to our database1,
Andrew Woodward
authored at least 21 papers
between 2004 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
A Model of Fluid-Structure and Biochemical Interactions with Applications to Subclinical Leaflet Thrombosis.
CoRR, 2022
2018
IT Prof., 2018
2017
Int. J. Auton. Adapt. Commun. Syst., 2017
IEEE Secur. Priv., 2017
2016
A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2012
The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues
CoRR, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2010
J. Digit. Forensics Secur. Law, 2010
2009
Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?
Proceedings of the 2009 International Conference on Security & Management, 2009
SCADA Security - Slowly Circling a Disaster Area.
Proceedings of the 2009 International Conference on Security & Management, 2009
Firewire Forensics in Modern Operating Systems.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Forensic Implications of Using the Firewire Memory Exploit with Microsoft Windows XP.
Proceedings of the 2008 International Conference on Security & Management, 2008
What Artifacts do Current BitTorrent Clients Leave Behind?.
Proceedings of the 2008 International Conference on Security & Management, 2008
Cold Boot Memory Acquisition: An Investigation into Memory Freezing and Data Retention Claims.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Wireless Rx - Risk Assessment and Recommendations for Securing a Wireless Network in a Medical Practice.
Proceedings of the 2007 International Conference on Security & Management, 2007
Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Data Security and wireless networks: mutually exclusive?
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
The effectiveness of commercial erasure programs on BitTorrent activity.
Proceedings of 3rd Australian Computer, 2005
An investigation into long range detection of passive UHF RFID tags.
Proceedings of 3rd Australian Computer, 2005
Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations.
Proceedings of the 3rd Australian Information Security Management Conference, 2005
2004
The risks, costs and possible solutions involved in setting up and running wireless local area networks.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004