Dictionary attack on Wordpress: Security and forensic analysis AK Kyaw, F Sioquim, J Joseph 2015 Second International Conference on Information Security and Cyber …, 2015 | 53 | 2015 |
Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2 AK Kyaw, Y Chen, J Joseph 2015 Second International Conference on Information Security and Cyber …, 2015 | 48 | 2015 |
Identifying DOS and DDOS attack origin: IP traceback methods comparison and evaluation for IoT B Cusack, Z Tian, AK Kyaw Interoperability, Safety and Security in IoT: Second International …, 2017 | 23 | 2017 |
Low-Cost Computing Using Raspberry Pi 2 Model B. AK Kyaw, HP Truong, J Joseph J. Comput. 13 (3), 287-299, 2018 | 22 | 2018 |
Wi-Pi: a study of WLAN security in Auckland CBD AK Kyaw, P Agrawal, B Cusack Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2016 | 15 | 2016 |
Acquisition of evidence from network intrusion detection systems B Cusack, M Alqahtani Presented on behalf of the authors at the 11th Australian Digital Forensics …, 2013 | 15 | 2013 |
Digital forensic readiness in wireless medical systems AK Kyaw, B Cusack, R Lutui 2019 29th International Telecommunication Networks and Applications …, 2019 | 12 | 2019 |
Forensic readiness for wireless medical systems B Cusack, AK Kyaw SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2012 | 11 | 2012 |
Security challenges in pervasive wireless medical systems and devices AK Kyaw, B Cusack 2014 11th Annual High Capacity Optical Networks and Emerging/Enabling …, 2014 | 5 | 2014 |
Digital Forensics in small devices: RFID tag investigation AK Kyaw Auckland University of Technology, 2011 | 4 | 2011 |
Design and Evaluation for Digital Forensic Ready Wireless Medical Systems AK Kyaw, Z Tian, B Cusack Lecture Notes of the Institute for Computer Sciences, Social Informatics and …, 2020 | 3 | 2020 |
Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand Z Shah, A Kyaw, HP Truong, I Ullah, A Levula Applied Sciences (Special Issue Advanced Technologies in Data and …, 2022 | 2 | 2022 |
Managing wireless security risks in medical services B Cusack, AK Kyaw The 3rd Australian eHealth Informatics and Security Conference. Edith Cowan …, 2014 | 2 | 2014 |
Customising doctor-nurse communications B Cusack, D Parry Presented on behalf of the authors at the 3rd Australian eHealth Informatics …, 2014 | 1 | 2014 |
Teaching Network Security Through Penetration Testing Using the Experiential Learning Approach AK Kyaw, S Fernandez, V Vasava, HP Truong, J Joseph ISERD 152nd International Conference on Education and E-Learning, 7-16, 2019 | | 2019 |
Forensic Readiness for Wireless Medical Systems: Designing for User Safety AK Kyaw Auckland University of Technology, 2019 | | 2019 |
Treating wireless medical system risks for usability and safety B Cusack, AK Kyaw Cyber Forensic and Security International Conference (2018 CFSIC) 1 (The …, 2018 | | 2018 |
Wi-Pi: a study of WLAN security in Auckland City AK Kyaw11, Z Tian, B Cusack IJCSNS 16 (8), 68, 2016 | | 2016 |
Testing systems and devices for forensic readiness B Cusack, R Wan, T Laurenson, AK Kyaw The BIT's 2nd World Congress of Forensics (WCF-2011), 2011 | | 2011 |
Evidential recovery in a RFID business system B Cusack, AK Kyaw The 8th Australian Digital Forensics Conference, 46-56, 2010 | | 2010 |