Papers

Peer-reviewed and non-peer-reviewed papers written by SecurityBible Networks members for conferences.

Digital Forensics Papers

Paper TitleAuthorDatePublicationDownload
From Criminal to Digital Criminal Profiling: Advances in Criminal Profiling in the Digital AgeChlapoutakis G.07/09/2012CFET 2012: The 6
th International Conference on Cybercrime Forensics Education & Training, Canterbury, Kent, UK, ISBN: 978-1-899253-94-4
Download
The Case of the Plan R* Network of Resistant Communication: Implications to Digital Forensic InvestigationsChlapoutakis G.05/2009
Emerging Advances in Digital Evidence, 3rd Year Digital Evidence Development Conference 2009, Teeside, UK
Download
The Development of a Modular Software Framework for a Distributed Forensic Attack Profiling NetworkChlapoutakis G., Marshall A.09-11/07/2008British Society of Criminology 2008, 9-11 July, Huddersfield, UKDownload
To catch a cyberthief: legal and technical issues in network monitoring for cyberprofilingMarshall A.M., Tompsett B.C., Zeus-Brown A.M., Chlapoutakis G.03/2008BILETA2008: Law Shaping Technology; Technology Shaping the Law, Glasgow Caledonian University, Glasgow, UKDownload
Use of Network Monitoring & Analysis Tools and Methodologies in Digital Forensic InvestigationsChlapoutakis G.03/2008Emerging Advances in Digital Evidence, 3rd Year Digital Evidence Development Conference 2008, Teeside, UKDownload

Network Security Papers

Paper TitleAuthorDatePublicationDownload
Using PFSense and Commodity Hardware as a Medium Interaction Honey-netChlapoutakis G., Laskos A., Brooke P.J., Truran M.09/2010CFET 2010: The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury, Kent, UKDownload
Bluetooth Security: Vulnerabilities, Attacks & DefenseChlapoutakis G.2005MSc Internet Engineering, University of SunderlandDownload
Linux Security: Tools and MethodsChlapoutakis G.2004Chapter from BSc Computing Dissertation, University of SunderlandDownload
Intrusion Detection SystemsChlapoutakis G.2004Chapter from BSc Computing Dissertation, University of SunderlandDownload
Why DROPping ALL 65535 ports is bad and nastyChlapoutakis G.2002University of Sunderland
Cheers and thanks go to: SecurityBible, UHAgr, Kizoku
Download