Peer-reviewed and non-peer-reviewed papers written by SecurityBible Networks members for conferences.
Digital Forensics Papers
Paper Title | Author | Date | Publication | Download |
From Criminal to Digital Criminal Profiling: Advances in Criminal Profiling in the Digital Age | Chlapoutakis G. | 07/09/2012 | CFET 2012: The 6 th International Conference on Cybercrime Forensics Education & Training, Canterbury, Kent, UK, ISBN: 978-1-899253-94-4 | Download |
The Case of the Plan R* Network of Resistant Communication: Implications to Digital Forensic Investigations | Chlapoutakis G. | 05/2009 | Emerging Advances in Digital Evidence, 3rd Year Digital Evidence Development Conference 2009, Teeside, UK | Download |
The Development of a Modular Software Framework for a Distributed Forensic Attack Profiling Network | Chlapoutakis G., Marshall A. | 09-11/07/2008 | British Society of Criminology 2008, 9-11 July, Huddersfield, UK | Download |
To catch a cyberthief: legal and technical issues in network monitoring for cyberprofiling | Marshall A.M., Tompsett B.C., Zeus-Brown A.M., Chlapoutakis G. | 03/2008 | BILETA2008: Law Shaping Technology; Technology Shaping the Law, Glasgow Caledonian University, Glasgow, UK | Download |
Use of Network Monitoring & Analysis Tools and Methodologies in Digital Forensic Investigations | Chlapoutakis G. | 03/2008 | Emerging Advances in Digital Evidence, 3rd Year Digital Evidence Development Conference 2008, Teeside, UK | Download |
Network Security Papers
Paper Title | Author | Date | Publication | Download |
Using PFSense and Commodity Hardware as a Medium Interaction Honey-net | Chlapoutakis G., Laskos A., Brooke P.J., Truran M. | 09/2010 | CFET 2010: The 4th International Conference on Cybercrime Forensics Education & Training, Canterbury, Kent, UK | Download |
Bluetooth Security: Vulnerabilities, Attacks & Defense | Chlapoutakis G. | 2005 | MSc Internet Engineering, University of Sunderland | Download |
Linux Security: Tools and Methods | Chlapoutakis G. | 2004 | Chapter from BSc Computing Dissertation, University of Sunderland | Download |
Intrusion Detection Systems | Chlapoutakis G. | 2004 | Chapter from BSc Computing Dissertation, University of Sunderland | Download |
Why DROPping ALL 65535 ports is bad and nasty | Chlapoutakis G. | 2002 | University of Sunderland Cheers and thanks go to: SecurityBible, UHAgr, Kizoku | Download |