Personal information

Activities

Works (2)

Finding evidence of wordlists being deployed against SSH honeypots - Implications and impacts

Proceedings of 12th Australian Digital Forensics Conference, ADF 2014
2014 | Conference paper
EID:

2-s2.0-85000995938

Contributors: Rabadia, P.; Valli, C.
Source: Self-asserted source
0000-0001-5092-3688 via Scopus - Elsevier

Patterns and patter - An investigation into ssh activity using Kippo honeypots

Proceedings of the 11th Australian Digital Forensics Conference, ADF 2013
2014 | Conference paper
EID:

2-s2.0-84917740808

Contributors: Valli, C.; Rabadia, P.; Woodward, A.
Source: Self-asserted source
0000-0001-5092-3688 via Scopus - Elsevier