Ben Martini

University of South Australia

37-44 North Terrace, City West Campus

Adelaide, South Australia 5001

Australia

SCHOLARLY PAPERS

7

DOWNLOADS
Rank 30,645

SSRN RANKINGS

Top 30,645

in Total Papers Downloads

1,459

CITATIONS

3

Scholarly Papers (7)

1.

Cloud Computing and Digital Forensics

Martini B, Quick D and Choo K-K R 2013. Cloud Computing and Digital Forensics. In Kim, I-S, editor, Information Society and Cybercrime: Challenges for Criminology and Criminal Justice, Research Report Series 13-B-01: 111–125, Korean Institute of Criminology
Number of pages: 21 Posted: 11 Dec 2013
University of South Australia, Government of South Australia and The University of Texas at San Antonio
Downloads 414 (68,910)

Abstract:

Loading...

Computer Forensics, Cloud Computing, Cloud Forensics, Digital Forensics

2.

Cloud Computing and Its Implications for Cybercrime Investigations in Australia

Computer Law and Security Review 29(2): 152-163, 2013
Number of pages: 21 Posted: 17 Oct 2013
Monash University, University of South Australia and The University of Texas at San Antonio
Downloads 351 (83,609)
Citation 5

Abstract:

Loading...

Cloud computing, Cybercrime, Digital forensics, Law enforcement investigations, Mutual legal assistance, Australian Law, Council of Europe Convention on Cybercrime, Jurisdictional issues

3.

Building the Next Generation of Cyber Security Professionals

Martini B and Choo K-K R 2014. Building the next generation of cyber security professionals. In 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, 9-11 June 2014 (Forthcoming)
Number of pages: 13 Posted: 02 May 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 226 (133,515)

Abstract:

Loading...

Cyber Security Skills, Cyber Security Exercise, National Initiative for Cybersecurity Education (NICE), National Cybersecurity Workforce Framework, Situational Crime Prevention Theory

4.

Exfiltrating Data from Android Devices

Computers & Security, 2014, DOI: 10.1016/j.cose.2014.10.016
Number of pages: 28 Posted: 31 Oct 2014 Last Revised: 15 Nov 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 221 (136,410)

Abstract:

Loading...

Android, code injection, covert exfiltration, data exfiltration, inaudible transmission, mobile adversary model, reverse engineering, SMALI, SMS transmission

5.

Enhancing User Privacy on Android Mobile Devices via Permissions Removal

47th Annual Hawaii International Conference on System Sciences (HICSS), 2014
Number of pages: 10 Posted: 15 Oct 2013
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 97 (267,162)
Citation 3

Abstract:

Loading...

Android mobile devices, Android privacy, mobile privacy, permissions removal

6.

Remote Programmatic vCloud Forensics

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), September 2014, Forthcoming
Number of pages: 8 Posted: 22 Jul 2014
Ben Martini and Kim-Kwang Raymond Choo
University of South Australia and The University of Texas at San Antonio
Downloads 89 (282,260)

Abstract:

Loading...

Cloud forensics, Remote cloud forensic process, Remote evidence preservation, Remote evidence collection, vCloud

7.

Enforcing File System Permissions on Android External Storage

Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, September 2014, IEEE Computer Society Press, Forthcoming
Number of pages: 6 Posted: 22 Jul 2014
Quang Do, Ben Martini and Kim-Kwang Raymond Choo
University of South Australia, University of South Australia and The University of Texas at San Antonio
Downloads 61 (349,348)

Abstract:

Loading...

Android, external storage, file system, file system permissions, mobile device, mobile security, privacy, SD card