http://researchonline.federation.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 Identifying cyber predators through forensic authorship analysis of chat logs http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4949 Wed 07 Apr 2021 13:44:32 AEST ]]> Malicious code detection using penalized splines on OPcode frequency http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4948 Wed 07 Apr 2021 13:44:32 AEST ]]> Analysis of firewall log-based detection scenarios for evidence in digital forensics http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4801 Wed 07 Apr 2021 13:44:21 AEST ]]>