Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 161

Full-Text Articles in Entire DC Network

Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley Jan 2024

Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley

Theses: Doctorates and Masters

Understanding attitudes towards privacy and surveillance technologies used to enhance security objectives is a complex, but crucial aspect for policy makers to consider. Historically, terrorism-related incidents justified the uptake of surveillance practices. More recently however, biosecurity concerns have motivated nation-states to adopt more intrusive surveillance measures. There is a growing body of literature that supports the public’s desire to maintain privacy despite fears of biological or physical threats.

This research set out to explore attitudes towards privacy and surveillance in an Australian context. Throughout the course of this endeavour, the COVID-19 pandemic emerged bringing with it a variety of track …


Optimising A Defence-Aware Threat Modelling Diagram Incorporating A Defence-In-Depth Approach For The Internet-Of-Things, Menaka L. Godakanda Jan 2023

Optimising A Defence-Aware Threat Modelling Diagram Incorporating A Defence-In-Depth Approach For The Internet-Of-Things, Menaka L. Godakanda

Theses: Doctorates and Masters

Modern technology has proliferated into just about every aspect of life while improving the quality of life. For instance, IoT technology has significantly improved over traditional systems, providing easy life, time-saving, financial saving, and security aspects. However, security weaknesses associated with IoT technology can pose a significant threat to the human factor. For instance, smart doorbells can make household life easier, save time, save money, and provide surveillance security. Nevertheless, the security weaknesses in smart doorbells could be exposed to a criminal and pose a danger to the life and money of the household. In addition, IoT technology is constantly …


An Investigation Of Change In Drone Practices In Broadacre Farming Environments, Hrishikesh S. Neetye Jan 2023

An Investigation Of Change In Drone Practices In Broadacre Farming Environments, Hrishikesh S. Neetye

Theses: Doctorates and Masters

The application of drones in broadacre farming is influenced by novel and emergent factors. Drone technology is subject to legal, financial, social, and technical constraints that affect the Agri-tech sector. This research showed that emerging improvements to drone technology influence the analysis of precision data resulting in disparate and asymmetrically flawed Ag-tech outputs. The novelty of this thesis is that it examines the changes in drone technology through the lens of entropic decay. It considers the planning and controlling of an organisation’s resources to minimise harmful effects through systems change. The rapid advances in drone technology have outpaced the systematic …


An Investigation Into The Efficacy Of Url Content Filtering Systems, Brett Ronald Turner Jan 2021

An Investigation Into The Efficacy Of Url Content Filtering Systems, Brett Ronald Turner

Theses: Doctorates and Masters

Content filters are used to restrict to restrict minors from accessing to online content deemed inappropriate. While much research and evaluation has been done on the efficiency of content filters, there is little in the way of empirical research as to their efficacy. The accessing of inappropriate material by minors, and the role content filtering systems can play in preventing the accessing of inappropriate material, is largely assumed with little or no evidence. This thesis investigates if a content filter implemented with the stated aim of restricting specific Internet content from high school students achieved the goal of stopping students …


A Defensive Strategy For Detecting Targeted Adversarial Poisoning Attacks In Machine Learning Trained Malware Detection Models, Adrian Michael Wood Jan 2021

A Defensive Strategy For Detecting Targeted Adversarial Poisoning Attacks In Machine Learning Trained Malware Detection Models, Adrian Michael Wood

Theses: Doctorates and Masters

Machine learning is a subset of Artificial Intelligence which is utilised in a variety of different fields to increase productivity, reduce overheads, and simplify the work process through training machines to automatically perform a task. Machine learning has been implemented in many different fields such as medical science, information technology, finance, and cyber security. Machine learning algorithms build models which identify patterns within data, which when applied to new data, can map the input to an output with a high degree of accuracy. To build the machine learning model, a dataset comprised of appropriate examples is divided into training and …


A Comprehensive Analysis Of Smart Ship Systems And Underlying Cybersecurity Issues, Dennis Bothur Jan 2020

A Comprehensive Analysis Of Smart Ship Systems And Underlying Cybersecurity Issues, Dennis Bothur

Theses : Honours

The maritime domain benefits greatly from advanced technology and ubiquitous connectivity. From “smart” sensors to “augmented reality”, the opportunities to save costs and improve safety are endless. The aim of this dissertation is to study the capabilities of smart ship systems in the context of Internet-of-Things and analyse the potential cybersecurity risks and challenges that smart technologies may introduce into this accelerating digital economy.

The first part of this work investigates the architecture of a “Smart Ship System” and the primary subsystems, including the integrated bridge, navigation and communication systems, networking, operational systems, and sensor networks. The mapping of the …


Web Content Management System And Accessibility Awareness: A Comparative Study Of Novice Users And Accessibility Outcomes, Fatima Artiba Diaz Jan 2020

Web Content Management System And Accessibility Awareness: A Comparative Study Of Novice Users And Accessibility Outcomes, Fatima Artiba Diaz

Theses: Doctorates and Masters

Since its creation, the Web has progressively developed and become a vital source of information in every domain and for almost all people. It is crucial to guarantee that the information contained on the Web is available for everyone, especially for people with special needs. Removing accessibility barriers is fundamentally based on tools, skills and support of all contributors, particularly the content creators, to ensure information is navigable and usable in the context of the end users experience. Web Content Management Systems play a significant role in structuring, storing and provision content to the Web and have evolved to address …


Local Binary Pattern Based Algorithms For The Discrimination And Detection Of Crops And Weeds With Similar Morphologies, Vi Nguyen Thanh Le Jan 2020

Local Binary Pattern Based Algorithms For The Discrimination And Detection Of Crops And Weeds With Similar Morphologies, Vi Nguyen Thanh Le

Theses: Doctorates and Masters

In cultivated agricultural fields, weeds are unwanted species that compete with the crop plants for nutrients, water, sunlight and soil, thus constraining their growth. Applying new real-time weed detection and spraying technologies to agriculture would enhance current farming practices, leading to higher crop yields and lower production costs. Various weed detection methods have been developed for Site-Specific Weed Management (SSWM) aimed at maximising the crop yield through efficient control of weeds. Blanket application of herbicide chemicals is currently the most popular weed eradication practice in weed management and weed invasion. However, the excessive use of herbicides has a detrimental impact …


Iot-Mqtt Based Denial Of Service Attack Modelling And Detection, Naeem Firdous Syed Jan 2020

Iot-Mqtt Based Denial Of Service Attack Modelling And Detection, Naeem Firdous Syed

Theses: Doctorates and Masters

Internet of Things (IoT) is poised to transform the quality of life and provide new business opportunities with its wide range of applications. However, the bene_ts of this emerging paradigm are coupled with serious cyber security issues. The lack of strong cyber security measures in protecting IoT systems can result in cyber attacks targeting all the layers of IoT architecture which includes the IoT devices, the IoT communication protocols and the services accessing the IoT data. Various IoT malware such as Mirai, BASHLITE and BrickBot show an already rising IoT device based attacks as well as the usage of infected …


The Challenges Of Digital Legacy Management On The Value Of Digital Objects To Older Australians, Derani Nathasha Dissanayake Jun 2019

The Challenges Of Digital Legacy Management On The Value Of Digital Objects To Older Australians, Derani Nathasha Dissanayake

Theses: Doctorates and Masters

People spend a considerable amount of time and money in collecting digital objects. Nine out of ten Australians have a social media account but 83% of them have not discussed with their family members what should happen to their social media accounts when they die (Steen, D’Alessandro, Graves, Perkins, Genders, Barbera, Shi, McGrath & Davis, 2017). Only 3% of Australians who had a Will included social media accounts in their Wills. People collect digital objects yet little attention is paid to their preservation. 71% of Australians are unaware of what happens to their digital assets when they die (Ibid, 2017). …


Facial Re-Enactment, Speech Synthesis And The Rise Of The Deepfake, Nicholas Gardiner Jan 2019

Facial Re-Enactment, Speech Synthesis And The Rise Of The Deepfake, Nicholas Gardiner

Theses : Honours

Emergent technologies in the fields of audio speech synthesis and video facial manipulation have the potential to drastically impact our societal patterns of multimedia consumption. At a time when social media and internet culture is plagued by misinformation, propaganda and “fake news”, their latent misuse represents a possible looming threat to fragile systems of information sharing and social democratic discourse. It has thus become increasingly recognised in both academic and mainstream journalism that the ramifications of these tools must be examined to determine what they are and how their widespread availability can be managed.

This research project seeks to examine …


Learning To Grasp In Unstructured Environments With Deep Convolutional Neural Networks Using A Baxter Research Robot, Shehan Caldera Jan 2019

Learning To Grasp In Unstructured Environments With Deep Convolutional Neural Networks Using A Baxter Research Robot, Shehan Caldera

Theses: Doctorates and Masters

Recent advancements in Deep Learning have accelerated the capabilities of robotic systems in terms of visual perception, object manipulation, automated navigation, and human-robot collaboration. The capability of a robotic system to manipulate objects in unstructured environments is becoming an increasingly necessary skill. Due to the dynamic nature of these environments, traditional methods, that require expert human knowledge, fail to adapt automatically. After reviewing the relevant literature a method was proposed to utilise deep transfer learning techniques to detect object grasps from coloured depth images. A grasp describes how a robotic end-effector can be arranged to securely grasp an object and …


Anomaly Detection In Bacnet/Ip Managed Building Automation Systems, Matthew Peacock Jan 2019

Anomaly Detection In Bacnet/Ip Managed Building Automation Systems, Matthew Peacock

Theses: Doctorates and Masters

Building Automation Systems (BAS) are a collection of devices and software which manage the operation of building services. The BAS market is expected to be a $19.25 billion USD industry by 2023, as a core feature of both the Internet of Things and Smart City technologies. However, securing these systems from cyber security threats is an emerging research area. Since initial deployment, BAS have evolved from isolated standalone networks to heterogeneous, interconnected networks allowing external connectivity through the Internet. The most prominent BAS protocol is BACnet/IP, which is estimated to hold 54.6% of world market share. BACnet/IP security features are …


Evolving Gameplay Elements Into Virtual Terrains, Andrew Pech Jan 2018

Evolving Gameplay Elements Into Virtual Terrains, Andrew Pech

Theses: Doctorates and Masters

With advancements in technology, consumers are expecting higher quality and more detailed video game content. This puts a strain on video game companies and their developers as they are required to manually design and create increasingly complex video game content. Procedural content generation can alleviate this burden by using technology to automatically generate video game content, effectively reducing development time and budget. This thesis presents a novel approach towards procedurally generating video game terrains that meet a set of gameplay requirements as specified by the user. This approach uses a genetic algorithm to evolve a set of modifications that, when …


Automated Optical Mark Recognition Scoring System For Multiple-Choice Questions, Murtadha Alomran Jan 2018

Automated Optical Mark Recognition Scoring System For Multiple-Choice Questions, Murtadha Alomran

Theses: Doctorates and Masters

Multiple-choice questions are one of the questions commonly used in assessments. It is widely used because this type of examination can be an effective and reliable way to examine the level of student’s knowledge. So far, this type of examination can either be marked by hand or with specialised answer sheets and scanning equipment. There are specialised answer sheets and scanning equipment to mark multiple-choice questions automatically. However, these are expensive, specialised and restrictive answer sheets and optical mark recognition scanners.

This research aims to design and implement a multiple-choice answer sheet and a reliable image processing-based scoring system that …


A Framework For Development Of Android Mobile Electronic Prescription Transfer Applications In Compliance With Security Requirements Mandated By The Australian Healthcare Industry, Kyaw Kyaw Htat Jan 2018

A Framework For Development Of Android Mobile Electronic Prescription Transfer Applications In Compliance With Security Requirements Mandated By The Australian Healthcare Industry, Kyaw Kyaw Htat

Theses: Doctorates and Masters

This thesis investigates mobile electronic transfer of prescription (ETP) in compliance with the security requirements mandated by the Australian healthcare industry and proposes a framework for the development of an Android mobile electronic prescription transfer application. Furthermore, and based upon the findings and knowledge from constructing this framework, another framework is also derived for assessing Android mobile ETP applications for their security compliance.

The centralised exchange model-based ETP solution currently used in the Australian healthcare industry is an expensive solution for on-going use. With challenges such as an aging population and the rising burden of chronic disease, the cost of …


Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla Jan 2018

Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla

Theses: Doctorates and Masters

The rapid growth in global mobile phone users has resulted in an ever-increasing demand for bandwidth and enhanced quality-of-service (QoS). Several consortia comprising major international mobile operators, infrastructure manufacturers, and academic institutions are working to develop the next generation wireless communication systems fifth generation (5G) - to support high data rates and increased QoS. 5G systems are also expected to represent a greener alternative for communication systems, which is important because power consumption from the information and communication technology (ICT) sector is forecast to increase significantly by 2030. The deployment of ultra-dense heterogeneous small cell networks (SCNs) is expected to …


An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook Jan 2018

An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook

Theses: Doctorates and Masters

Care needs to be taken to reduce the number of people who are fearful and mistrustful of using ICT where that usage is forced upon them without choice or alternative. The growing incidence of mandatory and imposed online systems can result in confusion, misuse, fear, and rejection by people with only rudimentary ICT skills. A cohort where a high percentage of such people occur is older people, defined in this study as people over the age of 60 Examples of compulsory ICT interactions include some banks limiting bank statement access through online rather than paper-based options. Other examples include the …


Extraction Of Patterns In Selected Network Traffic For A Precise And Efficient Intrusion Detection Approach, Priya Naran Rabadia Jan 2018

Extraction Of Patterns In Selected Network Traffic For A Precise And Efficient Intrusion Detection Approach, Priya Naran Rabadia

Theses: Doctorates and Masters

This thesis investigates a precise and efficient pattern-based intrusion detection approach by extracting patterns from sequential adversarial commands. As organisations are further placing assets within the cyber domain, mitigating the potential exposure of these assets is becoming increasingly imperative. Machine learning is the application of learning algorithms to extract knowledge from data to determine patterns between data points and make predictions. Machine learning algorithms have been used to extract patterns from sequences of commands to precisely and efficiently detect adversaries using the Secure Shell (SSH) protocol. Seeing as SSH is one of the most predominant methods of accessing systems it …


A Sound Idea: An Investigation Into Accessible Video Game Design For The Deaf And Hard Of Hearing, Luke James Brook Jan 2017

A Sound Idea: An Investigation Into Accessible Video Game Design For The Deaf And Hard Of Hearing, Luke James Brook

Theses: Doctorates and Masters

A widely accepted, and incorrect, assumption towards hearing accessibility in video games is that deaf and hard of hearing (DHH) users are those who encounter the least barriers and are generally well catered for. Rapid advancement in video game technology has seen video game sound evolve from simple blips generated by internal circuitry to fully realised digital audio used to convey critical information. To accommodate the DHH, this information needs to be conveyed in an alternative manner. However, evidence suggests existing accessible design solutions for the DHH lack specificity and are insufficient. Thus, the inability to hear, or hear well, …


A Non-Device Specific Framework For The Development Of Forensic Locational Data Analysis Procedure For Consumer Grade Small And Embedded Devices, Peter Hannay Jan 2017

A Non-Device Specific Framework For The Development Of Forensic Locational Data Analysis Procedure For Consumer Grade Small And Embedded Devices, Peter Hannay

Theses: Doctorates and Masters

Portable and wearable computing devices such as smart watches, navigation units, mobile phones, and tablet computers commonly ship with Global Navigation Satellite System (GNSS) supported locational awareness. Locational functionality is no longer limited to navigation specific devices such as satellite navigation devices and location tracking systems. Instead the use of these technologies has extended to become secondary functionality on many devices, including mobile phones, cameras, portable computers, and video game consoles. The increase in use of location aware technology is of use to forensic investigators as it has the potential to provide historic locational information. The evidentiary value of these …


Denial-Of-Service Attack Modelling And Detection For Http/2 Services, Erwin Adi Jan 2017

Denial-Of-Service Attack Modelling And Detection For Http/2 Services, Erwin Adi

Theses: Doctorates and Masters

Businesses and society alike have been heavily dependent on Internet-based services, albeit with experiences of constant and annoying disruptions caused by the adversary class. A malicious attack that can prevent establishment of Internet connections to web servers, initiated from legitimate client machines, is termed as a Denial of Service (DoS) attack; volume and intensity of which is rapidly growing thanks to the readily available attack tools and the ever-increasing network bandwidths. A majority of contemporary web servers are built on the HTTP/1.1 communication protocol. As a consequence, all literature found on DoS attack modelling and appertaining detection techniques, addresses only …


Unsupervised Monitoring Of An Elderly Person's Activities Of Daily Living Using Kinect Sensors And A Power Meter, Hossein Pazhoumand-Dar Jan 2017

Unsupervised Monitoring Of An Elderly Person's Activities Of Daily Living Using Kinect Sensors And A Power Meter, Hossein Pazhoumand-Dar

Theses: Doctorates and Masters

The need for greater independence amongst the growing population of elderly people has made the concept of “ageing in place” an important area of research. Remote home monitoring strategies help the elderly deal with challenges involved in ageing in place and performing the activities of daily living (ADLs) independently. These monitoring approaches typically involve the use of several sensors, attached to the environment or person, in order to acquire data about the ADLs of the occupant being monitored.

Some key drawbacks associated with many of the ADL monitoring approaches proposed for the elderly living alone need to be addressed. These …


Penetration Testing Frameworks And Methodologies: A Comparison And Evaluation, Aleatha Shanley Jan 2016

Penetration Testing Frameworks And Methodologies: A Comparison And Evaluation, Aleatha Shanley

Theses : Honours

Cyber security is fast becoming a strategic priority across both governments and private organisations. With technology abundantly available, and the unbridled growth in the size and complexity of information systems, cyber criminals have a multitude of targets. Therefore, cyber security assessments are becoming common practice as concerns about information security grow. Penetration testing is one strategy used to mitigate the risk of cyber-attack. Penetration testers attempt to compromise systems using the same tools and techniques as malicious attackers thus, aim to identify vulnerabilities before an attack occurs. Penetration testing can be complex depending on the scope and domain area under …


The Corporate Security Stratum Of Work: Identifying Levels Of Work In The Domain, Codee Roy Ludbey Jan 2016

The Corporate Security Stratum Of Work: Identifying Levels Of Work In The Domain, Codee Roy Ludbey

Theses : Honours

Corporate security is a practicing domain and developing academic discipline that provides for the protection of people, information and assets, as well as the self-protection of organisations. Fayol (1949) articulated such an activity within organisations to be a core business function of significant importance; embedding security operations within all aspects of organisational work. This embedded nature of security within organisations has led to difficulty in the literature delineating roles and responsibilities of security practitioners; consequently leading to a nebulous understanding of security as a whole. Therefore, an investigation of the corporate security stratum of work has been undertaken to address …


An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene Jan 2016

An Investigation Into Off-Link Ipv6 Host Enumeration Search Methods, Clinton Carpene

Theses: Doctorates and Masters

This research investigated search methods for enumerating networked devices on off-link 64 bit Internet Protocol version 6 (IPv6) subnetworks. IPv6 host enumeration is an emerging research area involving strategies to enable detection of networked devices on IPv6 networks. Host enumeration is an integral component in vulnerability assessments (VAs), and can be used to strengthen the security profile of a system. Recently, host enumeration has been applied to Internet-wide VAs in an effort to detect devices that are vulnerable to specific threats. These host enumeration exercises rely on the fact that the existing Internet Protocol version 4 (IPv4) can be exhaustively …


Web Accessibility Compliance For E-Government Websites In The Gulf Region, Muhammad Saleem Jan 2016

Web Accessibility Compliance For E-Government Websites In The Gulf Region, Muhammad Saleem

Theses: Doctorates and Masters

The World Wide Web is a digital platform that helps people access and retrieve information in an accessible and equitable manner. However, people with disabilities can face a number of challenges when it comes to using the Web and accessing content on websites. According to Henry, web accessibility means “that people with disabilities can use the Web. More specifically, Web accessibility means that people with disabilities can perceive, understand, navigate, and interact with the Web, and that they can contribute to the Web” (2005, para.1). While different countries across the globe tackle issues of equitable access to the web via …


Accessibility Of Thai University Websites: Awareness, Barriers And Drivers For Accessible Practice, Rattanavalee Maisak Jan 2015

Accessibility Of Thai University Websites: Awareness, Barriers And Drivers For Accessible Practice, Rattanavalee Maisak

Theses: Doctorates and Masters

Governments and organizations have to respond to a range of legislative and policy initiatives intended to promote equal opportunity for all. The Thai government has passed a number of laws which aim to protect its citizens from discrimination and from breaches of their human rights by government departments and agencies. The Persons with Disabilities Education Act B.E. 2551 (2008) and the Thailand Information and Communication Technology (ICT) Policy Framework (2011-2020) required government agencies to delivery equal education and access to online information for all Thais. Most Thai universities receive government subsidies, and therefore have an obligation to contribute to national …


Improving Energy Efficiency And Quality Of Service In An Integrated Wireless-Optical Broadband Access Network, Maha Shihab Ahmed Jan 2015

Improving Energy Efficiency And Quality Of Service In An Integrated Wireless-Optical Broadband Access Network, Maha Shihab Ahmed

Theses: Doctorates and Masters

Exponential growth in the volume of wireless data, boosted by the growing popularity of mobile devices such as smart phones and tablets, is forcing telecommunication industries to rethink network design, and focus on developing high capacity mobile broadband networks. Accordingly, researchers have undertaken developmental work for an integrated wireless-optical broadband access network (WOBAN). Passive optical networks (PONs) and fourth generation (4G) wireless networks are two major candidate technologies for the WOBAN. PON is a wired access technology, well-known for its high capacity, whereas 4G is a wireless broadband access technology, popular for its ease of deployment and ability to offer …


Intensity Based Interrogation Of Optical Fibre Sensors For Industrial Automation And Intrusion Detection Systems, Gary Andrew Allwood Jan 2015

Intensity Based Interrogation Of Optical Fibre Sensors For Industrial Automation And Intrusion Detection Systems, Gary Andrew Allwood

Theses: Doctorates and Masters

In this study, the use of optical fibre sensors for intrusion detection and industrial automation systems has been demonstrated, with a particular focus on low cost, intensity-based, interrogation techniques. The use of optical fibre sensors for intrusion detection systems to secure residential, commercial, and industrial premises against potential security breaches has been extensively reviewed in this thesis. Fibre Bragg grating (FBG) sensing is one form of optical fibre sensing that has been underutilised in applications such as in-ground, in-fence, and window and door monitoring, and addressing that opportunity has been a major goal of this thesis. Both security and industrial …