Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- [ECUPub] (36)
- [RSTDPub] (29)
- [aism] (18)
- Security (12)
- Environment (9)
-
- Flora (5)
- Honeypot (5)
- Computer security (4)
- Forensic (4)
- Forensics (4)
- Biometric (3)
- Data Mining (3)
- Ecosystem (3)
- Erasure (3)
- Estimation (3)
- Fauna (3)
- Firearm identification (3)
- Firewall (3)
- Habitat (3)
- IDS (3)
- Information security (3)
- Measurement (3)
- Medical (3)
- Network security (3)
- SCADA (3)
- Vegetation (3)
- Volatility (3)
- Wetlands (3)
- Access control (2)
- Aquaculture (2)
- Publication Year
Articles 1 - 30 of 215
Full-Text Articles in Entire DC Network
Redtnet: A Network Model For Strategy Games, Philip Hingston, Mike Preuss, Daniel Spierling
Redtnet: A Network Model For Strategy Games, Philip Hingston, Mike Preuss, Daniel Spierling
Research outputs pre 2011
In this work, we develop a simple, graph-based framework, RedTNet, for computational modeling of strategy games and simulations. The framework applies the concept of red teaming as a means by which to explore alternative strategies. We show how the model supports computer-based red teaming in several applications: realtime strategy games and critical infrastructure protection, using an evolutionary algorithm to automatically detect good and often surprising strategies.
Light Reductions Drive Macroinvertebrate Changes In Amphibolis Griffithii Seagrass Habitat, Adam Gartner, Paul S. Lavery, Kathryn Mcmahon, Anne Brearley, Helen Barwick
Light Reductions Drive Macroinvertebrate Changes In Amphibolis Griffithii Seagrass Habitat, Adam Gartner, Paul S. Lavery, Kathryn Mcmahon, Anne Brearley, Helen Barwick
Research outputs pre 2011
Numerous anthropogenic activities can significantly reduce the amount of light reaching seagrass habitats. Typically these result in morphological and physiological changes to the plant and associated algal epiphytes. However, the flow-on effects to seagrass-dependent fauna induced by these disturbances has yet to be examined. This study investigated the effects of different light reduction intensity (high: ~92% reduction; moderate: ~84% reduction), duration (3, 6 and 9 mo) and timing (post-winter and post-summer) on the density and biomass of macroinvertebrate epifauna within an Amphibolis griffithii seagrass ecosystem (Western Australia). There were generally lower epifauna densities and biomass within shaded seagrass plots. When …
Android Forensics: Simplifying Cell Phone Examinations, Jeff Lessard, Gary Kessler
Android Forensics: Simplifying Cell Phone Examinations, Jeff Lessard, Gary Kessler
Research outputs pre 2011
It is hardly appropriate to call the devices many use to receive the occasional phone call a telephone any more. The capability of these devices is growing, as is the number of people utilizing them. By the end of 2009, 46.3% of mobile phones in use in the United States were reported to be smart phones (AdMob, 2010). With the increased availability of these powerful devices, there is also a potential increase for criminals to use this technology as well. Criminals could use smart phones for a number of activities such as committing fraud over e-mail, harassment through text messages, …
How Do You Make Information Security User Friendly?, Andrew Jones
How Do You Make Information Security User Friendly?, Andrew Jones
Research outputs pre 2011
This article explores the past and the present situation, outlines a new approach, and presents conclusions.
Autonomous Bee Colony Optimization For Multi-Objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, M Chandramohan
Autonomous Bee Colony Optimization For Multi-Objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, M Chandramohan
Research outputs pre 2011
An Autonomous Bee Colony Optimization (A-BCO) algorithm for solving multi-objective numerical problems is proposed. In contrast with previous Bee Colony algorithms, A-BCO utilizes a diversity-based performance metric to dynamically assess the archive set. This assessment is employed to adapt the bee colony structures and flying patterns. This self-adaptation feature is introduced to optimize the balance between exploration and exploitation during the search process. Moreover, the total number of search iterations is also determined/optimized by A-BCO, according to user pre-specified conditions, during the search process. We evaluate A-BCO upon numerical benchmark problems and the experimental results demonstrate the effectiveness and robustness …
A New Design For A Turing Test For Bots, Philip Hingston
A New Design For A Turing Test For Bots, Philip Hingston
Research outputs pre 2011
Interesting, human-like opponents add to the entertainment value of a video game, and creating such opponents is a difficult challenge for programmers. Can artificial intelligence and computational intelligence provide the means to convincingly simulate a human opponent? Or are simple programming tricks and deceptions more effective? To answer these questions, the author designed and organised a game bot programming competition, the BotPrize, in which competitors submit bots that try to pass a “Turing Test for Bots”. In this paper, we describe a new design for the competition, which will make it simpler to run, and, we hope, open up new …
An Analysis Of Information Security Awareness Within Home And Work Environments, Shuhaili Talib, Nathan Clarke, Steven Furnell
An Analysis Of Information Security Awareness Within Home And Work Environments, Shuhaili Talib, Nathan Clarke, Steven Furnell
Research outputs pre 2011
As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative. Unfortunately, it has long been understood that good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect yourself is required from users. Whilst many initiatives, programs and strategies have been proposed to improve the level of information security awareness, most have been directed at organizations, with a few national programs focused upon home users. Given people's use of technology is primarily focused upon those two areas: …
Official/ Unofficial: Information Management And Social Association, Kay Hearn
Official/ Unofficial: Information Management And Social Association, Kay Hearn
Research outputs pre 2011
This paper explores the debates around civil society and corporatism as ways of understanding changes in social association, including non-governmental organisations and protest groups, and information management in relation to the development of the Internet. Both concepts have been used to examine the changes that have taken place since the implementation of the Open Door Policy and more recently the development of the Internet, and have shed light on the way in which new forms of social association operate, and on their relationship to the government. However, both concepts tend to be deterministic and eductionist positions. Instead, I use a …
A Novel Binarization Algorithm For Ballistics Imaging Systems, Zhihu Huang, Jinsong Leng
A Novel Binarization Algorithm For Ballistics Imaging Systems, Zhihu Huang, Jinsong Leng
Research outputs pre 2011
The identification of ballistics specimens from imaging systems is of paramount importance in criminal investigation. Binarization plays a key role in preprocess of recognizing cartridges in the ballistic imaging systems. Unfortunately, it is very difficult to get the satisfactory binary image using existing binary algorithms. In this paper, we utilize the global and local thresholds to enhance the image binarization. Importantly, we present a novel criterion for effectively detecting edges in the images. Comprehensive experiments have been conducted over sample ballistic images. The empirical results demonstrate the proposed method can provide a better solution than existing binary algorithms.
The Adsl Router Forensics Process, Patryk Szewczyk
The Adsl Router Forensics Process, Patryk Szewczyk
Research outputs pre 2011
In 2010 the number of threats targeting ADSL routers is continually increasing. New and emergent threats have been developed to bypass authentication processes and obtain admin privileges directly to the device. As a result many malicious attempts are being made to alter the configuration data and make the device subsequently vulnerable. This paper discusses the non-invasive digital forensics approach into extracting evidence from ADSL routers. Specifically it validates an identified digital forensic process of acquisition. The paper then discusses how the approach may be utilised to extract configuration data ever after a device has been compromised to the point where …
Digital Forensics And The Issues Of Identity, Andrew Jones, Thomas Martin
Digital Forensics And The Issues Of Identity, Andrew Jones, Thomas Martin
Research outputs pre 2011
The issue of what we consider to be the identity of a person has become increasingly complex as we have made ever greater use of the facilities and services that have been made available by developing technologies and the Internet. In the past people normally had one identity, while in the current environment it is acceptable to maintain separate ‘identities’ for different aspects of our on-line interactions. Proving beyond a reasonable doubt that an individual that is suspected of a crime that is based on the technologies that we increasingly rely on was the actual perpetrator has always been problematic. …
Evolving Group Strategies For Ipd, Philip Hingston
Evolving Group Strategies For Ipd, Philip Hingston
Research outputs pre 2011
The Iterated Prisoners Dilemma (IPD) is often used to model cooperation between self-interested agents. In an earlier study, we introduced a framework using IPD to study the effects of species-level competition on the evolution of cooperative behaviour. In this paper, we extend the previous work, using co-evolutionary simulations of interactions between species of IPD-playing agents to investigate how group strategies may evolve. We find that the ability to cooperate more with agents of the same species greatly increases the ferocity of competition between species.
A Novel Subspace Outlier Detection Approach In High Dimensional Data Sets, Jinsong Leng
A Novel Subspace Outlier Detection Approach In High Dimensional Data Sets, Jinsong Leng
Research outputs pre 2011
Many real applications are required to detect outliers in high dimensional data sets. The major difficulty of mining outliers lies on the fact that outliers are often embedded in subspaces. No efficient methods are available in general for subspace-based outlier detection. Most existing subspacebased outlier detection methods identify outliers by searching for abnormal sparse density units in subspaces. In this paper, we present a novel approach for finding outliers in the ‘interesting’ subspaces. The interesting subspaces are strongly correlated with `good' clusters. This approach aims to group the meaningful subspaces and then identify outliers in the projected subspaces. In doing …
A Wrapper-Based Feature Selection For Analysis Of Large Data Sets, Jinsong Leng, Craig Valli, Leisa Armstrong
A Wrapper-Based Feature Selection For Analysis Of Large Data Sets, Jinsong Leng, Craig Valli, Leisa Armstrong
Research outputs pre 2011
Knowledge discovery from large data sets using classic data mining techniques has been proved to be difficult due to large size in both dimension and samples. In real applications, data sets often consist of many noisy, redundant, and irrelevant features, resulting in degrading the classification accuracy and increasing the complexity exponentially. Due to the inherent nature, the analysis of the quality of data sets is difficult and very limited approaches about this issue can be found in the literature. This paper presents a novel method to investigate the quality and structure of data sets, i.e., how to analyze whether there …
Ignorant Experts: Computer And Network Security Support From Internet Service Providers, Patryk Szewczyk, Craig Valli
Ignorant Experts: Computer And Network Security Support From Internet Service Providers, Patryk Szewczyk, Craig Valli
Research outputs pre 2011
The paper examines the advice and support provided by seven major Internet Service Providers in Australia through late 2009 and early 2010 in relation to computer and network security. Previous research has indicated that many end-users will attempt to utilise the support provided by Internet Service Providers as a simple and effective method by which to obtain key information in regards to computer security. This paper demonstrates that in many cases the individuals working at the help desk are either reluctant to provide IT security support or have insufficient skill to provide the correct information.
Behaviour Profiling On Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, Paul Dowland
Behaviour Profiling On Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, Paul Dowland
Research outputs pre 2011
Over the last decade, the mobile device has become a ubiquitous tool within everyday life. Unfortunately, whilst the popularity of mobile devices has increased, a corresponding increase can also be identified in the threats being targeted towards these devices. Security countermeasures such as AV and firewalls are being deployed, however, the increasing sophistication of the attacks requires additional measures to be taken. This paper proposes a novel behaviour-based profiling technique that is able to build upon the weaknesses of current systems by developing a comprehensive multilevel approach to profiling. In support of this model, a series of experiments have been …
A Distributed And Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, P L Reynolds
A Distributed And Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, P L Reynolds
Research outputs pre 2011
As the requirement for companies and individuals to protect information and personal details comes more into focus, the implementation of security that goes beyond the ubiquitous password or Personal Identification Number (PIN) is paramount. With the ever growing number of us utilizing more than one device simultaneously, the problem and need is compounded. This paper proposes a novel approach to security that leverages the collective confidence of user identity held by the multiplicity of devices present at any given time. User identity confidence is reinforced by sharing established credentials between devices, enabling them to make informed judgments on their own …
An Online Ballistics Imaging System For Firearm Identification, Zhihu Huang, Jinsong Leng
An Online Ballistics Imaging System For Firearm Identification, Zhihu Huang, Jinsong Leng
Research outputs pre 2011
Since the traditional ballistics imaging system is dependent upon the expertise and experience of end-user, an intelligent ballistics imaging system is highly demanded to overcome the drawbacks of traditional techniques. This paper aims to develop a novel ballistics imaging system so as to combine the traditional functions with new features such as the line-scan image module, the characteristics extraction module, and the intelligent image processing module. With the help of these features, the new system can identify firearm more efficiently and effectively than the traditional techniques.
Analysis Of Hu's Moment Invariants On Image Scaling And Rotation, Zhihu Huang, Jinsong Leng
Analysis Of Hu's Moment Invariants On Image Scaling And Rotation, Zhihu Huang, Jinsong Leng
Research outputs pre 2011
Moment invariants have been widely applied to image pattern recognition in a variety of applications due to its invariant features on image translation, scaling and rotation. The moments are strictly invariant for the continuous function. However, in practical applications images are discrete. Consequently, the moment invariants may change over image geometric transformation. To address this research problem, an analysis with respect to the variation of moment invariants on image geometric transformation is presented, so as to analyze the effect of image's scaling and rotation. Finally, the guidance is also provided for minimizing the fluctuation of moment invariants.
Employee Engagement With A Corporate Physical Activity Program: The Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, Nadine Henley
Employee Engagement With A Corporate Physical Activity Program: The Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, Nadine Henley
Research outputs pre 2011
Employers engage with corporate physical activity programs to foster employee wellbeing with a view to reducing the costs of absence and recruitment. This study reports on employee engagement with a commercial program, the Global Corporate Challenge, in terms of motivation, barriers, team dynamics, social aspects and self-reported physical activity levels. It uses guided introspection to explore how participation affected employee's motivation to sustain regular physical activity within the workplace setting. The program raised awareness of employees' individual physical activity levels and fostered social interaction in the workplace. Findings highlight the importance of employers providing a supportive context, fostering staff-led team …
Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen
Application Of A Data Mining Framework For The Identification Of Agricultural Production Areas In Wa, Yunous Vagh, Leisa Armstrong, Dean Diepeveen
Research outputs pre 2011
This paper will propose a data mining framework for the identification of agricultural production areas ill WA. The data mining (DM) framework was developed with the aim of enhancing the analysis of agricultural datasets compared to currently used statistical methods. The DM framework is a synthesis of different technologies brought together for the purpose of enhancing the interrogation of these datasets. The DM framework is based on the data, information, knowledge and wisdom continuum as a horizontal axis, with DM and online analytical processing (OLAP) forming the vertical axis. In addition the DM framework incorporates aspects of data warehousing phases, …
The Significance Of Learning Style With Respect To Achievement In First Year Programming Students, Vivian Campbell, Michael Johnstone
The Significance Of Learning Style With Respect To Achievement In First Year Programming Students, Vivian Campbell, Michael Johnstone
Research outputs pre 2011
Study investigates the relationship between the Kolb learning style of first-year programming students and their level of achievement. The method of data collection is described and the process of hypothesis testing is explained. The students in this study were predominately converger and accommodator learning styles. Statistical tests indicated no overall difference between the results of students with different learning styles but a difference was found along Kolb's concrete-abstract axis. A number of possible impacts on teaching are discussed and suggestions made for future research.
Stable Isotopes Reveal A Consistent Consumer-Diet Relationship Across Hundreds Of Kilometres, Mathew A. Vanderklift, Thomas Wernberg
Stable Isotopes Reveal A Consistent Consumer-Diet Relationship Across Hundreds Of Kilometres, Mathew A. Vanderklift, Thomas Wernberg
Research outputs pre 2011
Characterising geographical variation in trophic interactions is an important step towards understanding the consequences of changes in food webs. We characterised geographical variation across ~1000 km in stable isotope values (δ15N and δ13C) of the widely distributed sea urchin Heliocidaris erythrogramma and macroalgae that are its potential food. Variation in δ15N of H. erythrogramma and macroalgae was typically greatest among locations separated by hundreds of km, while variation in δ13C was typically greatest among reefs separated by a few km. Geographical variation in δ15N and δ13C of H. erythrogramma was well-explained by variation in δ15N and δ13C of the kelp …
Interrogation Of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, Dean Diepeveen
Interrogation Of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, Dean Diepeveen
Research outputs pre 2011
Current environmental challenges such as increasing dry land salinity, water logging, eutrophication and high nutrient runoff in south western regions of Western Australia (WA) may have both cultural and environmental implications in the near future. Advances in computing through the application of data mining ,and geographic information services provide the tools to conduct •studies that can indicate possible changes in these water catchment areas of WA. The research examines the existing spatial data mining techniques that can be used to interpret trends in WA water catchment land use. Large GIS data sets of the water catchments on Peel-Harvey region have …
Proximity To Rocky Reefs Alters The Balance Between Positive And Negative Effects On Seagrass Fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, Christine Hanson
Proximity To Rocky Reefs Alters The Balance Between Positive And Negative Effects On Seagrass Fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, Christine Hanson
Research outputs pre 2011
Proximity to habitat margins can alter the balance between positive and negative forces on species abundance. Based on this idea we examined abundance patterns of herbivorous gastropods in seagrasses adjacent to rocky reefs. We tested whether the balance between the intensity of predation (negative effect) and recruitment of new individuals (positive effect) changes with increasing distance from reefs. Abundances of gastropods varied with distance to reefs, but the direction of changes in abundance was taxon-specific: some taxa decreased in abundance with increasing distance from reefs (e.g. Pyrene bidentata), while others showed the opposite pattern (e.g. Cantharidus lepidus). Predators were more …
Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe
Photonic-Based Multi-Wavelength Sensor For Object Identification, Kavitha Venkataraayan, Sreten Askraba, Kamal Alameh, John Rowe
Research outputs pre 2011
A Photonic-based multi-wavelength sensor capable of discriminating objects is proposed and demonstrated for intruder detection and identification. The sensor uses a laser combination module for input wavelength signal multiplexing and beam overlapping, a custom-made curved optical cavity for multi-beam spot generation through internal beam reflection and transmission and a high-speed imager for scattered reflectance spectral measurements. Experimental results show that five different wavelengths, namely 473nm, 532nm, 635nm, 670nm and 785nm, are necessary for discriminating various intruding objects of interest through spectral reflectance and slope measurements. Objects selected for experiments were brick, cement sheet, cotton, leather and roof tile.
Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli
Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli
Research outputs pre 2011
Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.
A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen
A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen
Research outputs pre 2011
We introduce in this paper a new semiparametric approach to a nonlinear ACD model, namely the Semiparametric ACD (SEMI-ACD) model. This new model is more flexible in the sense that the data are allowed to speak for themselves, without a hypothetical assumption being imposed arbitrarily on its key component. Moreover, it enables a much more thorough examination of the intertemporal importance of the conditional duration on the ACD process. Our experimental analysis suggests that the new model possesses a sound asymptotic character, while its performance is also robust across data generating processes and assumptions about the conditional distribution of the …
Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris
Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris
Research outputs pre 2011
Autoregressive conditional duration (ACD) models play an important role in financial modeling. This paper considers the estimation of the Weibull ACD model using a semiparametric approach based on the theory of estimating functions (EF). We apply the EF and the maximum likelihood (ML) methods to a data set given in Tsay (2003, p203) to compare these two methods. It is shown that the EF approach is easier to apply in practice and gives better estimates than the MLE. Results show that the EF approach is compatible with the ML method in parameter estimation. Furthermore, the computation speed for the EF …
A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao
A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao
Research outputs pre 2011
An important issue in protocol conformance testing is how to generate test sequences in an efficient and effective way that achieves the required fault detection coverage. We proposed an approach for finding shorter test sequences for protocol conformance testing based on the Wp method in our previous work. While the method generated good quality test sequences, an extra leading sequence may have to be added if the final test sequence generated was not started from the same starting state of the given FSM. A new approach is proposed in this paper to overcome this problem thus to improve the quality …