Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Entire DC Network

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli Jan 2009

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli

Research outputs pre 2011

Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.


A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen Jan 2009

A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen

Research outputs pre 2011

We introduce in this paper a new semiparametric approach to a nonlinear ACD model, namely the Semiparametric ACD (SEMI-ACD) model. This new model is more flexible in the sense that the data are allowed to speak for themselves, without a hypothetical assumption being imposed arbitrarily on its key component. Moreover, it enables a much more thorough examination of the intertemporal importance of the conditional duration on the ACD process. Our experimental analysis suggests that the new model possesses a sound asymptotic character, while its performance is also robust across data generating processes and assumptions about the conditional distribution of the …


Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris Jan 2009

Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris

Research outputs pre 2011

Autoregressive conditional duration (ACD) models play an important role in financial modeling. This paper considers the estimation of the Weibull ACD model using a semiparametric approach based on the theory of estimating functions (EF). We apply the EF and the maximum likelihood (ML) methods to a data set given in Tsay (2003, p203) to compare these two methods. It is shown that the EF approach is easier to apply in practice and gives better estimates than the MLE. Results show that the EF approach is compatible with the ML method in parameter estimation. Furthermore, the computation speed for the EF …


A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao Jan 2009

A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao

Research outputs pre 2011

An important issue in protocol conformance testing is how to generate test sequences in an efficient and effective way that achieves the required fault detection coverage. We proposed an approach for finding shorter test sequences for protocol conformance testing based on the Wp method in our previous work. While the method generated good quality test sequences, an extra leading sequence may have to be added if the final test sequence generated was not started from the same starting state of the given FSM. A new approach is proposed in this paper to overcome this problem thus to improve the quality …


Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward Jan 2009

Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. SCADA systems have unique security and operational requirements. However, many of the most basic security measures are missing in these networks. This examines some of these issues and proposes some technologies that could help secure these networks from attack.


Scada Forensics With Snort Ids, Craig Valli Jan 2009

Scada Forensics With Snort Ids, Craig Valli

Research outputs pre 2011

This paper is a research in progress paper outlining an approach using open source IDS (Snort) and honeypot (nepenthes, honeyd) technologies to create a resilient layered defensive approach for SCADA and control systems networks.


Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li Jan 2009

Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li

Research outputs pre 2011

Firearm identification is an intensive and time-consuming process that requires physical interpretation of forensic ballistics evidence. Especially as the level of violent crime involving firearms escalates, the number of firearms to be identified accumulates dramatically. The demand for an automatic firearm identification system arises. This chapter proposes a new, analytic system for automatic firearm identification based on the cartridge and projectile specimens. Not only do we present an approach for capturing and storing the surface image of the spent projectiles at high resolution using line-scan imaging technique for the projectiles database, but we also present a novel and effective FFT-based …


A Max-Min Multiobjective Technique To Optimize Model Based Test Suite, Usman Farooq, Chiou P. Lam Jan 2009

A Max-Min Multiobjective Technique To Optimize Model Based Test Suite, Usman Farooq, Chiou P. Lam

Research outputs pre 2011

Generally, quality software production seeks timely delivery with higher productivity at lower cost. Redundancy in a test suite raises the execution cost and wastes scarce project resources. In model-based testing, the testing process starts with earlier software developmental phases and enables fault detection in earlier phases. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The paper presents a novel max-min multiobjective technique incorporated into a test suite optimization framework to find a better trade-off between the intrinsically conflicting goals. For illustration two objectives i.e. coverage and size …


Evolving The Quality Of A Model-Based Test Suite, Usman Farooq, Chiou P. Lam Jan 2009

Evolving The Quality Of A Model-Based Test Suite, Usman Farooq, Chiou P. Lam

Research outputs pre 2011

Redundant test cases in newly generated test suites often remain undetected until execution and waste scarce project resources. In model-based testing, the testing process starts early on in the developmental phases and enables early fault detection. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The article presents a novel model-based test suite optimization technique involving UML activity diagrams by formulating the test suite optimization problem as an Equality Knapsack Problem. The aim here is the development of a test suite optimization framework that could optimize the model-based …


Iterated Prisoner's Dilemma For Species, Philip Hingston Jan 2009

Iterated Prisoner's Dilemma For Species, Philip Hingston

Research outputs pre 2011

The Iterated Prisoner's Dilemma (IPD) is widely used to study the evolution of cooperation between self-interested agents. Existing work asks how genes that code for cooperation arise and spread through a single-species population of IPD playing agents. In this paper, we focus on competition between different species of agents. Making this distinction allows us to separate and examine macroevolutionary phenomena. We illustrate with some species-level simulation experiments with agents that use well-known strategies, and with species of agents that use team strategies.


Environmental Education In Small Business: The Owner-Manager's Perspective, Janice Redmond, Elizabeth Walker Jan 2009

Environmental Education In Small Business: The Owner-Manager's Perspective, Janice Redmond, Elizabeth Walker

Research outputs pre 2011

Traditionally, environmental education has been aimed at the community or in primary schools and governmental pressure to reduce environmental damage has focussed on large businesses. More recently, the role and importance of small business and how to engage them in the environmental debate has come under scrutiny. Researchers have identified education as one method of increasing the understanding of small business owner-managers’ role and knowledge of practices that, when implemented, will reduce the negative impacts of their businesses. However, there is little attention given in the literature to the perspective of the small business owner-manager and environmental education. This research …


Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli Jan 2009

Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Research outputs pre 2011

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.


Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka Jan 2009

Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka

Research outputs pre 2011

No abstract provided.