Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- [RSTDPub] (5)
- Security (2)
- [ECUPub] (2)
- ADSL (1)
- Broadband (1)
-
- Correlation (1)
- Cryptosystems (1)
- Cybercrime (1)
- Data processing (1)
- Deception (1)
- Electronic banking (1)
- Estimation (1)
- Financial data (1)
- Firewall security features (1)
- Firewalls (1)
- High frequency (1)
- Home users (1)
- Index (1)
- Information security management (1)
- Information warfare (1)
- Intrusion detection (1)
- Misclassification (1)
- Mobile devices (1)
- Moving average (1)
- Nessus network scanner (1)
- Network (1)
- Periodogram (1)
- Personal computer firewall (1)
- Spectrum (1)
- Time series (1)
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
Generalized Moving Average Models And Applications In High Frequency Data, Shelton Peiris, David E. Allen, Aerambamoorthy Thavaneswaran
Generalized Moving Average Models And Applications In High Frequency Data, Shelton Peiris, David E. Allen, Aerambamoorthy Thavaneswaran
Research outputs pre 2011
This paper considers a new class of first order moving average type time series model with index δ (> 0) to describe some hidden features of a time series. It is shown that this class of models provides a valid, simple solution to a new direction of time series modelling. In particular, for suitably chosen parameters (coefficient β and index δ) this type of models could be used to describe data with low or high frequency components. Various new results associated with this class are given in a general form. A simulation study is carried out to justify the theory. …
The Mediated Integration Arcitecture For Heterogeneous Data Integration, Chaiyaporn Chirathamjaree, Suvimol Mukviboonchai
The Mediated Integration Arcitecture For Heterogeneous Data Integration, Chaiyaporn Chirathamjaree, Suvimol Mukviboonchai
Research outputs pre 2011
To interoperate data sources which differ structurally and semantically, particular problems occur, for example, problems of changing schemas in data sources will affect the integrated schema. In this paper, we propose the mediated integration architecture (MedInt), which employs mediation and wrapping techniques as the main components for the integration of heterogeneous systems. With MedInt, a mediator acts as an intermediate medium transforming queries to sub-queries, integrating result data and resolving conflicts. Wrappers then transform sub-queries to specific local queries so that each local system is able to understand the queries.
Firewall Or Folly - An Initial Investigation Into The Effectiveness Of Personal Firewalls In Securing Personal Computers From Attack, Jeshua Yee
Research outputs pre 2011
With the increase in the use of Personal Computer (PC) firewall, this study looks at the security features provided by eight PC firewall; they are BlackICE, Deerfield, Kirio, MacAfee, Outpost, Sygate, Tiny and Zonealarm. The Nessus network scanner was used to probe these systems in a variety of configurations. The paper discusses the results and their implications for users of this new range of software.
Cutting Hacking: Breaking From Tradition, Rick Duley, Stanislaw P. Maj
Cutting Hacking: Breaking From Tradition, Rick Duley, Stanislaw P. Maj
Research outputs pre 2011
Code construction is the one inescapable phase of the software development cycle yet educators seem unable to escape the mind-set which equates programming with syntax and semantics. Accumulated coding wisdom of more than four decades, now being codified in the SWEBOK, should smooth the process of learning to develop software if presented early in the student's career. Typically, however, it continues to be presented in advanced programming units rather than as fundamental understanding. As a consequence, code hacking is the norm in undergraduate years. This paper examines current practice and presents the view that what is needed is not a …
If You Go Down The Internet Today - Deceptive Honeypots, Craig Valli, Suen Yek
If You Go Down The Internet Today - Deceptive Honeypots, Craig Valli, Suen Yek
Research outputs pre 2011
This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture.
With Speed The Hacker Cometh, Craig Valli
With Speed The Hacker Cometh, Craig Valli
Research outputs pre 2011
This paper is an examination of six months of IDS reports and firewall logs for a small enterprise that has a new broadband ADSL connection. The paper examines the information contained in the logfiles and the implications of detected activities by would be attackers. An examination of the issues that the deployment of broadband has for home and small business users is also undertaken.
Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.)
Protecting The Infrastructure: 3rd Australian Information Warfare & Security Conference 2002, William Hutchinson (Ed.)
Research outputs pre 2011
The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year's conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations.
The papers cover many topics, all within the field of information warfare and its applications, now and into the future.
The papers have been grouped into six streams: …
Evolving Crushers, Philip Hingston, Luigi Barone, Ronald While
Evolving Crushers, Philip Hingston, Luigi Barone, Ronald While
Research outputs pre 2011
This paper describes the use of an evolutionary algorithm to solve an engineering design problem. The problem involves determining the geometry and operating settings for a crusher in a comminution circuit for ore processing. The intention is to provide a tool for consulting engineers that can be used to explore candidate designs for various scenarios. The algorithm has proved capable of deriving designs that are clearly superior to existing designs, promising significant financial benefits