Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Entire DC Network

Australian Hackers And Ethics, Matthew Warren, William Hutchinson Jan 2003

Australian Hackers And Ethics, Matthew Warren, William Hutchinson

Research outputs pre 2011

The aim of the paper is to look at the way hackers act and ways in which society can protect itself. The paper will show the current views and attitudes of hackers in an Australian context. The paper will also include a case study to show how a hacking incident can develop and how technology can be used to protect against hacking.


Security Management Education Online, Peter J. Hosie, Clifton L. Smith, Joseph Luca Jan 2003

Security Management Education Online, Peter J. Hosie, Clifton L. Smith, Joseph Luca

Research outputs pre 2011

This paper describes the philosophy and pedagogy informing the design and development of Security Science online units. The Physical Security unit is used to illustrate the development of the online learning strategies and interactive activities. Learning materials developed for this course have unique attributes as they were specifically designed to provide simulations and interactivity in the learning process. Field scenarios have been developed for the activities to make the learning experiences as realistic as possible. Simulations and graphics provide these experiences, together with security site images for actual security barriers, systems and technologies. Features of units in the course include …


Applications Of Recursive Estimation Methods In Statistical Process Control, Shelton Peiris, Aerambamoorthy Thavaneswaran, David E. Allen, R. Mellor Jan 2003

Applications Of Recursive Estimation Methods In Statistical Process Control, Shelton Peiris, Aerambamoorthy Thavaneswaran, David E. Allen, R. Mellor

Research outputs pre 2011

In recent years there has been a growing interest in recursive estimation techniques as applied to statistical process control (SPC). In cases where prior information about the processes are available, it is shown that procedures based on the “optimal” smoothing can be superior to the classical procedures like Shewhart’s CUSUM control charts (see, for instance, Thavaneswaran, McPherson and Abraham (1998)). This paper reviews the recursive algorithms based on EWMA (exponentially weighted moving average), DLM (dynamic linear modeling), KF (Kalman filtering) and OS (optimal smoothing) in statistical process control with correlated data. We also discuss various relationships among the asymptotic mean …


Some Evidence On The Information Content Of Undisclosed Limit Orders On The Asx, M. Aitken, David E. Allen, Wenling J. Yang Jan 2003

Some Evidence On The Information Content Of Undisclosed Limit Orders On The Asx, M. Aitken, David E. Allen, Wenling J. Yang

Research outputs pre 2011

This paper is concerned with investigating the information content of undisclosed limit orders, and identifying factors that affect their size, plus the examination of the brokers’ behaviour in using undisclosed orders. We adopt a sample of liquid stocks listed on the ASX, and our estimation results indicate that the size of undisclosed orders are affected by a number of factors. Given the ‘stealth trading’ pattern of behaviour observed in large disclosed orders, this paper provides evidence to support a similar pattern of behaviour in the case of undisclosed orders. Our model also provides an appropriate measure for estimating the size …


A Case Study In The Security Of Network-Enabled Devices, Simeon Xenitellis, Craig Valli Jan 2003

A Case Study In The Security Of Network-Enabled Devices, Simeon Xenitellis, Craig Valli

Research outputs pre 2011

It is becoming increasingly common for appliances and other electronic devices to be network-enabled for usability and automation purposes. There have been fears that malicious users can control such devices remotely. Since the installation base of such network-enabled household devices is still relatively small, we examine the types of vulnerabilities that another such applicance has, the network-enabled printer, which is commonly found in the education and business sector. In this paper we analyse the source of the vulnerabilities and present detailed threat scenarios. In addition, we examine four organisations in Australia and Europe. Based on the results of the case …


Effects Of Bank Funds Management Activities On The Disintermediation Of Bank Deposits, David E. Allen, Jerry T. Parwada Jan 2003

Effects Of Bank Funds Management Activities On The Disintermediation Of Bank Deposits, David E. Allen, Jerry T. Parwada

Research outputs pre 2011

This study investigates the alleged disintermediation of banks’ traditional deposit-taking in favour of investment management activities. Using data on Australian bank-affiliated funds and a nine-year record of the parent banks’ liability balances, this study finds that managed funds do not displace bank liabilities. Prudential capital adequacy requirements dissuade banks from using in-house managed investments as indirect conduits for raising funds in the same manner as deposit-taking.


Honeyd - A Os Fingerprinting Artifice, Craig Valli Jan 2003

Honeyd - A Os Fingerprinting Artifice, Craig Valli

Research outputs pre 2011

The research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis tools. A honeypots ability to reliably deceive intruders is a key factor in gathering reliable and forensically sound data. Honeyd's primary deceptive mechanism is the use of the NMAP fingerprint database to provide bogus OS fingerprints to would be intruders. Tests conducted by the author on honeyd's ability to provide bogus fingerprints sees 78% of 704 signatures invalidated under heavy probing. However, the tests left 152 viable signatures for producing hardened honeypot designs.


Algorithmic Composition In Contrasting Music Styles, Tristan Mcauley, Philip Hingston Jan 2003

Algorithmic Composition In Contrasting Music Styles, Tristan Mcauley, Philip Hingston

Research outputs pre 2011

The aim of this research was to automate the composition of convincingly “real” music in specific musical genres. By “real” music we mean music which is not obviously “machine generated”, is recognizable as being of the selected genre, is perceived as aesthetically pleasing, and is usable in a commercial context. To achieve this goal, various computational techniques were used, including genetic algorithms and finite state automata. The process involves an original, top down approach and a bottom up approach based on previous studies. Student musicians have objectively assessed the resulting compositions.


Multivariate Geostatistical Analysis With Application To A Western Australian Nickel Laterite Deposit, Ellen Bandarian Jan 2003

Multivariate Geostatistical Analysis With Application To A Western Australian Nickel Laterite Deposit, Ellen Bandarian

Theses : Honours

Although it can be time consuming and computationally more expensive to work with multivariate data, it is often desirable to exploit the relationships among and between the variables sampled across a study region. In most cases the availability of this secondary information can enhance the estimation of the primary variable(s). The aim of this research is to describe and then demonstrate the use of multivariate statistical methods in geostatistical analysis. The methods will be illustrated by application to a multivariate data set from an actual mineralisation. The data suite is known as MM22D and comes from the Murrin Murrin nickel …


Floristics Of The Banksia Woodlands On The Wallingup Plain In Relation To Environmental Parameters, Claire Mccamish Jan 2003

Floristics Of The Banksia Woodlands On The Wallingup Plain In Relation To Environmental Parameters, Claire Mccamish

Theses : Honours

An understanding of the underlying environmental factors contributing to the floristic composition of Banksia woodlands should improve the effective management of Banksia woodland communities of the Swan Coastal Plain. Although a number of studies have examined the vegetation on the Banksia woodlands on detail there have been few studies aimed at identifying the specific environmental parameters influencing the floristic gradients on the Swan Coastal Plain. A comprehensive local scale study was undertaken on the northern Swan Coastal Plain to determine the environmental correlates influencing floristic communities in an area of Banks/a woodland known as the Wallingup Plain. Vegetation communities of …


A Linux-Based Graphical User Interface For The Creation And Reading Of The Frame Format: Version 2.4, Muhammed Aoun Jan 2003

A Linux-Based Graphical User Interface For The Creation And Reading Of The Frame Format: Version 2.4, Muhammed Aoun

Theses : Honours

To gain further knowledge of how the universe began, a new international co-operated project wishes not only to "see" stars exploding, but also to "hear" the explosion. It is theorised that the ability to "listen" to an explosion is possible by detecting gravitational waves. Gravitational waves are omitted when a star explodes, travelling through the cosmos at an exceptional speed. It is estimated that a gravity wave takes only 40 milliseconds to pass through the earth. Thus the aim of this international collaboration is to detect a gravitational wave. To accurately detect such waves, there needs to be several global …


A Deception Based Framework For The Application Of Deceptive Countermeasures In 802.11b Wireless Networks, Suen Yek Jan 2003

A Deception Based Framework For The Application Of Deceptive Countermeasures In 802.11b Wireless Networks, Suen Yek

Theses : Honours

The advance of 802.11 b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and stealthily, making organisations highly vulnerable to attack. Therefore, it is incumbent upon defending organisations to take initiative and implement proactive defences against common network attacks. Deception is an essential element of effective security that has been widely used in networks to understand attack methods and intrusions. However, little thought has been given to the type and the effectiveness of the deception. Deceptions deployed in nature, the military and in cyberspace were …


Use Of Multi-Scale Phase-Based Methods To Determine Optical Flow In Dynamic Scene Analysis, Robert Hastings Jan 2003

Use Of Multi-Scale Phase-Based Methods To Determine Optical Flow In Dynamic Scene Analysis, Robert Hastings

Theses: Doctorates and Masters

Estimates of optical flow in images can be made by applying a complex periodic transform to the images and tracking the movement of points of constant phase in the complex output. This approach however suffers from the problem that filters of large width give information only about broad scale image features, whilst those of small spatial extent (high resolution) cannot track fast motion, which causes a feature to move a distance that is large compared to the filter-size. A method is presented in which the flow is measured at different scales, using a series of complex filters of decreasing width. …


Geostatistical Optimisation Of Sampling And Estimation In A Nickel Laterite Deposit, Mark P. Murphy Jan 2003

Geostatistical Optimisation Of Sampling And Estimation In A Nickel Laterite Deposit, Mark P. Murphy

Theses: Doctorates and Masters

Nickel and cobalt are key additives to metal alloys in modem industry. The largest worldwide nickel-cobalt resources occur in nickel laterite deposits that have formed during the chemical weathering of ultramafic rocks at the Earth's surface. At the Murrin Murrin mine in Western Australia, the nickel laterite deposits occur as laterally extensive, undulating blankets of mineralisation with strong vertical anisotropy, near normal nickel distributions, and positively skewed cobalt distributions. The mineral resources in nickel laterite deposits in Murrin Murrin are usually estimated from drilling and sampling on relatively wide-spaced drill patterns that are supported by local clusters of close-spaced sampling. …


Wedge Veg : Gradient Analysis Of Impacts To Coastal Heath Vegetation At Wedge, Western Australia, Steven O'Dwyer Jan 2003

Wedge Veg : Gradient Analysis Of Impacts To Coastal Heath Vegetation At Wedge, Western Australia, Steven O'Dwyer

Theses : Honours

A reliable technique to assess impacts to coastal zones is required as coastal areas across the world are under pressure from an increasing human presence. The result is a greater level of disturbance to the coast, both marine and terrestrial. This study addresses a worldwide problem but is focused to a local scale. Wedge, on the central coast of Western Australia, supports a squatter shack settlement and has done so for approximately 50 years. Over time, the number of shacks, campers, tourists, 4WD's and motorbikes has increased. In recent years this growth has been significant. Management of this area and …


Fox Control In Urban Conservation Reserves: An Analysis Of Bait Uptake And Public Perceptions In The Perth Metropolitan Area, Jennifer Jackson Jan 2003

Fox Control In Urban Conservation Reserves: An Analysis Of Bait Uptake And Public Perceptions In The Perth Metropolitan Area, Jennifer Jackson

Theses : Honours

As the world's population becomes increasingly urbanised, the need for people to see nature on their doorstep is becoming more appealing. The city of Perth (Western Australia) has large areas of bushland that have been reserved as conservation estate, and therefore are only minimally modified by urban development. But while many of these urban bushland reserves contribute highly to biodiversity in the form of vegetation, vertebrate surveys have indicated a low diversity of fauna. These areas have the potential to function in a more complete manner as nature reserves with significant conservation value by supporting populations of native animals which …


Wavelet-Based Simulation Of Geological Variables, T. T. Tran Jan 2003

Wavelet-Based Simulation Of Geological Variables, T. T. Tran

Theses: Doctorates and Masters

This thesis introduces a number of conditional simulation algorithms using wavelet bases. These make use of two orthogonal wavelet bases, the Haar and the Db2 bases. Firstly, two single-level algorithms are introduced, HSIM: with the Haar basis and DB2SIM with the Db2 basis. HSIM reproduces the histogram and semivariogram model of isotropic samples but not the semivariogrnm model of anisotropic samples. DB2SIM reproduces the histogram and semivariogram model in both the isotropic and anisotropic cases but, because of the conditioning method employed, is not as computationally efficient as we would wish. Because of the limitations of HSIM and Db2SIM two …


Developing A Catalogue Of Errors And Evaluating Its Impact On Software Development, Indrit Troshani Jan 2003

Developing A Catalogue Of Errors And Evaluating Its Impact On Software Development, Indrit Troshani

Theses: Doctorates and Masters

The development of quality software is of paramount importance, yet this has been and continues to be an elusive goal for software engineers. Delivered software often fails due to errors that are injected during its development. Correcting these errors early in the development or preventing them altogether can, therefore, be considered as one way to improve software quality. In this thesis, the development of a Catalogue of Errors is described. Field studies with senior software engineering students are used to confirm that developers using the Catalogue of Errors commit fewer errors in their development artifacts. The impact of the Catalogue …


A Drop In The Bucket: Collective Efficacy Perceptions Affect Waste Minimising Behaviours, Leesa N. Bonniface Jan 2003

A Drop In The Bucket: Collective Efficacy Perceptions Affect Waste Minimising Behaviours, Leesa N. Bonniface

Theses: Doctorates and Masters

The goal of this thesis was to inform a social marketing effort designed to increase environmentally friendly behaviours in an effort to ensure a more sustainable future. This study attempted to gain a better understanding of the discrepancy that exists between pro-environmental concerns and pro-environmental actions by exploring efficacy perceptions. Efficacy beliefs were compared for three groups of individuals: 1) environmentally active/members of an environmental group; 2) environmentally active/not members of an environmental group; 3) environmentally inactive and not members of an environmental group. Six focus groups were conducted and interviewees were recruited from the Earth Carers' organisation and the …