Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Edith Cowan University

2011

Intrusion Detection Systems

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Programmable Logic Controller Based Fibre Bragg Grating In-Ground Intrusion Detection System, Gary Allwood, Graham Wild, Steven Hinckley Jan 2011

Programmable Logic Controller Based Fibre Bragg Grating In-Ground Intrusion Detection System, Gary Allwood, Graham Wild, Steven Hinckley

Australian Security and Intelligence Conference

In this paper we present an in-ground intrusion detection system for security applications. Here, an optical fibre pressure switch is directly connected to a standard digital input of a programmable logic controller (PLC). This is achieved using an intensiometric detection system, where a laser diode and Fibre Bragg Grating (FBG) are optically mismatched, resulting in a static dc offset from the transmitted and reflected optical power signals. Pressure applied to the FBG, as the intruder stepped on it, induced a wavelength shift in the FBG. The wavelength shift was then converted into an intensity change as the wavelength of the …


Designing Cyber Warfare Information Infrastructure Resilience, Semir Daskapan, Jan Van Der Berg Jan 2011

Designing Cyber Warfare Information Infrastructure Resilience, Semir Daskapan, Jan Van Der Berg

Australian Information Warfare and Security Conference

Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targeted themselves. Therefore, a cyber warfare information infrastructure is by definition a vulnerable infrastructure that needs to be secured against attacks and made resilient. In this paper, we provide a method inspired by the theory of Complex Adaptive Systems …