Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 63

Full-Text Articles in Entire DC Network

Real-Time Netnography: Rejecting The Passive Shift, Leesa Costello, Marie-Louise Mcdermott Apr 2016

Real-Time Netnography: Rejecting The Passive Shift, Leesa Costello, Marie-Louise Mcdermott

Research outputs 2014 to 2021

Although netnography emerged in the 1990s, it is a term unfamiliar to many ethnographers and is still touted as a new methodology. Once explained, ethnographers often understand it in terms of online ethnography. While this is helpful, netnography, however, offers a set of steps and analytic approaches that can be applied across a spectrum of involvement online. Its focus is on gaining entree to an online community, distinguishing between participant observation and nonparticipant observation.


Variability In The Carbon Storage Of Seagrass Habitats And Its Implications For Global Estimates Of Blue Carbon Ecosystem Service [Dataset], Paul Lavery, Miguel-Angel Mateo, Oscar Serrano, Mohammad Rozaimi Feb 2016

Variability In The Carbon Storage Of Seagrass Habitats And Its Implications For Global Estimates Of Blue Carbon Ecosystem Service [Dataset], Paul Lavery, Miguel-Angel Mateo, Oscar Serrano, Mohammad Rozaimi

Research Datasets

The dataset compiles published data (in Lavery et al. 2013, PLoS ONE 8(9): e73748. doi:10.1371/journal.pone.0073748) on biogeochemical variables (organic matter, organic carbon and CO3 contents, and stable carbon isotope signatures of the organic carbon) in sediment core from seagrass meadows in Australia. The cores studied were up to 29 cm long, and ecompass tropical, subtropical and temperate seagrass meadows in intertidal and subtidal habitats. Enquiries about the dataset may be sent to Paul Lavery p.lavery@ecu.edu.au.


Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende Jan 2016

Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende

Australian Information Security Management Conference

Throughout the past decade the methods employed by terrorist organisations have changed drastically. One of these key changes has been associated with the rise of social media such as Facebook, Twitter, YouTube and blogging in general. Terrorist organisations appear to be using the wide reach and vast network capabilities created by social media to disseminate propaganda, radicalise susceptible individuals, recruit potential fighters and communicate strategic and operational objectives. However, this growing terrorist presence on Social Media can also offer invaluable insights into the social networks of terrorist organisations through the use of Social Media Mining and Social Network Analysis. By …


Accelerating Ntruencrypt For In-Browser Cryptography Utilising Graphical Processing Units And Webgl, Dajne Win, Seth Hall, Alastair Nisbet Jan 2016

Accelerating Ntruencrypt For In-Browser Cryptography Utilising Graphical Processing Units And Webgl, Dajne Win, Seth Hall, Alastair Nisbet

Australian Information Security Management Conference

One of the challenges encryption faces is it is computationally intensive and therefore slow, it is vital to find faster methods to accelerate modern encryption algorithms to keep performance high whilst also preserving information security. Users often do not want to wait for applications to become responsive, applications on limited devices such as mobiles often compromise security in order to keep execution times quick. Often they use algorithms and key sizes which are not considered cryptographically secure in order to maintain a smooth user experience. Emerging approaches have begun using a devices Graphics Processing Unit (GPU) to offload some of …


A Survey Of Social Media Users Privacy Settings & Information Disclosure, Mashael Aljohani, Alastair Nisbet, Kelly Blincoe Jan 2016

A Survey Of Social Media Users Privacy Settings & Information Disclosure, Mashael Aljohani, Alastair Nisbet, Kelly Blincoe

Australian Information Security Management Conference

This research utilises a comprehensive survey to ascertain the level of social networking site personal information disclosure by members at the time of joining the membership and their subsequent postings to the sites. Areas examined are the type of information they reveal, their level of knowledge and awareness regarding how their information is protected by SNSs and the awareness of risks that over-sharing may pose. Additionally, this research studies the effect of gender, age, education, and level of privacy concern on the amount and kind of personal information disclosure and privacy settings applied. A social experiment was then run for …


A Privacy Gap Around The Internet Of Things For Open-Source Projects, Brian Cusack, Reza Khaleghparast Jan 2016

A Privacy Gap Around The Internet Of Things For Open-Source Projects, Brian Cusack, Reza Khaleghparast

Australian Information Security Management Conference

The Internet of Things (IoT) is having a more important role in the everyday lives of people. The distribution of connectivity across social and personal interaction discloses personalised information and gives access to a sphere of sensitivities that were previously masked. Privacy measures and security to protect personal sensitivities are weak and in their infancy. In this paper we review the issue of privacy in the context of IoT open-source projects, and the IoT security concerns. A proposal is made to create a privacy bubble around the interoperability of devices and systems and a filter layer to mitigate the exploitation …


Future Of Australia’S Etp: Script Exchange, Script Vault Or Secure Mobile Alternative, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley Jan 2016

Future Of Australia’S Etp: Script Exchange, Script Vault Or Secure Mobile Alternative, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley

Australian Information Security Management Conference

Electronic transfer of prescriptions is an essential element of electronic medications management. Unfortunately, current manual and preliminary electronic transfer of prescription methods are not patient focussed, leading to a suboptimal solution for the patient. This is increasingly relevant in the push for more patient engagement in their own healthcare. The area is highly controlled by legislation and regulation. Through research and an analysis of the possible methods to improve and personalise electronic transfer of prescriptions, this paper provides an overview of these conclusions, and presents an alternative technical solution. The solution has been derived from a number of experiments in …


Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian Jan 2016

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian

Australian Digital Forensics Conference

The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …


The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli Jan 2016

The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli

Australian Digital Forensics Conference

Conference Foreword

This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, …


A Forensic Examination Of Several Mobile Device Faraday Bags & Materials To Test Their Effectiveness, Ashleigh Lennox-Steele, Alastair Nisbet Jan 2016

A Forensic Examination Of Several Mobile Device Faraday Bags & Materials To Test Their Effectiveness, Ashleigh Lennox-Steele, Alastair Nisbet

Australian Digital Forensics Conference

A Faraday bag is designed to shield a mobile phone or small digital device from radio waves entering the bag and reaching the device, or to stop radio waves escaping through the bag from the device. The effectiveness of these shields is vital for security professionals and forensic investigators who seize devices and wish to ensure that their contents are not read, modified or deleted prior to a forensic examination. This research tests the effectiveness of several readily available Faraday bags. The Faraday bags tested are all available through online means and promise complete blocking of all signals through the …


An Exploration Of Artefacts Of Remote Desktop Applications On Windows, Paresh Kerai, Vimal Murji Vekariya Jan 2016

An Exploration Of Artefacts Of Remote Desktop Applications On Windows, Paresh Kerai, Vimal Murji Vekariya

Australian Digital Forensics Conference

Remote Desktop Applications (RDA) such as Virtual Network Computing (VNC), Cisco WebEx, GoToMeeting and LogMeIn have been adapted and utilised recently. This is because they facilitate tier-one support to configure computers, networks and solve application-related issues from a remote location. The direct benefit from the use of these applications, is the time (and therefore cost) saving for organisations. Unfortunately, “remoting” technology can also be used by criminals to perform illegal activities, hence remote applications are of key interest to law agencies and forensic investigators. The research outlined in this paper aims to identify any artefacts left behind by common remote …


Survey On Remnant Data Research: The Artefacts Recovered And The Implications In A Cyber Security Conscious World, Michael James, Patryk Szewczyk Jan 2016

Survey On Remnant Data Research: The Artefacts Recovered And The Implications In A Cyber Security Conscious World, Michael James, Patryk Szewczyk

Australian Digital Forensics Conference

The prevalence of remnant data in second hand storage media is well documented. Since 2004 there have been ten separate papers released through Edith Cowan University alone. Despite numerous government agencies providing advice on securing personal and corporate information, and news articles highlighting the need for data security, the availability of personal and confidential data on second hand storage devices is continuing, indicating a systemic laissez faire attitude to data security, even in our supposedly cyber security conscious world. The research continues, but there seems to be a lack of correlation of these studies to identify trends or common themes …


The Proceedings Of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Mike Johnstone Jan 2016

The Proceedings Of 14th Australian Information Security Management Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Mike Johnstone

Australian Information Security Management Conference

The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fourteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year.

The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Fifteen papers were submitted from Australia …


An Analysis Of Chosen Alarm Code Pin Numbers & Their Weakness Against A Modified Brute Force Attack, Alastair Nisbet, Maria Kim Jan 2016

An Analysis Of Chosen Alarm Code Pin Numbers & Their Weakness Against A Modified Brute Force Attack, Alastair Nisbet, Maria Kim

Australian Information Security Management Conference

Home and commercial alarms are an integral physical security measure that have become so commonplace that little thought is given to the security that they may or may not provide. Whilst the focus has shifted from physical security in the past to cyber security in the present, physical security for protecting assets may be just as important for many business organisations. This research looks at 700 genuine alarm PIN codes chosen by users to arm and disarm alarm systems in a commercial environment. A comparison is made with a study of millions of PIN numbers unrelated to alarms to compare …


Fine Particulate Air Pollution And Hospital Emergency Room Visits For Respiratory Disease In Urban Areas In Beijing, China, In 2013, Qin Xu, Xia Li, Shuo Wang, Chao Wang, Fangfang Huang, Qi Gao, Lijuan Wu, Lixin Tao, Jin Guo, Wei Wang, Xiuhua Guo Jan 2016

Fine Particulate Air Pollution And Hospital Emergency Room Visits For Respiratory Disease In Urban Areas In Beijing, China, In 2013, Qin Xu, Xia Li, Shuo Wang, Chao Wang, Fangfang Huang, Qi Gao, Lijuan Wu, Lixin Tao, Jin Guo, Wei Wang, Xiuhua Guo

Research outputs 2014 to 2021

Background

Heavy fine particulate matter (PM2.5) air pollution occurs frequently in China. However, epidemiological research on the association between short-term exposure to PM2.5 pollution and respiratory disease morbidity is still limited. This study aimed to explore the association between PM2.5 pollution and hospital emergency room visits (ERV) for total and cause-specific respiratory diseases in urban areas in Beijing. Methods Daily counts of respiratory ERV from Jan 1 to Dec 31, 2013, were obtained from ten general hospitals located in urban areas in Beijing. Concurrently, data on PM2.5 were collected from the Beijing Environmental Protection Bureau, …


Google Earth Forensics On Ios 10’S Location Service, Brian Cusack, Raymond Lutui Jan 2016

Google Earth Forensics On Ios 10’S Location Service, Brian Cusack, Raymond Lutui

Australian Digital Forensics Conference

The easy access and common usage of GNSS systems has provided a wealth of evidential information that may be accessed by a digital forensic investigator. Google Earth is commonly used on all manner of devices for geolocation services and consequently has a wide range of tools that will relate real time and stored GNSS data to maps. As an aid to investigation Google Earth forensics is available for use. An investigator can use it by downloading geolocation data from devices and placing it on Google Earth maps, place geolocation data on historical archival maps, or by direct usage of the …


Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun Jan 2016

Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun

Research outputs 2014 to 2021

This paper reports the performance of a pilot scale floating constructed wetland (FCW), employed for the treatment of polluted water collected from Buriganga river in Bangladesh. The FCW system included a tank for accommodating collected water and a floating mat with media, to support the growth of two macrophyte species Phragmites australis and Canna indica. Mean mass removal rates of 0.66, 0.76, 0.08, 0.51, 2.49g/m2d were achieved for ammoniacal nitrogen (NH4-N), total inorganic nitrogen (TIN), phosphorus (P), biochemical oxygen demand (BOD), chemical oxygen demand (COD), respectively by the FCW. Nitrogen removal was via nitrification-denitrification processes, whereas filtration-sedimentation appeared to influence …


Controlled Access To Cloud Resources For Mitigating Economic Denial Of Sustainability (Edos) Attacks, Zubair A. Baig, Sadiq M. Sait, Farid Binbeshr Jan 2016

Controlled Access To Cloud Resources For Mitigating Economic Denial Of Sustainability (Edos) Attacks, Zubair A. Baig, Sadiq M. Sait, Farid Binbeshr

Research outputs 2014 to 2021

Cloud computing is a paradigm that provides scalable IT resources as a service over the Internet. Vulnerabilities in the cloud infrastructure have been readily exploited by the adversary class. Therefore, providing the desired level of assurance to all stakeholders through safeguarding data (sensitive or otherwise) which is stored in the cloud, is of utmost importance. In addition, protecting the cloud from adversarial attacks of diverse types and intents, cannot be understated. Economic Denial of Sustainability (EDoS) attack is considered as one of the concerns that has stalled many organizations from migrating their operations and/or data to the cloud. This is …


Individual And Population-Level Responses To Ocean Acidification, Ben P. Harvey, Niall J. Mckeown, Samuel P. Rastrick, Camilla Bertolini, Andy Foggo, Helen Graham, Jason M. Hall-Spencer, Marco Milazzo, Paul W. Shaw, Daniel P. Small, Philippa J. Moore Jan 2016

Individual And Population-Level Responses To Ocean Acidification, Ben P. Harvey, Niall J. Mckeown, Samuel P. Rastrick, Camilla Bertolini, Andy Foggo, Helen Graham, Jason M. Hall-Spencer, Marco Milazzo, Paul W. Shaw, Daniel P. Small, Philippa J. Moore

Research outputs 2014 to 2021

Ocean acidification is predicted to have detrimental effects on many marine organisms and ecological processes. Despite growing evidence for direct impacts on specific species, few studies have simultaneously considered the effects of ocean acidification on individuals (e.g. consequences for energy budgets and resource partitioning) and population level demographic processes. Here we show that ocean acidification increases energetic demands on gastropods resulting in altered energy allocation, i.e. reduced shell size but increased body mass. When scaled up to the population level, long-term exposure to ocean acidification altered population demography, with evidence of a reduction in the proportion of females in the …


Can Changing The Timing Of Outdoor Air Intake Reduce Indoor Concentrations Of Traffic-Related Pollutants In Schools?, Morgan Macneill, Nina A. Dobbin, Mélissa St-Jean, Lance A. Wallace, Leonora Marro, T. Shin, Hongyu You, Ryan H. Kulka, Ryan W. Allen, Amanda J. Wheeler Jan 2016

Can Changing The Timing Of Outdoor Air Intake Reduce Indoor Concentrations Of Traffic-Related Pollutants In Schools?, Morgan Macneill, Nina A. Dobbin, Mélissa St-Jean, Lance A. Wallace, Leonora Marro, T. Shin, Hongyu You, Ryan H. Kulka, Ryan W. Allen, Amanda J. Wheeler

Research outputs 2014 to 2021

Traffic emissions have been associated with a wide range of adverse health effects. Many schools are situated close to major roads, and as children spend much of their day in school, methods to reduce traffic-related air pollutant concentrations in the school environment are warranted. One promising method to reduce pollutant concentrations in schools is to alter the timing of the ventilation so that high ventilation time periods do not correspond to rush hour traffic. Health Canada, in collaboration with the Ottawa-Carleton District School Board, tested the effect of this action by collecting traffic-related air pollution data from four schools in …


Carbon Uptake And Water Use In Woodlands And Forests In Southern Australia During An Extreme Heat Wave Event In The "Angry Summer" Of 2012/2013, Eva Van Gorsel, Sebastian Wolf, James Cleverly, Peter Isaac, Vanessa Haverd, Caecilia M. Ewenz, Stefan Arndt, Jason Beringer, Victor R. De Dios, Bradley John Evans, Anne Griebel, Lindsay B. Hutley, Trevor F. Keenan, Natascha Kljun, Craig Macfarlane, Wayne S. Meyer, Ian Mchugh, E. G. Pendall, Suzanne M. Prober, Richard P. Silberstein Jan 2016

Carbon Uptake And Water Use In Woodlands And Forests In Southern Australia During An Extreme Heat Wave Event In The "Angry Summer" Of 2012/2013, Eva Van Gorsel, Sebastian Wolf, James Cleverly, Peter Isaac, Vanessa Haverd, Caecilia M. Ewenz, Stefan Arndt, Jason Beringer, Victor R. De Dios, Bradley John Evans, Anne Griebel, Lindsay B. Hutley, Trevor F. Keenan, Natascha Kljun, Craig Macfarlane, Wayne S. Meyer, Ian Mchugh, E. G. Pendall, Suzanne M. Prober, Richard P. Silberstein

Research outputs 2014 to 2021

As a result of climate change warmer temperatures are projected through the 21st century and are already increasing above modelled predictions. Apart from increases in the mean, warm/hot temperature extremes are expected to become more prevalent in the future, along with an increase in the frequency of droughts. It is crucial to better understand the response of terrestrial ecosystems to such temperature extremes for predicting land-surface feedbacks in a changing climate. While land-surface feedbacks in drought conditions and during heat waves have been reported from Europe and the US, direct observations of the impact of such extremes on the carbon …


An Introduction To The Australian And New Zealand Flux Tower Network – Ozflux, Jason Beringe, Lindsay B. Hutley, Ian Mchugh, Stefan K. Arndt, David Campbell, Helen A. Cleugh, James Cleverly, Víctor R. De Dios, Derek Eamus, Bradley Evans, Cacilia Ewenz, Peter Grace, Anne Griebel, Vanessa Haverd, Nina Hinko-Najera, Alfredo Huete, Peter Isaac, Kasturi Kanniah, Ray Leuning, Michael J. Liddell, Craig Macfarlane, Wayne Meyer, Caitlin Moore, Elise Pendall, Alison Phillips, Rebecca L. Phillips, Suzanne M. Prober, Natalia Restrepo-Coupe, Susanna Rutledge, Ivan Schroder, Richard Silberstein, Patricia Southall, Mei S. Yee, Nigel Tapper, Eva Van Gorsel, Camilla Vote, Jeff Walker, Tim Wardlaw Jan 2016

An Introduction To The Australian And New Zealand Flux Tower Network – Ozflux, Jason Beringe, Lindsay B. Hutley, Ian Mchugh, Stefan K. Arndt, David Campbell, Helen A. Cleugh, James Cleverly, Víctor R. De Dios, Derek Eamus, Bradley Evans, Cacilia Ewenz, Peter Grace, Anne Griebel, Vanessa Haverd, Nina Hinko-Najera, Alfredo Huete, Peter Isaac, Kasturi Kanniah, Ray Leuning, Michael J. Liddell, Craig Macfarlane, Wayne Meyer, Caitlin Moore, Elise Pendall, Alison Phillips, Rebecca L. Phillips, Suzanne M. Prober, Natalia Restrepo-Coupe, Susanna Rutledge, Ivan Schroder, Richard Silberstein, Patricia Southall, Mei S. Yee, Nigel Tapper, Eva Van Gorsel, Camilla Vote, Jeff Walker, Tim Wardlaw

Research outputs 2014 to 2021

OzFlux is the regional Australian and New Zealand flux tower network that aims to provide a continental-scale national research facility to monitor and assess trends, and improve predictions, of Australia's terrestrial biosphere and climate. This paper describes the evolution, design, and current status of OzFlux as well as provides an overview of data processing. We analyse measurements from all sites within the Australian portion of the OzFlux network and two sites from New Zealand. The response of the Australian biomes to climate was largely consistent with global studies except that Australian systems had a lower ecosystem water-use efficiency. Australian semi-arid/arid …


Responses Of Marine Organisms To Climate Change Across Oceans, Elvira S. Poloczanska, Michael T. Burrows, Christipher J. Brown, Jorge G. Molinos, Benjamin S. Halpern, Ove Hoegh-Guldberg, Carrie V. Kappel, Philippa J. Moore, Anthony Richardson, David S. Schoeman, William J. Sydeman Jan 2016

Responses Of Marine Organisms To Climate Change Across Oceans, Elvira S. Poloczanska, Michael T. Burrows, Christipher J. Brown, Jorge G. Molinos, Benjamin S. Halpern, Ove Hoegh-Guldberg, Carrie V. Kappel, Philippa J. Moore, Anthony Richardson, David S. Schoeman, William J. Sydeman

Research outputs 2014 to 2021

Climate change is driving changes in the physical and chemical properties of the ocean that have consequences for marine ecosystems. Here, we review evidence for the responses of marine life to recent climate change across ocean regions, from tropical seas to polar oceans. We consider observed changes in calcification rates, demography, abundance, distribution, and phenology of marine species. We draw on a database of observed climate change impacts on marine species, supplemented with evidence in the Fifth Assessment Report of the Intergovernmental Panel on Climate Change. We discuss factors that limit or facilitate species' responses, such as fishing pressure, the …


Disentangling The Complexity Of Groundwater Dependent Social-Ecological Systems, Olivier Barreteau, Yvan Caballero, Serena H. Hamilton, Anthony J. Jakeman, Jean-Daniel Rinaudo Jan 2016

Disentangling The Complexity Of Groundwater Dependent Social-Ecological Systems, Olivier Barreteau, Yvan Caballero, Serena H. Hamilton, Anthony J. Jakeman, Jean-Daniel Rinaudo

Research outputs 2014 to 2021

Groundwater resources are part of larger social-ecological systems. In this chapter, we review the various dimensions of these complex systems in order to uncover the diversity of elements at stake in the evolution of an aquifer and the loci for possible actions to control its dynamics. Two case studies illustrate how the state of an aquifer is embedded in a web of biophysical and sociopolitical processes. We propose here a holistic view through an IGM-scape that describes the various possible pathways of evolution for a groundwater related social-ecological system. Then we describe the elements of this IGM-scape starting with physical …


Using Graphic Methods To Challenge Cryptographic Performance, Brian Cusack, Erin Chapman Jan 2016

Using Graphic Methods To Challenge Cryptographic Performance, Brian Cusack, Erin Chapman

Australian Information Security Management Conference

Block and stream ciphers have formed the traditional basis for the standardisation of commercial ciphers in the DES, AES, RC4, and so on. More recently alternative graphic methods such as Elliptic Curve Cryptography (ECC) have been adopted for performance gains. In this research we reviewed a range of graphic and non-graphic methods and then designed our own cipher system based on several graphic methods, including Visual Cryptography (VC). We then tested our cipher against RC4 and the AES algorithms for performance and security. The results showed that a graphics based construct may deliver comparable or improved security and performance in …


Memory Forensic Data Recovery Utilising Ram Cooling Methods, Kedar Gupta, Alastair Nisbet Jan 2016

Memory Forensic Data Recovery Utilising Ram Cooling Methods, Kedar Gupta, Alastair Nisbet

Australian Digital Forensics Conference

Forensic investigations of digital devices is generally conducted on a seized device in a secure environment. This usually necessitates powering down the device and taking an image of the hard drive or semi-permanent storage in the case of solid state technology. Guidelines for forensic investigations of computers advise that the computer should be shut down by removing the power supply and thereby maintaining the hard disk in the state it was in whilst running. However, valuable forensic evidence often exists in the volatile memory which is lost when this process is followed. The issues of locked accounts on running computers …


Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov Jan 2016

Improving Forensic Software Tool Performance In Detecting Fraud For Financial Statements, Brian Cusack, Tau’Aho Ahokov

Australian Digital Forensics Conference

The use of computer forensics is important for forensic accounting practice because most accounting information is in digital forms today. The access to evidence is increasingly more complex and in far greater volumes than in previous decades. The effective and efficient means of detecting fraud are required for the public to maintain their confidence in the reliability of accounting audit and the reputation of accounting firms. The software tools used by forensic accounting can be called into question. Many appear inadequate when faced with the complexity of fraud and there needs to be the development of automated and specialist problem-solving …


Establishing Effective And Economical Traffic Surveillance In Tonga, Brian Cusack, George Maeakafa Jan 2016

Establishing Effective And Economical Traffic Surveillance In Tonga, Brian Cusack, George Maeakafa

Australian Digital Forensics Conference

The Pacific Islands are seriously challenged by the growth in wealth and the expansion of international material possessions. On the roads traffic has grown dramatically and the types of vehicles now using Island roads has greatly changed. With the importation of cheap second hand vehicles designed for freeway speeds serious safety issues have grown proportionally with the increasing numbers. In this research we consider the prohibitive costs of traditional traffic controls to economy and propose a light weight highly mobile aerial surveillance system that integrates with ground policing capability. Our research question was: How can road safety and security be …


Celestial Sources For Random Number Generation, Erin Chapman, Jerina Grewar, Tim Natusch Jan 2016

Celestial Sources For Random Number Generation, Erin Chapman, Jerina Grewar, Tim Natusch

Australian Information Security Management Conference

In this paper, we present an alternative method of gathering seed data for random number generation (RNG) in cryptographic applications. Our proposed method utilises the inherent randomness of signal data from celestial sources in radio astronomy to provide seeds for RNG. The data sets were collected from two separate celestial sources, and run through the SHA-256 algorithm to deskew the data and produce random numbers with a uniform distribution. The resulting data sets pass all tests in the NIST Statistical Test Suite for random data, with a mean of 98.9% of the 512 total bitstreams from the two sources passing …


A Hybrid Behaviour Recognition And Intrusion Detection Method For Mobile Devices, Ashley Woodiss-Field Jan 2016

A Hybrid Behaviour Recognition And Intrusion Detection Method For Mobile Devices, Ashley Woodiss-Field

Australian Information Security Management Conference

Behaviour-based authorisation is a technique that assesses the user of a device for authenticity by comparing their activities to previously established behaviour profiles. Passwords and other point of entry authorisation techniques are often inadequate for protecting mobile device security as they only provide an initial barrier to usage and do not operate continuously. Behaviour-based authorisation continuously assesses user authorisation, using the device owner’s profile for authentication. This research improves upon behaviour-based authorisation performance by applying a hybridised intrusion detection method. The constituent intrusion detection methods that were applied include context-awareness and self-correction. Performance of a behaviour-based authorisation method can be …