Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 68

Full-Text Articles in Entire DC Network

Applying Surrogate Species Presences To Correct Sample Bias In Species Distribution Models; A Case Study Using The Pilbara Population Of The Northern Quoll [Dataset], Shaun W. Molloy, Robert A. Davis, Judy Dunlop, Eddie J.B. Van Etten Jan 2017

Applying Surrogate Species Presences To Correct Sample Bias In Species Distribution Models; A Case Study Using The Pilbara Population Of The Northern Quoll [Dataset], Shaun W. Molloy, Robert A. Davis, Judy Dunlop, Eddie J.B. Van Etten

Research Datasets

Supplementary material from: Molloy SW, Davis RA, Dunlop JA, van Etten EJB (2017) Applying surrogate species presences to correct sample bias in species distribution models: a case study using the Pilbara population of the Northern Quoll. Nature Conservation 18: 27-46. https://doi.org/10.3897/natureconservation.18.12235

Supplementary material 1: GIS data sets used in variable assessments and map of Pilbara vegetation systems

Supplementary material 2: Full readout for the MaxEnt northern quoll SDM

Supplementary material 3: Weighted mean SDMs for individual algorithms and evaluation statistics (biomod2)


Analysis Of Attempted Intrusions: Intelligence Gathered From Ssh Honeypots, Priya Rabadia, Craig Valli, Ahmed Ibrahim, Zubair A. Baig Jan 2017

Analysis Of Attempted Intrusions: Intelligence Gathered From Ssh Honeypots, Priya Rabadia, Craig Valli, Ahmed Ibrahim, Zubair A. Baig

Australian Digital Forensics Conference

Honeypots are a defensive cyber security countermeasure used to gather data on intruder activities. By analysing the data collected by honeypots, mitigation strategies for cyberattacks launched against cyber-enabled infrastructures can be developed. In this paper, intelligence gathered from six Secure Shell (SSH) honeypots is presented. The paper is part of an ongoing investigation into analysing malicious activities captured by the honeypots. This paper focuses on the time of day attempted intrusions have occurred. The honeypot data has been gathered from 18th July 2012 until 13th January 2016; a period of 1,247 days. All six honeypots have the same hardware and …


Financial Fraud Risk Management And Corporate Governance, Raymond Lutui, Tau'aho 'Ahokovi Jan 2017

Financial Fraud Risk Management And Corporate Governance, Raymond Lutui, Tau'aho 'Ahokovi

Australian Information Security Management Conference

Risk management is important so that risk is assessed, understood and appropriately managed. This is important both for conformance and performance. It is essential that strategic planning and management decisions are made appropriately in the context of the risk appetite of the corporation and its various stakeholders – especially its shareholders. If a company does not have a good understanding of risk, the likelihood of conformance and performance failure is high, this implies good internal and external corporate intelligence. Large global corporations have a significant impact on economies around the world. These entities are subject to intense competition and require …


Security Vulnerabilities And Cyber Threat Analysis Of The Amqp Protocol For The Internet Of Things, Ian Noel Mcateer, Muhammad Imran Malik, Zubair Baig, Peter Hannay Jan 2017

Security Vulnerabilities And Cyber Threat Analysis Of The Amqp Protocol For The Internet Of Things, Ian Noel Mcateer, Muhammad Imran Malik, Zubair Baig, Peter Hannay

Australian Information Security Management Conference

The Internet of Things (IoT) expands the global Internet-connected network to encompass device-to-device, device-to-server, and server-to-server connectivity for an ever-increasing variety of end-user devices. IoT remains a somewhat amorphous entity, with little in the way of coordinated development, and is undermined largely by a manufacturer-driven scramble to be first-to-market with the latest innovation. Communication between IoT devices/servers relies on underlying protocols, which must be efficient and effective to establish and maintain reliability and integrity of data transfer. However, the lack of coordination during IoT’s expansion has resulted in a variety of communications protocols being developed. AMQP (Advanced Message Queuing Protocol) …


Intelligent Feature Selection For Detecting Http/2 Denial Of Service Attacks, Erwin Adi, Zubair Baig Jan 2017

Intelligent Feature Selection For Detecting Http/2 Denial Of Service Attacks, Erwin Adi, Zubair Baig

Australian Information Security Management Conference

Intrusion-detection systems employ machine learning techniques to classify traffic into attack and legitimate. Network flooding attacks can leverage the new web communications protocol (HTTP/2) to bypass intrusion-detection systems. This creates an urgent demand to understand HTTP/2 characteristics and to devise customised cyber-attack detection schemes. This paper proposes Step Sister; a technique to generate an optimum network traffic feature set for network intrusion detection. The proposed technique demonstrates that a consistent set of features are selected for a given HTTP/2 dataset. This allows intrusion-detection systems to classify previously unseen network traffic samples with fewer false alarm than when techniques used in …


Tonga’S Organisational Vulnerability To Social Engineering, Raymond Lutui, Viliami Fe’Aomoeata Jan 2017

Tonga’S Organisational Vulnerability To Social Engineering, Raymond Lutui, Viliami Fe’Aomoeata

Australian Information Security Management Conference

Tonga is a small developing island in the south pacific and ICT is still in its early stages. In this paper we ask the questions, what is social engineering and who is this social engineer, what are the threats to Tonga, how can these threats be identified and which countermeasures can be taken to mitigate the risk of social engineering? The answers to these questions will lead to a social engineering risk management framework to make the risks of social engineering more transparent and help organisations implement mitigating controls against social engineering. The study was performed in four chosen organisations …


A Review Of Data Breaches And Losses That Occurred From Laptops That Were Stolen Or Otherwise Misplaced In 2015 And 2016, Samuel Griffith Wakeling, Peter Hannay, Zubair Baig Jan 2017

A Review Of Data Breaches And Losses That Occurred From Laptops That Were Stolen Or Otherwise Misplaced In 2015 And 2016, Samuel Griffith Wakeling, Peter Hannay, Zubair Baig

Australian Information Security Management Conference

This paper provides an analysis of what information can be found on laptops that may or may not have connections to an organisation of some form, the statistics of the number of laptops stolen or otherwise misplaced in 2015 and 2016, and the number of potentially affected people from each of the cases. As seen in many news articles, laptops are often stolen or otherwise misplaced by employees or contractors in an organisational environment. As discovered in this research, many laptops are stolen from vehicles or homes of employees rather than organisation’s buildings, but not all. The majority of stolen …


The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.) Jan 2017

The Proceedings Of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia, Craig Valli (Ed.)

Australian Information Security Management Conference

Conference Foreword

The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and …


Pso Algorithm For An Optimal Power Controller In A Microgrid, Waleed Al-Saedi, Stefan Lachowicz, Daryoush Habibi, Octavian Bass Jan 2017

Pso Algorithm For An Optimal Power Controller In A Microgrid, Waleed Al-Saedi, Stefan Lachowicz, Daryoush Habibi, Octavian Bass

Research outputs 2014 to 2021

This paper presents the Particle Swarm Optimization (PSO) algorithm to improve the quality of the power supply in a microgrid. This algorithm is proposed for a real-time selftuning method that used in a power controller for an inverter based Distributed Generation (DG) unit. In such system, the voltage and frequency are the main control objectives, particularly when the microgrid is islanded or during load change. In this work, the PSO algorithm is implemented to find the optimal controller parameters to satisfy the control objectives. The results show high performance of the applied PSO algorithm of regulating the microgrid voltage and …


Genetic Variability Within Seagrass Of The North West Of Western Australia: Report Of Theme 5 - Project 5.2 Prepared For The Dredging Science Node, Kathryn Mcmahon, Udhi Hernawan, Kor-Jent Van Dijk, Michelle Waycott, Ed Biffin, Richard Evans, Paul Lavery Jan 2017

Genetic Variability Within Seagrass Of The North West Of Western Australia: Report Of Theme 5 - Project 5.2 Prepared For The Dredging Science Node, Kathryn Mcmahon, Udhi Hernawan, Kor-Jent Van Dijk, Michelle Waycott, Ed Biffin, Richard Evans, Paul Lavery

Research outputs 2014 to 2021

This study was the first of its kind to examine the patterns of genetic diversity in seagrasses in the Pilbara region of WA. Three species were assessed: Halophila ovalis (6 populations), Halodule uninervis (8 populations) andThalassia hemprichii (3 populations) at a range of spatial scales, within a meadow (centimetres−metres), among meadows at a local scale (2−60 km) and among meadows at a regional scale (up to 500 km). Due to the varied distribution of species all species across the same spatial scale and range of environments could not be sampled, so a nested approach was designed, with sites …


Natural Dynamics: Understanding Natural Dynamics Of Seagrasses Of The North West Of Western Australia. Report Of Theme 5 - Project 5.3 Prepared For The Dredging Science Node, Mat Vanderklift, Douglas Bearham, Mick Haywood, Hector Lozano-Montes, Roisin Mccallum, James Mclaughlin, Kathryn Mcmahon, Nick Mortimer, Paul Lavery Jan 2017

Natural Dynamics: Understanding Natural Dynamics Of Seagrasses Of The North West Of Western Australia. Report Of Theme 5 - Project 5.3 Prepared For The Dredging Science Node, Mat Vanderklift, Douglas Bearham, Mick Haywood, Hector Lozano-Montes, Roisin Mccallum, James Mclaughlin, Kathryn Mcmahon, Nick Mortimer, Paul Lavery

Research outputs 2014 to 2021

Relatively little is known of the spatial and temporal dynamics of seagrass meadows in the northwest of Western Australia, but such knowledge is needed when designing and evaluating studies that aim to detect potential dredging-related impacts on seagrass, and when making predictions about the likelihood of, and speed of recovery from such impacts. This study was undertaken to improve our understanding of the spatial and temporal patterns in seagrass composition, abundance and reproductive phenology in the Pilbara. We also characterised key environmental parameters, especially light, that influence seagrass survival and can be altered by dredging.

Aims

To improve our understanding …


Historical Reconstructions Of Water Quality In The Kimberley Using Sediment Records. Report Of 2.2.9 Prepared For The Kimberley Marine Research Program, John Keesing, Dongyan Liu, Zineng Yuan, Yajun Peng, Yujue Wang, Pierre Richard, Pere Masque´, Yingjun Chen, Yin Fang Jan 2017

Historical Reconstructions Of Water Quality In The Kimberley Using Sediment Records. Report Of 2.2.9 Prepared For The Kimberley Marine Research Program, John Keesing, Dongyan Liu, Zineng Yuan, Yajun Peng, Yujue Wang, Pierre Richard, Pere Masque´, Yingjun Chen, Yin Fang

Research outputs 2014 to 2021

This project made use of a suite of palaeoecological approaches to reconstruct a chronology of change in coastal water quality over the last approximately 100 years. The biogeochemical proxies addressed phytoplankton composition and biomass, temperature and terrestrial influences. Where possible these were matched to historical land/water use, meteorological or hydrological observational records.

The project examined sediment cores from three coastal locations in the Kimberley region, Koolama Bay (King George River), Cygnet Bay and Roebuck Bay. Each sampling location provided a contrast with which to evaluate changes over either a spatial or temporal gradient of human or natural influences.

Aims

  • Reconstruct …


A Critical Analysis Of Security Vulnerabilities And Countermeasures In A Smart Ship System, Dennis Bothur, Guanglou Zheng, Craig Valli Jan 2017

A Critical Analysis Of Security Vulnerabilities And Countermeasures In A Smart Ship System, Dennis Bothur, Guanglou Zheng, Craig Valli

Australian Information Security Management Conference

It is timely to raise cyber security awareness while attacks on maritime infrastructure have not yet gained critical momentum. This paper analyses vulnerabilities in existing shipborne systems and a range of measures to protect them. It discusses Information Technology network flaws, describes issues with Industrial Control Systems, and lays out major weaknesses in the Automated Identification System, Electronic Chart Display Information System and Very Small Aperture Terminals. The countermeasures relate to the concept of “Defence-in-depth”, and describe procedural and technical solutions. The maritime sector is interconnected and exposed to cyber threats. Internet satellite connections are feasible and omnipresent on vessels, …


An Investigation Into Some Security Issues In The Dds Messaging Protocol, Thomas White, Michael N. Johnstone, Matthew Peacock Jan 2017

An Investigation Into Some Security Issues In The Dds Messaging Protocol, Thomas White, Michael N. Johnstone, Matthew Peacock

Australian Information Security Management Conference

The convergence of Operational Technology and Information Technology is driving integration of the Internet of Things and Industrial Control Systems to form the Industrial Internet of Things. Due to the influence of Information Technology, security has become a high priority particularly when implementations expand into critical infrastructure. At present there appears to be minimal research addressing security considerations for industrial systems which implement application layer IoT messaging protocols such as Data Distribution Services (DDS). Simulated IoT devices in a virtual environment using the DDSI-RTPS protocol were used to demonstrate that enumeration of devices is possible by a non-authenticated client in …


Addressing Calcium Carbonate Cycling In Blue Carbon Accounting, Peter I. Macreadie, Oscar Serrano, Damien T. Maher, Carlos M. Duarte, John Beardall Jan 2017

Addressing Calcium Carbonate Cycling In Blue Carbon Accounting, Peter I. Macreadie, Oscar Serrano, Damien T. Maher, Carlos M. Duarte, John Beardall

Research outputs 2014 to 2021

Scientific Significance Statement

There is considerable interest in measuring the capacity of the world's ecosystems to trap and store excess atmospheric carbon dioxide to mitigate human‐induced climate change. Blue carbon describes the carbon storage potential of vegetated coastal ecosystems including tidal marshes, mangroves, and seagrasses. Efforts are now underway to include blue carbon in global carbon offset schemes by managing these ecosystems to enhance carbon sequestration by focusing on their effect on organic carbon processing. However, it is unclear what role inorganic carbon processing in blue carbon ecosystems plays in their overall carbon sequestration. Here, we argue that there are …


Insider Misuse Identification Using Transparent Biometrics, Nathan Clarke, Fudong Li, Abdulrahman Alruban, Steven Furnell Jan 2017

Insider Misuse Identification Using Transparent Biometrics, Nathan Clarke, Fudong Li, Abdulrahman Alruban, Steven Furnell

Research outputs 2014 to 2021

Insider misuse is a key threat to organizations. Recent research has focused upon the information itself – either through its protection or approaches to detect the leakage. This paper seeks a different approach through the application of transparent biometrics to provide a robust approach to the identification of the individuals who are misusing systems and information. Transparent biometrics are a suite of modalities, typically behavioral-based that can capture biometric signals covertly or non-intrusively – so the user is unaware of their capture. Transparent biometrics are utilized in two phases a) to imprint digital objects with biometric-signatures of the user who …


Using Journals To Assess Non-Stem Student Learning In Stem Courses: A Case Study In Cybersecurity Education, Gary C. Kessler, Glenn S. Dardick, Douglas L. Holton Jan 2017

Using Journals To Assess Non-Stem Student Learning In Stem Courses: A Case Study In Cybersecurity Education, Gary C. Kessler, Glenn S. Dardick, Douglas L. Holton

Research outputs 2014 to 2021

Embry-Riddle Aeronautical University offers a minor course of study in cybersecurity as an option in our undergraduate Homeland Security program. Since the students are, by and large, social scientists, the focus of the program is to build hyper-awareness of how cybersecurity integrates within their professional aspirations rather than to provide cybersecurity career-level proficiency. Assessing student learning of the technical aspects cannot be performed using traditional tests, as they would not properly measure what the students are learning in a practical sense. Instead, we employ journals and self-reflection to ask the students to express and demonstrate their learning. Although somewhat harder …


Seagrass Halophila Ovalis Is Affected By Light Quality Across Different Life History Stages, Simone Strydom, Kathryn Mcmahon, Gary A. Kendrick, John Stratton, Paul Lavery Jan 2017

Seagrass Halophila Ovalis Is Affected By Light Quality Across Different Life History Stages, Simone Strydom, Kathryn Mcmahon, Gary A. Kendrick, John Stratton, Paul Lavery

Research outputs 2014 to 2021

Seagrass meadows provide crucial ecosystem services to the coastal zone but are threatened globally. Seagrass loss to date has mainly been attributed to anthropogenic activities that reduce light quantity (amount of photosynthetic photon flux density), such as dredging, flooding and eutrophication. However, light quality (wavelengths of light within the visible spectrum) is also altered by these anthropogenic stressors. This study addressed the effect of light quality changes on seagrasses. Aquarium-based experiments were conducted to determine whether the seagrass Halophila ovalis (R.Br.) Hook f. responds to different light quality treatments. Separate experiments were performed in which adults, seeds or seedlings were …


Ruo2 Ph Sensor With Super-Glue-Inspired Reference Electrode, Wade Lonsdale, Magdalena Wajrak, Kamal Alameh Jan 2017

Ruo2 Ph Sensor With Super-Glue-Inspired Reference Electrode, Wade Lonsdale, Magdalena Wajrak, Kamal Alameh

Research outputs 2014 to 2021

A pH-sensitive RuO2 electrode coated in a commercial cyanoacrylate adhesive typically exhibits very low pH sensitivity, and could be paired with a RuO2 working electrode as a differential type pH sensor. However, such sensors display poor performance in real sample matrices. A pH sensor employing a RuO2 pH-sensitive working electrode and a SiO2-PVB junction-modified RuO2 reference electrode is developed as an alternative high-performance solution. This sensor exhibits a performance similar to that of a commercial glass pH sensor in some common sample matrices, particularly, an excellent pH sensitivity of 55.7 mV/pH, a hysteresis as low as 2.7 mV, and a …


Seagrasses Of The North West Of Western Australia: Biogeography And Considerations For Dredging-Related Research: Report Of Theme 5 - Project 5.1.2 Prepared For The Dredging Science Node, Kathryn Mcmahon, John Statton, Paul Lavery Jan 2017

Seagrasses Of The North West Of Western Australia: Biogeography And Considerations For Dredging-Related Research: Report Of Theme 5 - Project 5.1.2 Prepared For The Dredging Science Node, Kathryn Mcmahon, John Statton, Paul Lavery

Research outputs 2014 to 2021

This review was undertaken to identify which seagrass primary producers (species or different functional groups) that collectively cover the bio-geographic range of key primary producers in the northwest of Western Australia are most appropriate for the focus of subsequent research into thresholds and indicators of response to dredging-related pressures (i.e. Theme 5). An assessment framework was developed based on six criteria: biogeographic range; ecological relevance (life-history strategy, habitats, natural dynamics and ecological services); current knowledge on thresholds and bioindicators; likelihood that species are sensitive and resilient to dredging related stressors; extent of improvement in applied knowledge; and likelihood of being …


Current State Of Knowledge Regarding The Effects Of Dredging-Related ‘Pressure’ On Seagrasses: Report Of Theme 5 - Project 5.1.1 Prepared For The Dredging Science Node, Kathryn Mcmahon, Paul Lavery, John Statton, Roisin Mccallum, Udhi Hernawan Jan 2017

Current State Of Knowledge Regarding The Effects Of Dredging-Related ‘Pressure’ On Seagrasses: Report Of Theme 5 - Project 5.1.1 Prepared For The Dredging Science Node, Kathryn Mcmahon, Paul Lavery, John Statton, Roisin Mccallum, Udhi Hernawan

Research outputs 2014 to 2021

This review summarises our understanding, from a northwest of Western Australia and global perspective, the pressures seagrasses are exposed to from dredging, their tolerance thresholds and responses to dredging related stressors, and the bioindicators of dredging related stressors. From this information, we also identified gaps in our knowledge and areas where environmental management and monitoring approaches could be improved.

Aims

To determine the levels of stress (light reduction/sediment deposition) that occur under dredging conditions and evaluate the likely effect of these levels of pressure based on the existing seagrass literature, considering the range of variability and environmental quality conditions associated …


Effects Of Dredging-Related Pressures On Critical Ecological Processes For Organisms Other Than Fish Or Coral. Report Of Theme 9 - Project 9.1 Prepared For The Dredging Science Node, Jessie Short, Matthew Fraser, Dianne Mclean, Gary Kendrick, Maria Byrne, Julian Caley, Doug Clarke, Andy Davis, Paul Ertemeijer, Stuart Field, Sam Gustin-Craig, John Huisman, John Keesing, Mick Keough, Paul Lavery, Ray Mansini, Kathryn Mcmahon, Kerrie Mergersen, Michael Rasheed, John Statton, Jim Stoddart, Paul Wu Jan 2017

Effects Of Dredging-Related Pressures On Critical Ecological Processes For Organisms Other Than Fish Or Coral. Report Of Theme 9 - Project 9.1 Prepared For The Dredging Science Node, Jessie Short, Matthew Fraser, Dianne Mclean, Gary Kendrick, Maria Byrne, Julian Caley, Doug Clarke, Andy Davis, Paul Ertemeijer, Stuart Field, Sam Gustin-Craig, John Huisman, John Keesing, Mick Keough, Paul Lavery, Ray Mansini, Kathryn Mcmahon, Kerrie Mergersen, Michael Rasheed, John Statton, Jim Stoddart, Paul Wu

Research outputs 2014 to 2021

This study reviewed environmental windows for organisms other than corals and fish such as sessile invertebrates, macroalgae and seagrasses. Environmental windows are periods of critical importance to the life history of a marine species, like reproduction and recruitment.

Aims

  • To review the scientific literature on the timing and spatial extent of critical ecological processes relevant to tropical WA for marine primary producers and invertebrates (i.e. organisms other than coral and finfish) and the state of knowledge regarding potential effects of dredging on these key ecological processes. The review also had a particular focus on ecological processes in marine primary producers …


Ecological Connectivity Of Kimberley Marine Communities. Synthesis Report Of Project 1.1.3 Prepared For The Kimberley Marine Research Program, Zoe Richards, Oliver Berry, Jim Underwood, Kathryn Mcmahon, Mike Travers, Glenn Moore, Udhi Hernawan, Joseph Dibattista, Richard Evans, James Gilmour Jan 2017

Ecological Connectivity Of Kimberley Marine Communities. Synthesis Report Of Project 1.1.3 Prepared For The Kimberley Marine Research Program, Zoe Richards, Oliver Berry, Jim Underwood, Kathryn Mcmahon, Mike Travers, Glenn Moore, Udhi Hernawan, Joseph Dibattista, Richard Evans, James Gilmour

Research outputs 2014 to 2021

The overarching objective of KMRP Project 1.1.3 (Ecological Connectivity of Kimberley Marine Communities) was to provide the first estimates of ecological connectivity across multiple spatial scales for a suite of model/priority marine organisms in the Kimberley. More specifically, this project aimed to provide species-specific estimates of realised connectivity at a reef-scale ( < 1 > km), inter-reef scale (1-100 km) and inter-region scale (100 + km) through genetic analyses of seven key animals and plants with contrasting dispersive life histories that are representative of common taxa.


Resistivity Profiles Of Perth Soil In Australia In Leak-Detection Test, Lopa M. Pandey, Sanjay K. Shukla, Daryoush Habibi Jan 2017

Resistivity Profiles Of Perth Soil In Australia In Leak-Detection Test, Lopa M. Pandey, Sanjay K. Shukla, Daryoush Habibi

Research outputs 2014 to 2021

The use of a suitable leak-detection system for the prevention and mitigation of pollution due to lining system failures is integral to the proper management of landfill facilities. This paper briefly summarises various methods of leak detection that are currently being practised. The details of a newly developed leak-detection technique are also presented. The tests were conducted to evaluate the performance of the new technique by use of controlled leakage. The resulting resistivity profiles for Perth soil in Australia were obtained at 10 min. This method is found to be effective in detecting and locating liner leakage issues within 30 …


Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald Jan 2017

Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald

Research outputs 2014 to 2021

Consumer grade broadband routers are integral to accessing the Internet and are primarily responsible for the reliable routing of data between networks. Despite the importance of broadband routers, security has never been at the forefront of their evolution. Consumers are often in possession of broadband routers that are rich in consumer-orientated features yet riddled with vulnerabilities that make the routers susceptible to exploitation. This amalgamation of theoretical research examines consumer grade broadband routers from the perspective of how they evolved, what makes them vulnerable, how they are targeted, and the challenges concerning the application of security. The research further explores …


Fukushima Daiichi-Derived Radionuclides In The Ocean: Transport, Fate, And Impacts, Ken O. Buesseler, Minhan Dai, Michio Aoyama, Claudia R. Benítez-Nelson,, Sabine S. Charmasson, Kathryn A. Higley, Vladimir S. Maderich, Pere Masqué, Paul J. Morris, Deborah H. Oughton, John N. Smith Jan 2017

Fukushima Daiichi-Derived Radionuclides In The Ocean: Transport, Fate, And Impacts, Ken O. Buesseler, Minhan Dai, Michio Aoyama, Claudia R. Benítez-Nelson,, Sabine S. Charmasson, Kathryn A. Higley, Vladimir S. Maderich, Pere Masqué, Paul J. Morris, Deborah H. Oughton, John N. Smith

Research outputs 2014 to 2021

The events that followed the Tohoku earthquake and tsunami on March 11, 2011, included the loss of power and overheating at the Fukushima Daiichi nuclear power plants, which led to extensive releases of radioactive gases, volatiles, and liquids, particularly to the coastal ocean. The fate of these radionuclides depends in large part on their oceanic geochemistry, physical processes, and biological uptake. Whereas radioactivity on land can be resampled and its distribution mapped, releases to the marine environment are harder to characterize owing to variability in ocean currents and the general challenges of sampling at sea. Five years later, it is …


Species Distribution Model Of Invasive Alien Species Acacia Nilotica For Central-Eastern Indonesia Using Biodiversity Climate Change Virtual Laboratory (Bccvl), Sutomo, Eddie Van Etten Jan 2017

Species Distribution Model Of Invasive Alien Species Acacia Nilotica For Central-Eastern Indonesia Using Biodiversity Climate Change Virtual Laboratory (Bccvl), Sutomo, Eddie Van Etten

Research outputs 2014 to 2021

Climate change may facilitate alien species invasion into new areas. This study uses Biodiversity and Climate Change Virtual Laboratory to develop a species distribution model (SDM) of Acacia nilotica (L.) Willd. ex Delile. based upon its naturalized distribution to project the potential distribution of A. nilotica throughout tropical environment of Indonesia under current and future climate conditions. Global biodiversity information facility database was utilized to obtain the species occurrences data. The climate factors were precipitation and temperature layers, available in Worldclim current conditions (1950-2000) at 2.5 arcmin. We used Generalized Linear Model. The result was then projected to the year …


Resources, Race And Rights: A Case Study Of Native Title And The Adani Carmichael Coal Mine, Kate Arnautovic Jan 2017

Resources, Race And Rights: A Case Study Of Native Title And The Adani Carmichael Coal Mine, Kate Arnautovic

Theses : Honours

This thesis examines the extent to which state institutions and government have taken into account Indigenous rights and interests during the approval process for a large mining development. This case study focuses on the various phases of approval for the proposed Adani Carmichael Coal Mine, a significant development that has challenged the native title system in Australia. It assesses the extent to which the rights and interests of the Wangan and Jagalingou people, the traditional owners that possess a native title claim over the region, have been upheld by the National Native Title Tribunal and the State and Federal Government. …


Freshwater Future: The Influence Of Exposure To Extreme Summer Rainfall Events On The Resistance And Recovery Patterns Of An Estuarine Seagrass, Chanelle Webster Jan 2017

Freshwater Future: The Influence Of Exposure To Extreme Summer Rainfall Events On The Resistance And Recovery Patterns Of An Estuarine Seagrass, Chanelle Webster

Theses : Honours

Restoring and maintaining the ecological resilience of seagrass ecosystems will be a major challenge of the 21st century. The decline of seagrasses worldwide is attributed to the erosion or elimination of their ecological resilience driven by human impacts, extreme climate events and climate change. Ecological resilience refers to the ability of ecosystems to resist or recover from disturbances whilst maintaining their integral structure and function. Seagrass resilience is influenced by life history, meadow form (transitory or enduring) and habitat type. The purpose of this honours project was to investigate the influence of extreme climate events and meadow form on a …


Denial-Of-Service Attack Modelling And Detection For Http/2 Services, Erwin Adi Jan 2017

Denial-Of-Service Attack Modelling And Detection For Http/2 Services, Erwin Adi

Theses: Doctorates and Masters

Businesses and society alike have been heavily dependent on Internet-based services, albeit with experiences of constant and annoying disruptions caused by the adversary class. A malicious attack that can prevent establishment of Internet connections to web servers, initiated from legitimate client machines, is termed as a Denial of Service (DoS) attack; volume and intensity of which is rapidly growing thanks to the readily available attack tools and the ever-increasing network bandwidths. A majority of contemporary web servers are built on the HTTP/1.1 communication protocol. As a consequence, all literature found on DoS attack modelling and appertaining detection techniques, addresses only …