Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

Cyber Influence, William Hutchinson Dec 2009

Cyber Influence, William Hutchinson

Australian Information Warfare and Security Conference

This paper explores influence in the cyber-world and the ability and effectiveness of influence campaigns in this medium. It examines the possibilities of influence in the online world as examines the potential of mobile technologies in this area. The contentious link between influence and behavioural change is investigated. Counterinfluence in the context of radicalisation is also looked at. Whilst it is inevitable that the digital medium is and will be used for influence campaigns and will be influential regardless if there are concerted ‘campaigns’ or not, it effects in terms of behavioural change are still open to question.


Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren Dec 2009

Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren

Australian Information Warfare and Security Conference

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework …


Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen Jan 2009

Survivable Mesh-Network Design & Optimization To Support Multiple Qop Service Classes, Hoang N. Nguyen

Theses: Doctorates and Masters

Every second, vast amounts of data are transferred over communication systems around the world, and as a result, the demands on optical infrastructures are extending beyond the traditional, ring-based architecture. The range of content and services available from the Internet is increasing, and network operations are constantly under pressure to expand their optical networks in order to keep pace with the ever increasing demand for higher speed and more reliable links.