Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

A Critical Analysis Of Security Vulnerabilities And Countermeasures In A Smart Ship System, Dennis Bothur, Guanglou Zheng, Craig Valli Jan 2017

A Critical Analysis Of Security Vulnerabilities And Countermeasures In A Smart Ship System, Dennis Bothur, Guanglou Zheng, Craig Valli

Australian Information Security Management Conference

It is timely to raise cyber security awareness while attacks on maritime infrastructure have not yet gained critical momentum. This paper analyses vulnerabilities in existing shipborne systems and a range of measures to protect them. It discusses Information Technology network flaws, describes issues with Industrial Control Systems, and lays out major weaknesses in the Automated Identification System, Electronic Chart Display Information System and Very Small Aperture Terminals. The countermeasures relate to the concept of “Defence-in-depth”, and describe procedural and technical solutions. The maritime sector is interconnected and exposed to cyber threats. Internet satellite connections are feasible and omnipresent on vessels, …


An Investigation Into Some Security Issues In The Dds Messaging Protocol, Thomas White, Michael N. Johnstone, Matthew Peacock Jan 2017

An Investigation Into Some Security Issues In The Dds Messaging Protocol, Thomas White, Michael N. Johnstone, Matthew Peacock

Australian Information Security Management Conference

The convergence of Operational Technology and Information Technology is driving integration of the Internet of Things and Industrial Control Systems to form the Industrial Internet of Things. Due to the influence of Information Technology, security has become a high priority particularly when implementations expand into critical infrastructure. At present there appears to be minimal research addressing security considerations for industrial systems which implement application layer IoT messaging protocols such as Data Distribution Services (DDS). Simulated IoT devices in a virtual environment using the DDSI-RTPS protocol were used to demonstrate that enumeration of devices is possible by a non-authenticated client in …


Ruo2 Ph Sensor With Super-Glue-Inspired Reference Electrode, Wade Lonsdale, Magdalena Wajrak, Kamal Alameh Jan 2017

Ruo2 Ph Sensor With Super-Glue-Inspired Reference Electrode, Wade Lonsdale, Magdalena Wajrak, Kamal Alameh

Research outputs 2014 to 2021

A pH-sensitive RuO2 electrode coated in a commercial cyanoacrylate adhesive typically exhibits very low pH sensitivity, and could be paired with a RuO2 working electrode as a differential type pH sensor. However, such sensors display poor performance in real sample matrices. A pH sensor employing a RuO2 pH-sensitive working electrode and a SiO2-PVB junction-modified RuO2 reference electrode is developed as an alternative high-performance solution. This sensor exhibits a performance similar to that of a commercial glass pH sensor in some common sample matrices, particularly, an excellent pH sensitivity of 55.7 mV/pH, a hysteresis as low as 2.7 mV, and a …


Resistivity Profiles Of Perth Soil In Australia In Leak-Detection Test, Lopa M. Pandey, Sanjay K. Shukla, Daryoush Habibi Jan 2017

Resistivity Profiles Of Perth Soil In Australia In Leak-Detection Test, Lopa M. Pandey, Sanjay K. Shukla, Daryoush Habibi

Research outputs 2014 to 2021

The use of a suitable leak-detection system for the prevention and mitigation of pollution due to lining system failures is integral to the proper management of landfill facilities. This paper briefly summarises various methods of leak detection that are currently being practised. The details of a newly developed leak-detection technique are also presented. The tests were conducted to evaluate the performance of the new technique by use of controlled leakage. The resulting resistivity profiles for Perth soil in Australia were obtained at 10 min. This method is found to be effective in detecting and locating liner leakage issues within 30 …


Species Distribution Model Of Invasive Alien Species Acacia Nilotica For Central-Eastern Indonesia Using Biodiversity Climate Change Virtual Laboratory (Bccvl), Sutomo, Eddie Van Etten Jan 2017

Species Distribution Model Of Invasive Alien Species Acacia Nilotica For Central-Eastern Indonesia Using Biodiversity Climate Change Virtual Laboratory (Bccvl), Sutomo, Eddie Van Etten

Research outputs 2014 to 2021

Climate change may facilitate alien species invasion into new areas. This study uses Biodiversity and Climate Change Virtual Laboratory to develop a species distribution model (SDM) of Acacia nilotica (L.) Willd. ex Delile. based upon its naturalized distribution to project the potential distribution of A. nilotica throughout tropical environment of Indonesia under current and future climate conditions. Global biodiversity information facility database was utilized to obtain the species occurrences data. The climate factors were precipitation and temperature layers, available in Worldclim current conditions (1950-2000) at 2.5 arcmin. We used Generalized Linear Model. The result was then projected to the year …