Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (10)
- Computer Engineering (7)
- OS and Networks (6)
- Artificial Intelligence and Robotics (4)
- Digital Communications and Networking (4)
-
- Electrical and Computer Engineering (4)
- Law (4)
- Computer Law (2)
- Software Engineering (2)
- Systems Architecture (2)
- Theory and Algorithms (2)
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Forensic Science and Technology (1)
- Genetics and Genomics (1)
- Internet Law (1)
- Law and Economics (1)
- Legal Ethics and Professional Responsibility (1)
- Legal Studies (1)
- Life Sciences (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Science and Technology Law (1)
- Social and Behavioral Sciences (1)
- Systems Engineering (1)
- Institution
- Publication Year
- Publication
-
- Australian Information Security Management Conference (9)
- Research Collection School Of Computing and Information Systems (7)
- All Faculty Scholarship (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Theses: Doctorates and Masters (2)
-
- AFIT Patents (1)
- Australian Digital Forensics Conference (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Science Faculty Publications (1)
- Electrical & Computer Engineering and Computer Science Faculty Publications (1)
- Information Science Faculty Publications (1)
- Journal of Digital Forensics, Security and Law (1)
- Master of Science in Computer Science Theses (1)
- Masters Theses & Doctoral Dissertations (1)
- Mathematics, Statistics, and Computer Science Honors Projects (1)
- Oklahoma Law Review (1)
- Research outputs 2013 (1)
- Research outputs 2014 to 2021 (1)
- Theses and Dissertations (1)
- Publication Type
Articles 31 - 37 of 37
Full-Text Articles in Information Security
Identifying Dos Attacks Using Data Pattern Analysis, Mohammed Salem, Helen Armstrong
Identifying Dos Attacks Using Data Pattern Analysis, Mohammed Salem, Helen Armstrong
Australian Information Security Management Conference
During a denial of service attack, it is difficult for a firewall to differentiate legitimate packets from rogue packets, particularly in large networks carrying substantial levels of traffic. Large networks commonly use network intrusion detection systems to identify such attacks, however new viruses and worms can escape detection until their signatures are known and classified as an attack. Commonly used IDS are rule based and static, and produce a high number of false positive alerts. The aim of this research was to determine if it is possible for a firewall to analyse its own traffic patterns to identify attempted denial …
Can Intrusion Detection Implementation Be Adapted To End-User Capabilities?, Patricia A. Williams, Renji J. Mathew
Can Intrusion Detection Implementation Be Adapted To End-User Capabilities?, Patricia A. Williams, Renji J. Mathew
Australian Information Security Management Conference
In an environment where technical solutions for securing networked systems are commonplace, there still exist problems in implementation of such solutions for home and small business users. One component of this protection is the use of intrusion detection systems. Intrusion detection monitors network traffic for suspicious activity, performs access blocking and alerts the system administrator or user of potential attacks. This paper reviews the basic function of intrusion detection systems and maps them to an existing end-user capability framework. Using this framework, implementation guidance and systematic improvement in implementation of this security measure are defined.
How Safe Is Azeroth, Or, Are Mmorpgs A Security Risk?, An Hilven, Andrew Woodward
How Safe Is Azeroth, Or, Are Mmorpgs A Security Risk?, An Hilven, Andrew Woodward
Australian Information Security Management Conference
Massive Multiplayer Online Role Playing Games (MMORPGs) are at a basic level a networked application. Blizzard’s World of Warcraft is currently the largest example of such a type of application, with over nine million subscribers at last count. Whilst the idea of researching a game for network security may sound trivial, nine million potential backdoors into home and business computers is not. The ports used by the game, as well as authentication methods and client update programs were examined using packet analysis software. No obvious vulnerabilities were discovered as a result of this analysis. In addition to this analysis, an …
Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii
Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii
Theses and Dissertations
Network security is a paramount concern for organizations utilizing computer technology, and the Air Force is no exception. Network software vulnerability patching is a critical determinant of network security. The Air Force deploys these patches as Time Compliance Network Orders (TCNOs), which together with associated processes and enforced timelines ensure network compliance. While the majority of the network assets affected by this process are Air Force owned and operated, a large number are maintained by external entities known as Program Management Offices (PMOs). Although these externally controlled systems provide a service to the Air Force and reside on its network, …
Decrypting The Code Of Ethics: The Relationship Between An Attorney's Ethical Duties And Network Security, Ash Mayfield
Decrypting The Code Of Ethics: The Relationship Between An Attorney's Ethical Duties And Network Security, Ash Mayfield
Oklahoma Law Review
No abstract provided.
An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin
An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin
Electrical & Computer Engineering and Computer Science Faculty Publications
Hashing algorithms have been widely adopted for fast address look-up, which involves a search through a database to find a record associated with a given key. Hashing algorithms transforms a key into a hash value hoping that the hashing renders the database a uniform distribution with respect to the hash value. The closer to uniform hash values, the less search time required for a query. When the database is key-wise uniformly distributed, any regular hashing algorithm (bit-extraction, bit-group XOR, etc.) leads to a statistically perfect uniform hash distribution. When the database has keys with a non-uniform distribution, performance of regular …
Breaking Public Key Cryptosystems On Tamper Resistant Devices In The Presence Of Transient Faults, Feng Bao, Robert H. Deng, Y. Han, A. Jeng, Arcot Desai Narasimhalu, T. Ngair
Breaking Public Key Cryptosystems On Tamper Resistant Devices In The Presence Of Transient Faults, Feng Bao, Robert H. Deng, Y. Han, A. Jeng, Arcot Desai Narasimhalu, T. Ngair
Research Collection School Of Computing and Information Systems
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant devices. The attack makes use of transient faults and seems applicable to many types of PKCs. In particular, we show how to attack the RSA, the E1Gamal signature scheme, the Schnorr signature scheme, and the DSA. We also present some possible methods to counter the attack.