Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- And challenges (1)
- Conference (1)
- Cyber security (1)
- Fibre Bragg grating (1)
- Fibre sensors (1)
-
- Implementation (1)
- Industrial automation (1)
- Intelligence (1)
- Interrogation (1)
- Intrusion detection (1)
- Issues (1)
- National Security (1)
- Network environments (1)
- Optical fiber detectors (1)
- Real-time monitoring (1)
- Security (1)
- Social Groups (1)
- Social Media (1)
- Social Network Analysis (1)
- Social Network Services (1)
- Terrorism (1)
- Vigilantism (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Defense and Security Studies
Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
Real-Time Monitoring As A Supplementary Security Component Of Vigilantism In Modern Network Environments, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
Research outputs 2014 to 2021
© 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but …
Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende
Understanding And Combatting Terrorist Networks: Coupling Social Media Mining With Social Network Analysis, Benn Van Den Ende
Australian Information Security Management Conference
Throughout the past decade the methods employed by terrorist organisations have changed drastically. One of these key changes has been associated with the rise of social media such as Facebook, Twitter, YouTube and blogging in general. Terrorist organisations appear to be using the wide reach and vast network capabilities created by social media to disseminate propaganda, radicalise susceptible individuals, recruit potential fighters and communicate strategic and operational objectives. However, this growing terrorist presence on Social Media can also offer invaluable insights into the social networks of terrorist organisations through the use of Social Media Mining and Social Network Analysis. By …
Intensity Based Interrogation Of Optical Fibre Sensors For Industrial Automation And Intrusion Detection Systems, Gary Andrew Allwood
Intensity Based Interrogation Of Optical Fibre Sensors For Industrial Automation And Intrusion Detection Systems, Gary Andrew Allwood
Theses: Doctorates and Masters
In this study, the use of optical fibre sensors for intrusion detection and industrial automation systems has been demonstrated, with a particular focus on low cost, intensity-based, interrogation techniques. The use of optical fibre sensors for intrusion detection systems to secure residential, commercial, and industrial premises against potential security breaches has been extensively reviewed in this thesis. Fibre Bragg grating (FBG) sensing is one form of optical fibre sensing that has been underutilised in applications such as in-ground, in-fence, and window and door monitoring, and addressing that opportunity has been a major goal of this thesis. Both security and industrial …
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
Australian Security and Intelligence Conference
No abstract provided.