Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D Delaunay triangulation (1)
- Authentication (1)
- Cnn (1)
- Convolutional neural networks (1)
- Cryptovirology (1)
-
- Cyber security (1)
- Cybersecurity (1)
- Dcnn (1)
- Deep convolutional neural networks (1)
- Deep learning (1)
- Delau-nay triangulations (1)
- Discrimination ability (1)
- Faraday rotation (1)
- Feature representation (1)
- Fingerprint authentication (1)
- Fingerprint authentication system (1)
- Fingerprint matching (1)
- Human-robot collaboration (1)
- Internet of Things (IOT) (1)
- Internet of things (1)
- Intrusion detection (1)
- Local government (1)
- MO garnets (1)
- Magneto-photonics (1)
- Malware (1)
- Matching performance (1)
- Mobile security (1)
- Mobile telecommunication systems (1)
- NIST cyber security framework (1)
- Pattern matching (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Review Of Deep Learning Methods In Robotic Grasp Detection, Shehan Caldera, Alexander Rassau, Douglas Chai
Research outputs 2014 to 2021
For robots to attain more general-purpose utility, grasping is a necessary skill to master. Such general-purpose robots may use their perception abilities to visually identify grasps for a given object. A grasp describes how a robotic end-effector can be arranged to securely grab an object and successfully lift it without slippage. Traditionally, grasp detection requires expert human knowledge to analytically form the task-specific algorithm, but this is an arduous and time-consuming approach. During the last five years, deep learning methods have enabled significant advancements in robotic vision, natural language processing, and automated driving applications. The successful results of these methods …
Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh
Influence Of Substrate Stage Temperature And Rotation Rate On The Magneto-Optical Quality Of Rf-Sputtered Bi2.1dy0.9fe3.9ga1.1o12 Garnet Thin Films, Mohammad E. Alam, Mikhail Vasiliev, Kamal Alameh
Research outputs 2014 to 2021
Highly bismuth-substituted iron garnet thin films are prepared on quartz substrates by using a radio frequency (RF) magnetron sputtering technique. We study the factors (process parameters associated with the RF magnetron sputter deposition technique) affecting the magneto-optical (MO) properties of ferrite garnet films of composition Bi2.1Dy0.9Fe3.9Ga1.1O12. All films show high MO response across the visible range of wavelengths after being annealed. In particular, the effects of substrate stage temperature and rotation rate on the various properties of films are studied. Experimental results reveal that the characteristics of garnet films of this type can be tuned and optimized for use in …
Ransomware Behavioural Analysis On Windows Platforms, Nikolai Hampton, Zubair A. Baig, Sherali Zeadally
Ransomware Behavioural Analysis On Windows Platforms, Nikolai Hampton, Zubair A. Baig, Sherali Zeadally
Research outputs 2014 to 2021
Ransomware infections have grown exponentially during the recent past to cause major disruption in operations across a range of industries including the government. Through this research, we present an analysis of 14 strains of ransomware that infect Windows platforms, and we do a comparison of Windows Application Programming Interface (API) calls made through ransomware processes with baselines of normal operating system behaviour. The study identifies and reports salient features of ransomware as referred through the frequencies of API calls
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Research outputs 2014 to 2021
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
Research outputs 2014 to 2021
Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating …