Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Batiery Storage (1)
- Biometrics (1)
- Data leakage (1)
- De facto standard (1)
- Digital forensic (1)
-
- Digital forensics (1)
- Electronic crime countermeasures (1)
- Electronic evidences (1)
- Energy Storage System (1)
- Energy security (1)
- Feature vectors (1)
- Grille cipher (1)
- Guilty identification (1)
- Home Energy Management (1)
- Information services (1)
- Information use (1)
- Internal systems (1)
- Malware (1)
- Nuclear power (1)
- Radiation (1)
- Solar (1)
- Uranium (1)
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Engineering
Smart Home Energy Management: An Analysis Of A Novel Dynamic Pricing And Demand Response Aware Control Algorithm For Households With Distributed Renewable Energy Generation And Storage, Jamal Abushnaf
Theses: Doctorates and Masters
Home energy management systems (HEMS) technology can provide a smart and efficient way of optimising energy usage in residential buildings. One of the main goals of the Smart Grid is to achieve Demand Response (DR) by increasing end users’ participation in decision making and increasing the level of awareness that will lead them to manage their energy consumption in an efficient way. This research presents an intelligent HEMS algorithm that manages and controls a range of household appliances with different demand response (DR) limits in an automated way without requiring consumer intervention. In addition, a novel Multiple Users and Load …
Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell
Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell
Research outputs 2014 to 2021
Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization's internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. images, …
Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan
Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan
Australian Security and Intelligence Conference
Climate change and energy security are driving a worldwide renaissance in nuclear power. An Australian nuclear power industry has also been seriously investigated by the Australian government and its agencies. This paper provides a broad overview of the nuclear fuel cycle and the nuclear power industry. It identifies aspects that are sensitive to nuclear terrorism and nuclear weapons proliferation to help security professionals identify threats and prepare for a possible Australian nuclear power industry.