Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D Delaunay triangulation (1)
- Authentication (1)
- Cyber security (1)
- Delau-nay triangulations (1)
- Discrimination ability (1)
-
- Feature representation (1)
- Fingerprint authentication (1)
- Fingerprint authentication system (1)
- Fingerprint matching (1)
- Internet of Things (IOT) (1)
- Internet of things (1)
- Local government (1)
- Matching performance (1)
- Mobile security (1)
- Mobile telecommunication systems (1)
- NIST cyber security framework (1)
- Pattern matching (1)
- Risk assessment (1)
- Smartphones (1)
- Triangulation (1)
- Wireless networks (1)
Articles 1 - 2 of 2
Full-Text Articles in Engineering
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli
Research outputs 2014 to 2021
Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
A Security Review Of Local Government Using Nist Csf: A Case Study, Ahmed Ibrahim, Craig Valli, Ian Mcateer, Junaid Chaudhry
Research outputs 2014 to 2021
Evaluating cyber security risk is a challenging task regardless of an organisation’s nature of business or size, however, an essential activity. This paper uses the National Institute of Standards and Technology (NIST) cyber security framework (CSF) to assess the cyber security posture of a local government organisation in Western Australia. Our approach enabled the quantification of risks for specific NIST CSF core functions and respective categories and allowed making recommendations to address the gaps discovered to attain the desired level of compliance. This has led the organisation to strategically target areas related to their people, processes, and technologies, thus mitigating …