Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian Jan 2016

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian

Australian Digital Forensics Conference

The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …


The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli Jan 2016

The Proceedings Of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia, Craig Valli

Australian Digital Forensics Conference

Conference Foreword

This is the fifth year that the Australian Digital Forensics Conference has been held under the banner of the Security Research Institute, which is in part due to the success of the security conference program at ECU. As with previous years, the conference continues to see a quality papers with a number from local and international authors. 11 papers were submitted and following a double blind peer review process, 8 were accepted for final presentation and publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made, …


Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun Jan 2016

Floating Constructed Wetland For The Treatment Of Polluted River Water: A Pilot Scale Study On Seasonal Variation And Shock Load, Tanveer Saeed, Biprojit Paul, Rumana Afrin,, Abdullah Al-Muyeed, Guangzhi Sun

Research outputs 2014 to 2021

This paper reports the performance of a pilot scale floating constructed wetland (FCW), employed for the treatment of polluted water collected from Buriganga river in Bangladesh. The FCW system included a tank for accommodating collected water and a floating mat with media, to support the growth of two macrophyte species Phragmites australis and Canna indica. Mean mass removal rates of 0.66, 0.76, 0.08, 0.51, 2.49g/m2d were achieved for ammoniacal nitrogen (NH4-N), total inorganic nitrogen (TIN), phosphorus (P), biochemical oxygen demand (BOD), chemical oxygen demand (COD), respectively by the FCW. Nitrogen removal was via nitrification-denitrification processes, whereas filtration-sedimentation appeared to influence …


Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley Jan 2016

Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley

Research outputs 2014 to 2021

Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …


Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli Jan 2016

Influence Of Neural Network Training Parameters On Short-Term Wind Forecasting, Adel Brka, Yasir M. Al-Abdeli, Ganesh Kothapalli

Research outputs 2014 to 2021

This paper investigates factors which can affect the accuracy of short-term wind speed prediction when done over long periods spanning different seasons. Two types of neural networks (NNs) are used to forecast power generated via specific horizontal axis wind turbines. Meteorological data used are for a specific Western Australian location. Results reveal that seasonal variations affect the prediction accuracy of the wind resource, but the magnitude of this influence strongly depends on the details of the NN deployed. Factors investigated include the span of the time series needed to initially train the networks, the temporal resolution of these data, the …